Runs the Gerrit instance with the same config as previously on whitby. Data has been migrated manually using `tailscale file` (which worked surprisingly well). Change-Id: I6e85f932c834b2c36fc40327ae081ee396c5e16f Reviewed-on: https://cl.tvl.fyi/c/depot/+/13077 Tested-by: BuildkiteCI Reviewed-by: sterni <sternenseemann@systemli.org>
441 lines
11 KiB
Nix
441 lines
11 KiB
Nix
{ depot, lib, pkgs, ... }: # readTree options
|
|
{ config, ... }: # passed by module system
|
|
|
|
let
|
|
mod = name: depot.path.origSrc + ("/ops/modules/" + name);
|
|
in
|
|
{
|
|
imports = [
|
|
(mod "builderball.nix")
|
|
(mod "clbot.nix")
|
|
(mod "harmonia.nix")
|
|
(mod "irccat.nix")
|
|
(mod "known-hosts.nix")
|
|
(mod "monorepo-gerrit.nix")
|
|
(mod "owothia.nix")
|
|
(mod "smtprelay.nix")
|
|
(mod "restic.nix")
|
|
(mod "tvl-buildkite.nix")
|
|
(mod "tvl-users.nix")
|
|
(mod "www/cache.tvl.fyi.nix")
|
|
(mod "www/cl.tvl.fyi.nix")
|
|
(mod "www/self-cache.tvl.fyi.nix")
|
|
(mod "www/self-redirect.nix")
|
|
(depot.third_party.agenix.src + "/modules/age.nix")
|
|
];
|
|
|
|
hardware.cpu.amd.updateMicrocode = true;
|
|
hardware.enableRedistributableFirmware = true;
|
|
|
|
boot = {
|
|
tmp.useTmpfs = true;
|
|
kernelModules = [ "kvm-amd" ];
|
|
supportedFilesystems = [ "zfs" ];
|
|
kernelParams = [
|
|
"ip=188.225.81.75::188.225.81.1:255.255.255.0:nevsky:enp1s0f0np0:none"
|
|
];
|
|
|
|
initrd = {
|
|
availableKernelModules = [ "nvme" "xhci_pci" "usbhid" "ice" ];
|
|
|
|
# initrd SSH for disk unlocking
|
|
network = {
|
|
enable = true;
|
|
ssh = {
|
|
enable = true;
|
|
port = 2222;
|
|
authorizedKeys =
|
|
depot.users.tazjin.keys.all
|
|
++ depot.users.lukegb.keys.all
|
|
++ depot.users.sterni.keys.all;
|
|
|
|
hostKeys = [
|
|
/etc/secrets/initrd_host_ed25519_key
|
|
];
|
|
};
|
|
|
|
# this will launch the zfs password prompt on login and kill the
|
|
# other prompt
|
|
postCommands = ''
|
|
echo "zfs load-key -a && killall zfs" >> /root/.profile
|
|
'';
|
|
};
|
|
};
|
|
|
|
kernel.sysctl = {
|
|
"net.ipv4.tcp_congestion_control" = "bbr";
|
|
};
|
|
|
|
loader.systemd-boot.enable = true;
|
|
loader.efi.canTouchEfiVariables = true;
|
|
zfs.requestEncryptionCredentials = true;
|
|
};
|
|
|
|
fileSystems = {
|
|
"/" = {
|
|
device = "tank/root";
|
|
fsType = "zfs";
|
|
};
|
|
|
|
"/boot" = {
|
|
device = "/dev/disk/by-uuid/CCB4-8821";
|
|
fsType = "vfat";
|
|
};
|
|
|
|
"/nix" = {
|
|
device = "tank/nix";
|
|
fsType = "zfs";
|
|
};
|
|
|
|
"/home" = {
|
|
device = "tank/home";
|
|
fsType = "zfs";
|
|
};
|
|
|
|
"/depot" = {
|
|
device = "tank/depot";
|
|
fsType = "zfs";
|
|
};
|
|
};
|
|
|
|
age.secrets =
|
|
let
|
|
secretFile = name: depot.ops.secrets."${name}.age";
|
|
in
|
|
{
|
|
clbot.file = secretFile "clbot";
|
|
gerrit-autosubmit.file = secretFile "gerrit-autosubmit";
|
|
grafana.file = secretFile "grafana";
|
|
irccat.file = secretFile "irccat";
|
|
keycloak-db.file = secretFile "keycloak-db";
|
|
owothia.file = secretFile "owothia";
|
|
panettone.file = secretFile "panettone";
|
|
smtprelay.file = secretFile "smtprelay";
|
|
teleirc.file = secretFile "teleirc";
|
|
wg-privkey.file = depot.ops.secrets."wg-nevsky.age";
|
|
|
|
nix-cache-priv = {
|
|
file = secretFile "nix-cache-priv";
|
|
mode = "0440";
|
|
group = "harmonia";
|
|
};
|
|
|
|
# Not actually a secret
|
|
nix-cache-pub = {
|
|
file = secretFile "nix-cache-pub";
|
|
mode = "0444";
|
|
};
|
|
|
|
buildkite-agent-token = {
|
|
file = secretFile "buildkite-agent-token";
|
|
mode = "0440";
|
|
group = "buildkite-agents";
|
|
};
|
|
|
|
buildkite-graphql-token = {
|
|
file = secretFile "buildkite-graphql-token";
|
|
mode = "0440";
|
|
group = "buildkite-agents";
|
|
};
|
|
|
|
buildkite-besadii-config = {
|
|
file = secretFile "besadii";
|
|
mode = "0440";
|
|
group = "buildkite-agents";
|
|
};
|
|
|
|
buildkite-private-key = {
|
|
file = secretFile "buildkite-ssh-private-key";
|
|
mode = "0440";
|
|
group = "buildkite-agents";
|
|
};
|
|
|
|
gerrit-besadii-config = {
|
|
file = secretFile "besadii";
|
|
owner = "git";
|
|
};
|
|
|
|
gerrit-secrets = {
|
|
file = secretFile "gerrit-secrets";
|
|
path = "/var/lib/gerrit/etc/secure.config";
|
|
owner = "git";
|
|
mode = "0400";
|
|
};
|
|
|
|
clbot-ssh = {
|
|
file = secretFile "clbot-ssh";
|
|
owner = "clbot";
|
|
};
|
|
|
|
depot-replica-key = {
|
|
file = secretFile "depot-replica-key";
|
|
mode = "0500";
|
|
owner = "git";
|
|
group = "git";
|
|
path = "/var/lib/git/.ssh/id_ed25519";
|
|
};
|
|
};
|
|
|
|
networking = {
|
|
hostName = "nevsky";
|
|
domain = "tvl.fyi";
|
|
hostId = "0117d088";
|
|
useDHCP = false;
|
|
|
|
interfaces.enp1s0f0np0.ipv4.addresses = [{
|
|
address = "188.225.81.75";
|
|
prefixLength = 24;
|
|
}];
|
|
|
|
defaultGateway = "188.225.81.1";
|
|
|
|
interfaces.enp1s0f0np0.ipv6.addresses = [{
|
|
address = "2a03:6f00:2:514b:0:feed:edef:beef";
|
|
prefixLength = 64;
|
|
}];
|
|
|
|
defaultGateway6 = {
|
|
address = "2a03:6f00:2:514b::1";
|
|
interface = "enp1s0f0np0";
|
|
};
|
|
|
|
wireguard.interfaces.wg-bugry = {
|
|
ips = [ "2a03:6f00:2:514b:5bc7:95ef::1/96" ];
|
|
privateKeyFile = "/run/agenix/wg-privkey";
|
|
listenPort = 51820;
|
|
|
|
postSetup = ''
|
|
${pkgs.iptables}/bin/ip6tables -t nat -A POSTROUTING -s '2a03:6f00:2:514b:5bc7:95ef::1/96' -o enp1s0f0np0 -j MASQUERADE
|
|
ip -6 neigh add proxy 2a03:6f00:2:514b:5bc7:95ef:0:2 dev enp1s0f0np0
|
|
'';
|
|
|
|
postShutdown = ''
|
|
${pkgs.iptables}/bin/ip6tables -t nat -D POSTROUTING -s '2a03:6f00:2:514b:5bc7:95ef::1/96' -o enp1s0f0np0 -j MASQUERADE
|
|
ip -6 neigh del proxy 2a03:6f00:2:514b:5bc7:95ef:0:2 dev enp1s0f0np0
|
|
'';
|
|
|
|
peers = [{
|
|
publicKey = "+vFeWLH99aaypitw7x1J8IypoTrva28LItb1v2VjOAg="; # bugry
|
|
allowedIPs = [ "2a03:6f00:2:514b:5bc7:95ef::/96" ];
|
|
}];
|
|
|
|
allowedIPsAsRoutes = true;
|
|
};
|
|
|
|
nameservers = [
|
|
"8.8.8.8"
|
|
"8.8.4.4"
|
|
];
|
|
|
|
firewall.allowedTCPPorts = [ 22 80 443 29418 ];
|
|
firewall.allowedUDPPorts = [ 51820 ];
|
|
};
|
|
|
|
# Generate an immutable /etc/resolv.conf from the nameserver settings
|
|
# above (otherwise DHCP overwrites it):
|
|
environment.etc."resolv.conf" = with lib; {
|
|
source = pkgs.writeText "resolv.conf" ''
|
|
${concatStringsSep "\n" (map (ns: "nameserver ${ns}") config.networking.nameservers)}
|
|
options edns0
|
|
'';
|
|
};
|
|
|
|
services.openssh = {
|
|
enable = true;
|
|
settings = {
|
|
PasswordAuthentication = false;
|
|
KbdInteractiveAuthentication = false;
|
|
};
|
|
};
|
|
|
|
services.fail2ban.enable = true;
|
|
|
|
programs.mtr.enable = true;
|
|
programs.mosh.enable = true;
|
|
|
|
time.timeZone = "UTC";
|
|
nixpkgs.hostPlatform = "x86_64-linux";
|
|
|
|
services.fwupd.enable = true;
|
|
|
|
services.postgresql = {
|
|
enable = true;
|
|
enableTCPIP = true;
|
|
package = pkgs.postgresql_16;
|
|
|
|
authentication = lib.mkForce ''
|
|
local all all trust
|
|
host all all 127.0.0.1/32 password
|
|
host all all ::1/128 password
|
|
hostnossl all all 127.0.0.1/32 password
|
|
hostnossl all all ::1/128 password
|
|
'';
|
|
|
|
ensureDatabases = [
|
|
"panettone"
|
|
];
|
|
|
|
ensureUsers = [{
|
|
name = "panettone";
|
|
ensureDBOwnership = true;
|
|
}];
|
|
};
|
|
|
|
# Join TVL Tailscale network at net.tvl.fyi
|
|
services.tailscale = {
|
|
enable = true;
|
|
useRoutingFeatures = "both";
|
|
};
|
|
|
|
services.depot = {
|
|
# Run a Harmonia binary cache.
|
|
#
|
|
# TODO(tazjin): switch to upstream module after fix for Nix 2.3
|
|
harmonia = {
|
|
enable = true;
|
|
signKeyPaths = [ (config.age.secretsDir + "/nix-cache-priv") ];
|
|
settings.bind = "127.0.0.1:6443";
|
|
settings.priority = 50;
|
|
};
|
|
|
|
builderball.enable = true;
|
|
|
|
# Automatically collect garbage from the Nix store.
|
|
automatic-gc = {
|
|
enable = true;
|
|
interval = "1 hour";
|
|
diskThreshold = 200; # GiB
|
|
maxFreed = 420; # GiB
|
|
preserveGenerations = "60d";
|
|
};
|
|
|
|
# Run a handful of Buildkite agents to support parallel builds.
|
|
buildkite = {
|
|
enable = true;
|
|
agentCount = 16;
|
|
};
|
|
|
|
# make our channel more owo
|
|
owothia = {
|
|
enable = true;
|
|
ircServer = "localhost";
|
|
ircPort = config.services.znc.config.Listener.l.Port;
|
|
};
|
|
|
|
# Run irccat to forward messages to IRC
|
|
irccat = {
|
|
enable = true;
|
|
config = {
|
|
tcp.listen = ":4722"; # "ircc"
|
|
irc = {
|
|
server = "localhost:${toString config.services.znc.config.Listener.l.Port}";
|
|
tls = false;
|
|
nick = "tvlbot";
|
|
# Note: irccat means 'ident' where it says 'realname', so
|
|
# this is critical for connecting to ZNC.
|
|
realname = "tvlbot";
|
|
channels = [
|
|
"#tvl"
|
|
];
|
|
};
|
|
};
|
|
};
|
|
|
|
# Start the Gerrit->IRC bot
|
|
clbot = {
|
|
enable = true;
|
|
channels = {
|
|
"#tvl" = { };
|
|
"#tvix-dev" = {
|
|
only_display = "tvix,nix-compat,third_party,third-party,3p";
|
|
};
|
|
};
|
|
|
|
# See //fun/clbot for details.
|
|
flags = {
|
|
gerrit_host = "cl.tvl.fyi:29418";
|
|
gerrit_ssh_auth_username = "clbot";
|
|
gerrit_ssh_auth_key = config.age.secretsDir + "/clbot-ssh";
|
|
|
|
irc_server = "localhost:${toString config.services.znc.config.Listener.l.Port}";
|
|
irc_user = "tvlbot";
|
|
irc_nick = "tvlbot";
|
|
|
|
notify_branches = "canon,refs/meta/config";
|
|
notify_repo = "depot";
|
|
|
|
# This secret is read from an environment variable, which is
|
|
# populated by a systemd EnvironmentFile.
|
|
irc_pass = "$CLBOT_PASS";
|
|
};
|
|
};
|
|
|
|
# Start a local SMTP relay to Gmail (used by gerrit)
|
|
smtprelay = {
|
|
enable = true;
|
|
args = {
|
|
listen = ":2525";
|
|
remote_host = "smtp.gmail.com:587";
|
|
remote_auth = "plain";
|
|
remote_user = "tvlbot@tazj.in";
|
|
};
|
|
};
|
|
};
|
|
|
|
# Start a ZNC instance which bounces for tvlbot and owothia.
|
|
services.znc = {
|
|
enable = true;
|
|
useLegacyConfig = false;
|
|
config = {
|
|
LoadModule = [
|
|
"webadmin"
|
|
"adminlog"
|
|
];
|
|
|
|
User.admin = {
|
|
Admin = true;
|
|
Pass.password = {
|
|
Method = "sha256";
|
|
Hash = "bb00aa8239de484c2925b1c3f6a196fb7612633f001daa9b674f83abe7e1103f";
|
|
Salt = "TiB0Ochb1CrtpMTl;2;j";
|
|
};
|
|
};
|
|
|
|
Listener.l = {
|
|
Host = "localhost";
|
|
Port = 2627; # bncr
|
|
SSL = false;
|
|
};
|
|
|
|
Listener.tailscale = {
|
|
Host = "100.64.0.11";
|
|
Port = 2627; # bncr
|
|
SSL = false;
|
|
};
|
|
};
|
|
};
|
|
|
|
# Use TVL cache locally through the proxy; for cross-builder substitution.
|
|
tvl.cache.enable = true;
|
|
tvl.cache.builderball = true;
|
|
|
|
security.sudo.extraRules = [{
|
|
groups = [ "wheel" ];
|
|
commands = [{ command = "ALL"; options = [ "NOPASSWD" ]; }];
|
|
}];
|
|
|
|
users = {
|
|
# Set up a user & group for git shenanigans
|
|
groups.git = { };
|
|
users.git = {
|
|
group = "git";
|
|
isSystemUser = true;
|
|
createHome = true;
|
|
home = "/var/lib/git";
|
|
};
|
|
};
|
|
|
|
zramSwap.enable = true;
|
|
|
|
system.stateVersion = "24.11";
|
|
}
|