2024-12-13 21:54:49 -05:00
|
|
|
{ config, lib, pkgs, inputs, ... }:
|
|
|
|
|
|
|
|
let
|
|
|
|
fake-gitea = pkgs.writeShellScriptBin "gitea" ''
|
|
|
|
ssh -p 2222 -o StrictHostKeyChecking=no git@127.0.0.1 "SSH_ORIGINAL_COMMAND=\"$SSH_ORIGINAL_COMMAND\" /usr/local/bin/gitea $@"
|
|
|
|
'';
|
|
|
|
|
|
|
|
in {
|
|
|
|
disabledModules = [ "services/web-servers/caddy/default.nix" ];
|
|
|
|
imports =
|
|
|
|
[
|
|
|
|
./hardware-configuration.nix
|
|
|
|
"${inputs.testpkgs}/nixos/modules/services/web-servers/caddy"
|
2024-12-13 22:26:27 -05:00
|
|
|
../common.nix
|
2024-12-13 21:54:49 -05:00
|
|
|
];
|
|
|
|
|
|
|
|
sops.defaultSopsFile = ./secrets.yaml;
|
|
|
|
sops.age.keyFile = "/root/.config/sops/age/keys.txt";
|
|
|
|
sops.secrets = {
|
|
|
|
"borg/crash" = { };
|
|
|
|
"ntfy" = { };
|
|
|
|
"rclone" = { };
|
|
|
|
"vaultwarden" = { };
|
|
|
|
"caddy" = { };
|
|
|
|
"hedgedoc" = { };
|
2024-12-14 18:21:46 -05:00
|
|
|
"wireguard/private" = { };
|
|
|
|
"wireguard/psk" = { };
|
2024-12-14 18:44:25 -05:00
|
|
|
"wireguard/pskphone" = { };
|
2024-12-13 21:54:49 -05:00
|
|
|
};
|
|
|
|
|
|
|
|
boot.loader.grub.enable = true;
|
|
|
|
boot.loader.grub.device = "/dev/vda";
|
|
|
|
|
|
|
|
system.stateVersion = "24.05";
|
|
|
|
|
|
|
|
networking.hostName = "chunk";
|
|
|
|
networking.networkmanager.enable = true;
|
|
|
|
networking.firewall = {
|
|
|
|
enable = true;
|
2024-12-14 16:19:04 -05:00
|
|
|
allowedTCPPorts = [ 22 80 443 53 853 ];
|
|
|
|
allowedUDPPorts = [ 443 51820 53 853 ]; # 51820 is wireguard
|
2024-12-14 21:51:41 -05:00
|
|
|
trustedInterfaces = [ "wg0" "br-2a019a56bbcc" ]; # the second one is docker, idk if this changes
|
2024-12-13 21:54:49 -05:00
|
|
|
};
|
|
|
|
networking.interfaces.ens18 = {
|
|
|
|
ipv6.addresses = [{
|
|
|
|
address = "2a0f:85c1:840:2bfb::1";
|
|
|
|
prefixLength = 64;
|
|
|
|
}];
|
|
|
|
};
|
|
|
|
networking.defaultGateway6 = {
|
|
|
|
address = "2a0f:85c1:840::1";
|
|
|
|
interface = "ens18";
|
|
|
|
};
|
2024-12-14 18:21:46 -05:00
|
|
|
networking.nameservers = [ "127.0.0.1" "::1" ];
|
2024-12-13 21:54:49 -05:00
|
|
|
|
|
|
|
time.timeZone = "America/Toronto";
|
|
|
|
|
|
|
|
i18n.defaultLocale = "en_US.UTF-8";
|
|
|
|
console = {
|
|
|
|
font = "Lat2-Terminus16";
|
|
|
|
useXkbConfig = true;
|
|
|
|
};
|
|
|
|
|
|
|
|
users.users.yt = {
|
|
|
|
isNormalUser = true;
|
|
|
|
extraGroups = [ "wheel" "networkmanager" "docker"];
|
|
|
|
openssh.authorizedKeys.keys =
|
|
|
|
[ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPdhAQYy0+vS+QmyCd0MAbqbgzyMGcsuuFyf6kg2yKge yt@ytlinux" ];
|
|
|
|
shell = pkgs.zsh;
|
|
|
|
};
|
2024-12-13 23:31:56 -05:00
|
|
|
programs.zsh.enable = true;
|
2024-12-13 21:54:49 -05:00
|
|
|
users.users.root.openssh.authorizedKeys.keys =
|
|
|
|
[ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPdhAQYy0+vS+QmyCd0MAbqbgzyMGcsuuFyf6kg2yKge yt@ytlinux" ];
|
|
|
|
|
|
|
|
users.users.git = {
|
|
|
|
isNormalUser = true;
|
|
|
|
packages = [ fake-gitea ];
|
|
|
|
};
|
|
|
|
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
|
|
vim
|
|
|
|
wget
|
|
|
|
curl
|
|
|
|
tree
|
|
|
|
python3Full
|
|
|
|
tmux
|
|
|
|
borgbackup
|
|
|
|
rclone
|
|
|
|
file
|
|
|
|
sops
|
|
|
|
age
|
|
|
|
];
|
|
|
|
|
|
|
|
environment.variables = {
|
|
|
|
EDITOR = "nvim";
|
|
|
|
VISUAL = "nvim";
|
|
|
|
};
|
|
|
|
|
|
|
|
services.openssh = {
|
|
|
|
enable = true;
|
|
|
|
settings.PasswordAuthentication = false;
|
|
|
|
};
|
|
|
|
|
|
|
|
security.sudo.enable = true;
|
|
|
|
security.sudo.wheelNeedsPassword = false;
|
|
|
|
|
|
|
|
programs.gnupg.agent.enable = true;
|
|
|
|
programs.git.enable = true;
|
|
|
|
|
|
|
|
services.caddy = {
|
|
|
|
enable = true;
|
2024-12-13 22:01:01 -05:00
|
|
|
configFile = ./Caddyfile;
|
2024-12-13 21:54:49 -05:00
|
|
|
environmentFile = "/run/secrets/caddy";
|
|
|
|
logFormat = lib.mkForce "level INFO";
|
|
|
|
};
|
|
|
|
# systemd.services.caddy.serviceConfig = {
|
|
|
|
# EnvironmentFile = "/run/secrets/caddy";
|
|
|
|
# };
|
|
|
|
|
|
|
|
services.postgresql = {
|
|
|
|
enable = true;
|
|
|
|
settings.port = 5432;
|
|
|
|
package = pkgs.postgresql_17;
|
|
|
|
enableTCPIP = true;
|
|
|
|
ensureDatabases = [
|
|
|
|
"forgejo"
|
|
|
|
"freshrss"
|
|
|
|
"hedgedoc"
|
|
|
|
"linkwarden"
|
|
|
|
];
|
|
|
|
ensureUsers = [
|
|
|
|
{
|
|
|
|
name = "forgejo";
|
|
|
|
ensureDBOwnership = true;
|
|
|
|
}
|
|
|
|
{
|
|
|
|
name = "linkwarden";
|
|
|
|
ensureDBOwnership = true;
|
|
|
|
}
|
|
|
|
{
|
|
|
|
name = "freshrss";
|
|
|
|
ensureDBOwnership = true;
|
|
|
|
}
|
|
|
|
{
|
|
|
|
name = "hedgedoc";
|
|
|
|
ensureDBOwnership = true;
|
|
|
|
}
|
|
|
|
];
|
|
|
|
authentication = lib.mkForce ''
|
|
|
|
local all all trust
|
|
|
|
host all all 127.0.0.1/32 trust
|
|
|
|
host all all ::1/128 trust
|
|
|
|
host all all 172.18.0.0/16 trust
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
services.postgresqlBackup.enable = true;
|
|
|
|
|
|
|
|
virtualisation.docker.enable = true;
|
|
|
|
|
|
|
|
services.borgbackup.jobs = {
|
|
|
|
crashRsync = {
|
|
|
|
paths = [ "/root" "/home" "/var/backup" "/var/lib" "/var/log" "/opt" "/etc" "/vw-data" ];
|
|
|
|
exclude = [ "**/.cache" "**/node_modules" "**/cache" "**/Cache" "/var/lib/docker/overlay*" ];
|
|
|
|
repo = "de3911@de3911.rsync.net:borg/crash";
|
|
|
|
encryption = {
|
|
|
|
mode = "repokey-blake2";
|
|
|
|
passCommand = "cat /run/secrets/borg/crash";
|
|
|
|
};
|
|
|
|
environment = {
|
|
|
|
BORG_RSH = "ssh -i /home/yt/.ssh/id_ed25519";
|
|
|
|
BORG_REMOTE_PATH = "borg1";
|
|
|
|
};
|
|
|
|
compression = "auto,zstd";
|
|
|
|
startAt = "daily";
|
|
|
|
extraCreateArgs = [ "--stats" ];
|
|
|
|
# warnings are often not that serious
|
|
|
|
failOnWarnings = false;
|
|
|
|
postHook = ''
|
|
|
|
${pkgs.curl}/bin/curl -u $(cat /run/secrets/ntfy) -d "chunk: backup completed with exit code: $exitStatus
|
|
|
|
$(journalctl -u borgbackup-job-crashRsync.service|tail -n 5)" \
|
|
|
|
https://ntfy.cything.io/chunk
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
services.vaultwarden = {
|
|
|
|
enable = true;
|
|
|
|
dbBackend = "postgresql";
|
|
|
|
environmentFile = "/run/secrets/vaultwarden";
|
|
|
|
config = {
|
|
|
|
ROCKET_ADDRESS = "127.0.0.1";
|
|
|
|
ROCKET_PORT = "8081";
|
|
|
|
DATA_FOLDER = "/vw-data";
|
|
|
|
DATABASE_URL = "postgresql://vaultwarden:vaultwarden@127.0.0.1:5432/vaultwarden";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
services.ntfy-sh = {
|
|
|
|
enable = true;
|
|
|
|
settings = {
|
|
|
|
listen-http = "127.0.0.1:8083";
|
|
|
|
base-url = "https://ntfy.cything.io";
|
|
|
|
upstream-base-url = "https://ntfy.sh";
|
|
|
|
auth-default-access = "deny-all";
|
|
|
|
behind-proxy = true;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
systemd.services.immich-mount = {
|
|
|
|
enable = true;
|
|
|
|
description = "Mount the immich data remote";
|
|
|
|
after = [ "network-online.target" ];
|
|
|
|
requires = [ "network-online.target" ];
|
|
|
|
wantedBy = [ "default.target" ];
|
|
|
|
serviceConfig = {
|
|
|
|
Type = "notify";
|
|
|
|
ExecStartPre = "/usr/bin/env mkdir -p /mnt/photos";
|
|
|
|
ExecStart = "${pkgs.rclone}/bin/rclone mount --config /home/yt/.config/rclone/rclone.conf --transfers=32 --dir-cache-time 720h --poll-interval 0 --vfs-cache-mode writes photos: /mnt/photos ";
|
|
|
|
ExecStop = "/bin/fusermount -u /mnt/photos";
|
|
|
|
EnvironmentFile = "/run/secrets/rclone";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
systemd.services.nextcloud-mount = {
|
|
|
|
enable = true;
|
|
|
|
description = "Mount the nextcloud data remote";
|
|
|
|
after = [ "network-online.target" ];
|
|
|
|
requires = [ "network-online.target" ];
|
|
|
|
wantedBy = [ "default.target" ];
|
|
|
|
serviceConfig = {
|
|
|
|
Type = "notify";
|
|
|
|
ExecStart = "${pkgs.rclone}/bin/rclone mount --config /home/yt/.config/rclone/rclone.conf --uid 33 --gid 0 --allow-other --file-perms 0770 --dir-perms 0770 --transfers=32 rsyncnet:nextcloud /mnt/nextcloud";
|
|
|
|
ExecStop = "/bin/fusermount -u /mnt/nextcloud";
|
|
|
|
EnvironmentFile = "/run/secrets/rclone";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
programs.fuse.userAllowOther = true;
|
|
|
|
|
|
|
|
services.hedgedoc = {
|
|
|
|
enable = true;
|
|
|
|
environmentFile = "/run/secrets/hedgedoc";
|
|
|
|
settings = {
|
|
|
|
db = {
|
|
|
|
username = "hedgedoc";
|
|
|
|
database = "hedgedoc";
|
|
|
|
host = "/run/postgresql";
|
|
|
|
dialect = "postgresql";
|
|
|
|
};
|
|
|
|
port = 8085;
|
|
|
|
domain = "pad.cything.io";
|
|
|
|
allowEmailRegister = false;
|
|
|
|
protocolUseSSL = true;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
services.redlib = {
|
|
|
|
enable = true;
|
|
|
|
port = 8087;
|
|
|
|
address = "127.0.0.1";
|
|
|
|
settings = {
|
|
|
|
# settings are just env vars
|
|
|
|
REDLIB_ENABLE_RSS = "on";
|
|
|
|
REDLIB_ROBOTS_DISABLE_INDEXING = "on";
|
|
|
|
};
|
|
|
|
};
|
2024-12-14 16:19:04 -05:00
|
|
|
|
|
|
|
# wireguard stuff
|
|
|
|
networking.nat = {
|
|
|
|
enable = true;
|
2024-12-14 18:21:46 -05:00
|
|
|
enableIPv6 = true;
|
2024-12-14 16:19:04 -05:00
|
|
|
externalInterface = "ens18";
|
|
|
|
internalInterfaces = [ "wg0" ];
|
|
|
|
};
|
|
|
|
|
2024-12-14 18:21:46 -05:00
|
|
|
networking.wg-quick.interfaces.wg0 = {
|
|
|
|
address = [ "10.0.0.1/24" "fdc9:281f:04d7:9ee9::1/64" ];
|
2024-12-14 16:19:04 -05:00
|
|
|
listenPort = 51820;
|
2024-12-14 18:21:46 -05:00
|
|
|
privateKeyFile = "/run/secrets/wireguard/private";
|
|
|
|
postUp = ''
|
|
|
|
${pkgs.iptables}/bin/iptables -A FORWARD -i wg0 -j ACCEPT
|
|
|
|
${pkgs.iptables}/bin/iptables -A FORWARD -o wg0 -j ACCEPT
|
|
|
|
${pkgs.iptables}/bin/iptables -t nat -A POSTROUTING -o ens18 -j MASQUERADE
|
|
|
|
${pkgs.iptables}/bin/ip6tables -A FORWARD -i wg0 -j ACCEPT
|
|
|
|
${pkgs.iptables}/bin/ip6tables -A FORWARD -o wg0 -j ACCEPT
|
|
|
|
${pkgs.iptables}/bin/ip6tables -t nat -A POSTROUTING -o ens18 -j MASQUERADE
|
2024-12-14 16:19:04 -05:00
|
|
|
'';
|
2024-12-14 18:21:46 -05:00
|
|
|
preDown = ''
|
|
|
|
${pkgs.iptables}/bin/iptables -D FORWARD -i wg0 -j ACCEPT
|
|
|
|
${pkgs.iptables}/bin/iptables -D FORWARD -o wg0 -j ACCEPT
|
|
|
|
${pkgs.iptables}/bin/iptables -t nat -D POSTROUTING -o ens18 -j MASQUERADE
|
|
|
|
${pkgs.iptables}/bin/ip6tables -D FORWARD -i wg0 -j ACCEPT
|
|
|
|
${pkgs.iptables}/bin/ip6tables -D FORWARD -o wg0 -j ACCEPT
|
|
|
|
${pkgs.iptables}/bin/ip6tables -t nat -D POSTROUTING -o ens18 -j MASQUERADE
|
2024-12-14 16:19:04 -05:00
|
|
|
'';
|
|
|
|
peers = [
|
|
|
|
{
|
|
|
|
publicKey = "qUhWoTPVC7jJdDEJLYY92OeiwPkaf8I5pv5kkMcSW3g=";
|
2024-12-14 18:21:46 -05:00
|
|
|
allowedIPs = [ "10.0.0.2/32" "fdc9:281f:04d7:9ee9::2/128" ];
|
|
|
|
presharedKeyFile = "/run/secrets/wireguard/psk";
|
2024-12-14 16:19:04 -05:00
|
|
|
}
|
2024-12-14 18:44:25 -05:00
|
|
|
{
|
|
|
|
publicKey = "JIGi60wzLw717Cim1dSFoLCdJz5rePa5AIFfuisJI0k=";
|
|
|
|
allowedIPs = [ "10.0.0.3/32" "fdc9:281f:04d7:9ee9::3/128" ];
|
|
|
|
presharedKeyFile = "/run/secrets/wireguard/pskphone";
|
|
|
|
}
|
2024-12-14 16:19:04 -05:00
|
|
|
];
|
|
|
|
};
|
2024-12-14 16:47:58 -05:00
|
|
|
|
|
|
|
# adguard
|
|
|
|
services.adguardhome = {
|
|
|
|
enable = true;
|
|
|
|
host = "127.0.0.1";
|
|
|
|
port = 8082;
|
|
|
|
settings = {
|
|
|
|
http.port = "8083";
|
|
|
|
users = [
|
|
|
|
{
|
|
|
|
name = "cy";
|
|
|
|
password = "$2y$10$BZy2zYJj5z4e8LZCq/GwuuhWUafL/MNFO.YcsAMmpDS.2krPxi7KC";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
2024-12-13 21:54:49 -05:00
|
|
|
}
|
|
|
|
|