mirror of
https://git.sr.ht/~magic_rb/dotfiles
synced 2024-11-26 10:06:13 +01:00
311 lines
8.6 KiB
Nix
311 lines
8.6 KiB
Nix
|
{
|
||
|
config,
|
||
|
pkgs,
|
||
|
lib,
|
||
|
inputs',
|
||
|
...
|
||
|
}: let
|
||
|
k3s = pkgs.runCommandNoCC pkgs.k3s_1_29.name {} ''
|
||
|
cp --no-preserve=mode,ownership -r ${pkgs.k3s_1_29} $out
|
||
|
rm $out/bin/{crictl,ctr}
|
||
|
chmod +x $out/bin/*
|
||
|
'';
|
||
|
inherit
|
||
|
(lib)
|
||
|
singleton
|
||
|
concatStringsSep
|
||
|
getExe'
|
||
|
mkForce
|
||
|
;
|
||
|
|
||
|
k3sFormat = pkgs.formats.json {};
|
||
|
|
||
|
k3sConfigDir = "/run/secrets/k3s.d";
|
||
|
k3sConfig = k3sFormat.generate "k3s-config.json" {
|
||
|
disable = [
|
||
|
"traefik"
|
||
|
"servicelb"
|
||
|
];
|
||
|
cluster-cidr = "10.64.48.0/22";
|
||
|
service-cidr = "10.64.48.0/23";
|
||
|
flannel-iface = "eno1";
|
||
|
container-runtime-endpoint = "unix:///run/containerd/containerd.sock";
|
||
|
flannel-backend = "vxlan";
|
||
|
# disable-network-policy = true;
|
||
|
node-ip = "10.64.2.1";
|
||
|
node-external-ip = "10.64.2.1";
|
||
|
};
|
||
|
|
||
|
k3s-pgpassPath = "${k3sConfigDir}/pgpass.yaml";
|
||
|
|
||
|
cilium-cni = pkgs.callPackage (
|
||
|
{
|
||
|
lib,
|
||
|
buildGoModule,
|
||
|
fetchFromGitHub,
|
||
|
installShellFiles,
|
||
|
}:
|
||
|
buildGoModule rec {
|
||
|
pname = "cilium-cni";
|
||
|
version = "1.15.1";
|
||
|
|
||
|
src = fetchFromGitHub {
|
||
|
owner = "cilium";
|
||
|
repo = "cilium";
|
||
|
rev = "v${version}";
|
||
|
hash = "sha256-RFuSaBiobN9V7u1EEWGoMl/g9iKu/yAJana6wUSQ/+I=";
|
||
|
};
|
||
|
|
||
|
vendorHash = null;
|
||
|
|
||
|
subPackages = ["plugins/cilium-cni"];
|
||
|
|
||
|
ldflags = [
|
||
|
"-s"
|
||
|
"-w"
|
||
|
# "-X github.com/cilium/cilium-cli/cli.Version=${version}"
|
||
|
];
|
||
|
|
||
|
# Required to workaround install check error:
|
||
|
# 2022/06/25 10:36:22 Unable to start gops: mkdir /homeless-shelter: permission denied
|
||
|
HOME = "$TMPDIR";
|
||
|
|
||
|
# doInstallCheck = true;
|
||
|
# installCheckPhase = ''
|
||
|
# $out/bin/cilium version | grep ${version} > /dev/null
|
||
|
# '';
|
||
|
|
||
|
# nativeBuildInputs = [installShellFiles];
|
||
|
# postInstall = ''
|
||
|
# installShellCompletion --cmd cilium \
|
||
|
# --bash <($out/bin/cilium completion bash) \
|
||
|
# --fish <($out/bin/cilium completion fish) \
|
||
|
# --zsh <($out/bin/cilium completion zsh)
|
||
|
# '';
|
||
|
|
||
|
meta = with lib; {
|
||
|
description = "CLI to install, manage & troubleshoot Kubernetes clusters running Cilium";
|
||
|
license = licenses.asl20;
|
||
|
homepage = "https://www.cilium.io/";
|
||
|
maintainers = with maintainers; [humancalico bryanasdev000 qjoly];
|
||
|
mainProgram = "cilium";
|
||
|
};
|
||
|
}
|
||
|
) {};
|
||
|
in {
|
||
|
environment.systemPackages = [k3s];
|
||
|
|
||
|
systemd.services."k3s-secrets" = {
|
||
|
requiredBy = ["k3s.service"];
|
||
|
before = ["k3s.service"];
|
||
|
restartIfChanged = true;
|
||
|
serviceConfig.Type = "oneshot";
|
||
|
script = ''
|
||
|
mkdir -p ${k3sConfigDir}
|
||
|
touch ${k3s-pgpassPath}
|
||
|
chmod 400 ${k3s-pgpassPath}
|
||
|
chown root:root ${k3s-pgpassPath}
|
||
|
cat <<EOF > ${k3s-pgpassPath}
|
||
|
datastore-endpoint: postgres://k3s:$(cat /mnt/kyle/infrastructure/k3s/postgresql/pgpass)@${config.containers.k3s-psql.localAddress}:5432/k3s
|
||
|
EOF
|
||
|
ln -sf ${k3sConfig} ${k3sConfigDir}/main.yaml
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
systemd.services."k3s-pre-setup" = {
|
||
|
requiredBy = ["k3s.service"];
|
||
|
before = ["k3s.service"];
|
||
|
restartIfChanged = true;
|
||
|
serviceConfig.Type = "oneshot";
|
||
|
script = let
|
||
|
k3sCniDir = "/var/lib/rancher/k3s/agent/etc/cni/net.d";
|
||
|
in ''
|
||
|
mkdir -p /var/lib/rancher/k3s/agent/etc/cni /etc/cni/net.d
|
||
|
[ -e ${k3sCniDir} ] && ! [ -L ${k3sCniDir} ] && rm -r ${k3sCniDir}
|
||
|
! [ -L ${k3sCniDir} ] && ln -sf /etc/cni/net.d /var/lib/rancher/k3s/agent/etc/cni
|
||
|
exit 0
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
systemd.tmpfiles.rules = [
|
||
|
"D /run/cilium/cni 600 root root 0 -"
|
||
|
];
|
||
|
|
||
|
systemd.services."k3s-setup" = {
|
||
|
wantedBy = ["k3s.service"];
|
||
|
after = ["k3s.service"];
|
||
|
restartIfChanged = true;
|
||
|
serviceConfig.Type = "oneshot";
|
||
|
script = let
|
||
|
sanitizedRevision = lib.stringAsChars (c:
|
||
|
{"." = "-";}.${c} or c)
|
||
|
pkgs.istioctl.src.rev;
|
||
|
istio-base = pkgs.callPackage kubernetes/templateHelmChart.nix {} {
|
||
|
helmChart = pkgs.istioctl.src + "/manifests/charts/base";
|
||
|
name = "istio-base";
|
||
|
namespace = "istio-system";
|
||
|
values = {
|
||
|
defaultRevision = sanitizedRevision;
|
||
|
};
|
||
|
};
|
||
|
istio-istiod = pkgs.callPackage kubernetes/templateHelmChart.nix {} {
|
||
|
helmChart = pkgs.istioctl.src + "/manifests/charts/istio-control/istio-discovery";
|
||
|
name = "istio-istiod";
|
||
|
namespace = "istio-system";
|
||
|
values = {
|
||
|
revision = sanitizedRevision;
|
||
|
};
|
||
|
};
|
||
|
istio-gateway = pkgs.callPackage kubernetes/templateHelmChart.nix {} {
|
||
|
helmChart = pkgs.istioctl.src + "/manifests/charts/gateway";
|
||
|
name = "istio-gateway";
|
||
|
namespace = "istio-system";
|
||
|
values = {
|
||
|
revision = sanitizedRevision;
|
||
|
};
|
||
|
};
|
||
|
kubectl = getExe' k3s "kubectl";
|
||
|
in ''
|
||
|
# if ! ${kubectl} get namespace istio-system ; then
|
||
|
# ${kubectl} create namespace istio-system
|
||
|
# fi
|
||
|
${kubectl} apply -f ${istio-base}
|
||
|
${kubectl} apply -f ${istio-istiod}
|
||
|
${kubectl} apply -f ${istio-gateway}
|
||
|
${kubectl} apply -f ${./kubernetes/test-website.yaml}
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
systemd.services."container@k3s-psql".environment.SYSTEMD_LOG_LEVEL = "debug";
|
||
|
systemd.services."container@k3s-psql".script = lib.mkBefore ''
|
||
|
if [ -z $OVERWRITTEN ] ; then
|
||
|
_tmp=$(mktemp)
|
||
|
cp $0 $_tmp
|
||
|
sed -i -e 's/--notify-ready=yes/--notify-ready=no/' \
|
||
|
-e 's/--kill-signal=SIGRTMIN+3/--kill-signal=SIGHUP/' \
|
||
|
$_tmp
|
||
|
export OVERWRITTEN="$_tmp"
|
||
|
chmod +x $_tmp
|
||
|
exec -a $0 $_tmp
|
||
|
fi
|
||
|
rm "$OVERWRITTEN"
|
||
|
unset OVERWRITTEN
|
||
|
'';
|
||
|
|
||
|
containers.k3s-psql = {
|
||
|
ephemeral = true;
|
||
|
autoStart = true;
|
||
|
privateNetwork = true;
|
||
|
|
||
|
localAddress = "10.64.99.8";
|
||
|
hostAddress = "10.64.99.7";
|
||
|
|
||
|
bindMounts = {
|
||
|
"/var/lib/postgresql" = {
|
||
|
hostPath = "/mnt/kyle/infrastructure/k3s/postgresql";
|
||
|
isReadOnly = false;
|
||
|
};
|
||
|
};
|
||
|
|
||
|
path =
|
||
|
(inputs'.nixng.nglib.makeSystem {
|
||
|
inherit (pkgs.stdenv) system;
|
||
|
name = "k3s-psql";
|
||
|
inherit (inputs') nixpkgs;
|
||
|
config = {config, ...}: {
|
||
|
dumb-init = {
|
||
|
enable = true;
|
||
|
type.services = {};
|
||
|
};
|
||
|
|
||
|
init.services.sdnotify = {
|
||
|
enabled = true;
|
||
|
shutdownOnExit = false;
|
||
|
script = pkgs.writeShellScript "notify-ready" ''
|
||
|
NOTIFY_SOCKET=/run/host/notify ${getExe' pkgs.sdnotify-wrapper "sdnotify-wrapper"} sh -c 'echo ; sleep infinity'
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
init.services.postgresql-secrets = {
|
||
|
enabled = true;
|
||
|
shutdownOnExit = false;
|
||
|
script = pkgs.writeShellScript "" ''
|
||
|
mkdir -p /secrets
|
||
|
cat <<EOF > /secrets/init.sql
|
||
|
alter user "k3s" with password '$(cat /var/lib/postgresql/pgpass)';
|
||
|
alter database "k3s" owner to "k3s";
|
||
|
EOF
|
||
|
exec sleep infinity
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
init.services.postgresql = {
|
||
|
dependencies = [
|
||
|
"postgresql-secrets"
|
||
|
];
|
||
|
};
|
||
|
|
||
|
services.postgresql = {
|
||
|
enable = true;
|
||
|
package = pkgs.postgresql_16;
|
||
|
enableTCPIP = true;
|
||
|
authentication = "host all all all md5";
|
||
|
initialScript = "/secrets/init.sql";
|
||
|
ensureDatabases = {
|
||
|
"k3s" = {
|
||
|
ENCODING = "UTF8";
|
||
|
TEMPLATE = "template0";
|
||
|
};
|
||
|
};
|
||
|
ensureExtensions = {};
|
||
|
ensureUsers = [
|
||
|
{
|
||
|
name = "k3s";
|
||
|
ensurePermissions."DATABASE \"k3s\"" = "ALL PRIVILEGES";
|
||
|
}
|
||
|
];
|
||
|
};
|
||
|
};
|
||
|
})
|
||
|
.config
|
||
|
.system
|
||
|
.build
|
||
|
.toplevel;
|
||
|
};
|
||
|
|
||
|
systemd.services.containerd.path = with pkgs; [
|
||
|
iptables-nftables-compat
|
||
|
];
|
||
|
systemd.services.k3s.path = with pkgs; [
|
||
|
iptables-nftables-compat
|
||
|
];
|
||
|
virtualisation.containerd = {
|
||
|
enable = true;
|
||
|
settings = {
|
||
|
plugins."io.containerd.grpc.v1.cri".containerd.snapshotter = mkForce "overlayfs";
|
||
|
plugins."io.containerd.grpc.v1.cri".cni.bin_dir = mkForce ((pkgs.symlinkJoin {
|
||
|
name = "cni-containerd-plugins";
|
||
|
paths = with pkgs; [
|
||
|
cni-plugins
|
||
|
cni-plugin-flannel
|
||
|
];
|
||
|
postBuild = "echo links added";
|
||
|
})
|
||
|
+ "/bin");
|
||
|
};
|
||
|
};
|
||
|
|
||
|
services = {
|
||
|
k3s = {
|
||
|
package = k3s;
|
||
|
enable = true;
|
||
|
role = "server";
|
||
|
serverAddr = "https://10.64.2.1:6443";
|
||
|
extraFlags = concatStringsSep " " [
|
||
|
"--config /run/secrets/k3s"
|
||
|
"--debug"
|
||
|
];
|
||
|
};
|
||
|
};
|
||
|
}
|