dotfiles/nix/systems/heater.nix
Magic_RB 534855a172
Disable Nomad in heater, services go crazy
Signed-off-by: Magic_RB <magic_rb@redalder.org>
2021-08-19 18:24:38 +02:00

229 lines
6.3 KiB
Nix

inputs: {
system = "x86_64-linux";
modules = [
../nixos-modules/default.nix
inputs.home-manager.nixosModules.home-manager
({ pkgs, config, ... }:
let
inherit (config.magic_rb.pkgs) nixpkgs-unstable;
in
{
home-manager.users."main" =
{ ... }:
{
imports = [ ../home-manager/modules/default.nix ];
magic_rb = {
pins = {
inherit (inputs)
nixpkgs
nixpkgs-unstable
nixpkgs-master
home-manager
nixng
fenix;
};
config = {
allowUnfree = true;
};
overlays = inputs.self.overlays;
programs = {
alacritty.enable = true;
bash = {
enable = true;
enableDirenv = true;
};
shh.enable = true;
emacs.enable = true;
xmonad.enable = true;
gpg.enable = true;
multimc.enable = true;
};
packageCollections = {
"3dPrinting".enable = true;
cmdline.enable = true;
graphical.enable = true;
rust.enable = true;
webdev.enable = true;
wine.enable = true;
};
};
home.stateVersion = "20.09";
};
magic_rb = {
grub = {
enable = true;
efi.enable = true;
};
xserver = {
enable = true;
gpu = "nvidia";
xmonad = true;
setSkLayout = true;
emacsCtrl = true;
qwertyNeo2 = true;
};
pins = {
inherit (inputs)
nixpkgs
nixpkgs-unstable
nixpkgs-master
home-manager
nixng
fenix;
};
config = {
allowUnfree = true;
};
overlays = inputs.self.overlays;
erase-my-darlings = {
enable = true;
snapshot = "heater-zpool/local/root@blank";
};
hardware.heater = true;
sshdEmacs.enable = true;
flakes.enable = true;
pulseaudio.enable = true;
};
programs.steam.enable = true;
services.vault-agent = {
enable = true;
settings = {
vault = {
address = "https://vault.in.redalder.org:8200";
client_cert = "/etc/vault-agent/client.crt";
client_key = "/etc/vault-agent/client.key";
};
auto_auth = {
method = [
{
"cert" = {
name = "system-heater";
};
}
];
};
template = [
{
source = pkgs.writeText "wg0.key.tpl" ''
{{ with secret "kv/data/systems/heater/wireguard" }}{{ .Data.data.private_key }}{{ end }}
'';
destination = "/var/secrets/wg0.key";
}
{
source = pkgs.writeText "nomad.hcl.tpl" ''
client {
enabled = true
servers = [ "blowhole.in.redalder.org:4647" ]
options {
docker.privileged.enabled = "true"
}
cni_path = "${nixpkgs-unstable.cni-plugins}/bin"
}
{{ with secret "kv/data/systems/heater/nomad" }}
vault {
enabled = true
address = "https://vault.in.redalder.org:8200"
token = "{{ .Data.data.vault_token }}"
allow_unauthenticated = true
create_from_role = "nomad-cluster"
}
consul {
address = "blowhole.in.redalder.org:8500"
token = "{{ .Data.data.consul_token }}"
}
{{ end }}
disable_update_check = true
datacenter = "homelab-1"
data_dir = "/var/lib/nomad"
'';
destination = "/var/secrets/nomad.hcl";
perms = "0644";
}
];
};
};
services.sshd.enable = true;
services.nomad = {
enable = false; # Consul conflict, services go yeet
enableDocker = false;
dropPrivileges = false;
extraPackages = [ nixpkgs-unstable.consul ];
package = nixpkgs-unstable.nomad;
extraSettingsPaths = [ "/var/secrets/nomad.hcl" ];
};
networking = {
firewall = {
allowedUDPPorts = [ 6666 ];
allowedTCPPorts = [ 22 ];
};
wireguard.interfaces = {
wg0 = {
ips = [ "10.64.0.3/24" ];
listenPort = 6666;
privateKeyFile = "/var/secrets/wg0.key";
peers = [
{
publicKey = "h4g6vWjOB6RS0NbrP/Kvb2CZeutm/F+ZfDbJmEd1Dgk=";
allowedIPs = [ "10.64.0.0/24" ];
endpoint = "redalder.org:6666";
persistentKeepalive = 25;
}
];
};
};
};
virtualisation.podman = {
enable = true;
dockerCompat = true;
};
})
] ++ [
({ pkgs, ... }: {
networking = {
hostName = "heater";
useDHCP = false;
interfaces.enp3s0.useDHCP = true;
firewall.enable = false;
hostId = "3457b383";
};
time.timeZone = "Europe/Bratislava";
system.stateVersion = "20.09";
security.pki.certificates = [ (builtins.readFile ../redalder.org.crt) ];
})
];
}