nix-dotfiles/systems/palatine-hill/configuration.nix

341 lines
9.1 KiB
Nix
Raw Normal View History

{
config,
pkgs,
lib,
...
}:
let
bootkey = key: { "/crypto/keys/${key}" = /crypto/keys/${key}; };
zfskeys = [
"zfs-attic-key"
"zfs-backup-key"
"zfs-calibre-key"
"zfs-db-key"
"zfs-docker-key"
"zfs-games-key"
"zfs-hydra-key"
"zfs-libvirt-key"
"zfs-main-key"
"zfs-nxtcld-key"
"zfs-torr-key"
"zfs-var-docker-key"
"zfs-nix-store-key"
];
in
{
imports = [ ./networking.nix ];
2024-04-10 18:23:40 -04:00
systemd.services.hydra-notify.serviceConfig.EnvironmentFile =
config.sops.secrets."hydra/environment".path;
programs.git.lfs.enable = false;
nixpkgs.config.packageOverrides = pkgs: {
vaapiIntel = pkgs.vaapiIntel.override { enableHybridCodec = true; };
};
2023-12-26 04:07:18 +01:00
boot = {
zfs.extraPools = [ "ZFS-primary" ];
2023-12-27 10:03:13 +01:00
loader.grub.device = "/dev/sda";
filesystem = "zfs";
useSystemdBoot = true;
kernelParams = [
"i915.force_probe=56a5"
"i915.enable_guc=2"
];
kernel.sysctl = {
"vm.overcommit_memory" = lib.mkForce 1;
"vm.swappiness" = 10;
};
extraModprobeConfig = ''
options zfs zfs_arc_min=82463372083
options zfs zfs_arc_max=192414534860
'';
binfmt.emulatedSystems = [ "aarch64-linux" ];
initrd.secrets = lib.mergeAttrsList (map bootkey zfskeys);
2023-12-26 04:07:18 +01:00
};
2023-12-23 07:39:10 +01:00
2024-02-03 22:00:35 +01:00
nix = {
extraOptions = ''
allowed-uris = github: gitlab: git+https:// git+ssh:// https://
builders-use-substitutes = true
2024-02-03 22:00:35 +01:00
'';
buildMachines = [
{
hostName = "localhost";
maxJobs = 2;
protocol = "ssh-ng";
speedFactor = 2;
systems = [
"x86_64-linux"
"aarch64-linux"
"i686-linux"
];
2024-02-07 00:51:31 +01:00
supportedFeatures = [
"kvm"
"nixos-test"
"big-parallel"
"benchmark"
];
}
];
2024-02-03 22:00:35 +01:00
};
2024-02-02 06:31:40 +01:00
2024-02-01 05:24:04 +01:00
hardware = {
enableAllFirmware = true;
opengl = {
enable = true;
extraPackages = with pkgs; [
intel-media-driver # LIBVA_DRIVER_NAME=iHD
vaapiIntel # LIBVA_DRIVER_NAME=i965 (older but works better for Firefox/Chromium)
vaapiVdpau
libvdpau-va-gl
intel-compute-runtime
intel-media-sdk
];
};
};
2024-04-18 17:53:15 -04:00
virtualisation.docker.daemon.settings.data-root = "/var/lib/docker2";
2023-12-23 07:39:10 +01:00
environment.systemPackages = with pkgs; [
attic-client
attic
docker-compose
jellyfin-ffmpeg
];
2023-12-23 07:39:10 +01:00
services = {
samba.enable = true;
nfs.server.enable = true;
openssh.ports = [ 666 ];
smartd.enable = true;
zfs = {
trim.enable = true;
autoScrub.enable = true;
};
sanoid = {
enable = true;
datasets = {
"ZFS-primary/attic".useTemplate = [ "nix-prod" ];
"ZFS-primary/backups".useTemplate = [ "production" ];
"ZFS-primary/calibre".useTemplate = [ "production" ];
"ZFS-primary/db".useTemplate = [ "production" ];
"ZFS-primary/docker".useTemplate = [ "production" ];
"ZFS-primary/hydra".useTemplate = [ "nix-prod" ];
"ZFS-primary/nextcloud".useTemplate = [ "production" ];
"ZFS-primary/vardocker".useTemplate = [ "production" ];
"ZFS-primary/games" = {
useTemplate = [ "games" ];
recursive = true;
processChildrenOnly = true;
};
};
templates = {
# full resiliency
production = {
frequently = 0;
hourly = 36;
daily = 30;
monthly = 6;
yearly = 3;
autosnap = true;
autoprune = true;
};
# some resiliency, but not much
# common option for things like nix store and attic where there is
# already a lot of resiliency built in
nix-prod = {
frequently = 4;
hourly = 24;
daily = 7;
};
# much shorter lived than others
games = {
frequently = 6;
hourly = 36;
daily = 3;
autosnap = true;
autoprune = true;
};
2024-05-28 11:32:37 -04:00
};
};
2024-02-01 05:24:04 +01:00
postgresql = {
enable = true;
enableJIT = true;
2024-02-02 04:25:10 +01:00
identMap = ''
# ArbitraryMapName systemUser DBUser
superuser_map root postgres
superuser_map alice postgres
# Let other names login as themselves
superuser_map /^(.*)$ \1
'';
ensureDatabases = [ "atticd" ];
ensureUsers = [
{
name = "atticd";
ensureDBOwnership = true;
}
];
# initialScript = config.sops.secrets."postgres/init".path;
2024-02-01 05:24:04 +01:00
upgrade = {
enable = true;
stopServices = [
"hydra-evaluator"
"hydra-init"
"hydra-notify"
"hydra-queue-runner"
"hydra-send-stats"
"hydra-server"
"atticd"
];
2024-02-01 05:24:04 +01:00
};
};
hydra = {
enable = true;
hydraURL = "http://localhost:3000";
smtpHost = "alicehuston.xyz";
notificationSender = "hydra@alicehuston.xyz";
gcRootsDir = "/ZFS/ZFS-primary/hydra";
2024-02-01 05:24:04 +01:00
useSubstitutes = true;
buildMachinesFiles = [ ];
2024-02-01 05:24:04 +01:00
minimumDiskFree = 50;
minimumDiskFreeEvaluator = 100;
extraConfig = ''
<git-input>
timeout = 3600
</git-input>
Include ${config.sops.secrets."alice/gha-hydra-token".path}
'';
2024-02-01 05:24:04 +01:00
};
nix-serve = {
enable = true;
secretKeyFile = config.sops.secrets."nix-serve/secret-key".path;
};
atticd = {
enable = true;
credentialsFile = config.sops.secrets."attic/secret-key".path;
settings = {
listen = "[::]:8183";
allowed-hosts = [ "attic.alicehuston.xyz" ];
api-endpoint = "https://attic.alicehuston.xyz";
compression.type = "none"; # let ZFS do the compressing
database = {
url = "postgres://atticd?host=/run/postgresql";
# disable postgres, using SOPS fails at below :(
# https://github.com/zhaofengli/attic/blob/main/nixos/atticd.nix#L57
# url = "sqlite:///ZFS/ZFS-primary/attic/server.db?mode=rwc";
heartbeat = true;
};
storage = {
type = "local";
path = "/ZFS/ZFS-primary/attic/storage";
};
# Warning: If you change any of the values here, it will be
# difficult to reuse existing chunks for newly-uploaded NARs
# since the cutpoints will be different. As a result, the
# deduplication ratio will suffer for a while after the change.
chunking = {
# The minimum NAR size to trigger chunking
#
# If 0, chunking is disabled entirely for newly-uploaded NARs.
# If 1, all NARs are chunked.
nar-size-threshold = 64 * 1024; # 64 KiB
# The preferred minimum size of a chunk, in bytes
min-size = 16 * 1024; # 16 KiB
# The preferred average size of a chunk, in bytes
avg-size = 64 * 1024; # 64 KiB
# The preferred maximum size of a chunk, in bytes
max-size = 256 * 1024; # 256 KiB
};
};
};
};
# borrowing from https://github.com/Shawn8901/nix-configuration/blob/4b8d1d44f47aec60feb58ca7b7ab5ed000506e90/modules/nixos/private/hydra.nix
# configured default webstore for this on root user separately
systemd.services.attic-watch-store = {
wantedBy = [ "multi-user.target" ];
after = [
"network-online.target"
"docker.service"
"atticd.service"
];
requires = [
"network-online.target"
"docker.service"
"atticd.service"
];
description = "Upload all store content to binary cache";
serviceConfig = {
User = "root";
Restart = "always";
ExecStart = "${pkgs.attic}/bin/attic watch-store cache-nix-dot";
};
2023-12-23 07:39:10 +01:00
};
users.users.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ/E/y4UJQid6/0D9babh8l/3jTDJRXqZQ5rPcoxwm1j root@palatine-hill"
];
users.users.hydra-queue-runner.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ/E/y4UJQid6/0D9babh8l/3jTDJRXqZQ5rPcoxwm1j root@palatine-hill"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINHtwvfXg/QFjMAjC4JRjlMAaGPgEfSyhpprNpqbGSJn hydra-queue-runner@palatine-hill"
];
nix.gc.options = "--delete-older-than 150d";
# TODO: revert this once UPS is plugged in
# Not reverting this before the merge as the UPS not being plugged in is
# causing upgrades to fail
power.ups = {
enable = false;
ups."LX1325GU3" = {
driver = "usbhid-ups";
port = "auto";
description = "CyberPower LX1325GU3";
};
users.upsmon = {
passwordFile = config.sops.secrets."upsmon/password".path;
upsmon = "primary";
};
upsmon.monitor."LX1325GU3".user = "upsmon";
};
sops = {
defaultSopsFile = ./secrets.yaml;
secrets = {
"hydra/environment".owner = "hydra";
"nix-serve/secret-key".owner = "root";
"attic/secret-key".owner = "root";
"attic/database-url".owner = "root";
"postgres/init".owner = "postgres";
"alice/gha-hydra-token" = {
sopsFile = ../../users/alice/secrets.yaml;
owner = "hydra";
group = "hydra";
mode = "440";
};
"upsmon/password".owner = "root";
};
};
2023-12-23 08:27:00 +01:00
system.stateVersion = "23.05";
}