summaryrefslogtreecommitdiff
path: root/modules/nixos/server
diff options
context:
space:
mode:
authorseth <[email protected]>2023-10-01 10:41:09 -0400
committerseth <[email protected]>2023-10-01 10:49:46 -0400
commita8630322f77dbb7be4810099a42352b9278996a1 (patch)
treeb8df66a7e5b9d8c31b27a4a9b357ff7e4b9d418f /modules/nixos/server
parent30f55e656d344e017f66ecbae8eb27cf13ba53bb (diff)
treewide!: flatten to parts/ layout
Diffstat (limited to 'modules/nixos/server')
-rw-r--r--modules/nixos/server/acme.nix26
-rw-r--r--modules/nixos/server/default.nix47
-rw-r--r--modules/nixos/server/secrets.nix25
-rw-r--r--modules/nixos/server/services/cloudflared.nix41
-rw-r--r--modules/nixos/server/services/default.nix7
-rw-r--r--modules/nixos/server/services/hercules.nix57
-rw-r--r--modules/nixos/server/services/promtail.nix47
7 files changed, 0 insertions, 250 deletions
diff --git a/modules/nixos/server/acme.nix b/modules/nixos/server/acme.nix
deleted file mode 100644
index 56a81fa..0000000
--- a/modules/nixos/server/acme.nix
+++ /dev/null
@@ -1,26 +0,0 @@
-{
- config,
- lib,
- self,
- ...
-}: let
- cfg = config.server.acme;
- inherit (lib) mkEnableOption mkIf;
-in {
- options.server.acme = {
- enable = mkEnableOption "acme";
- };
-
- config = mkIf cfg.enable {
- age.secrets.cloudflareApiKey.file = "${self}/secrets/hosts/${config.networking.hostName}/cloudflareApiKey.age";
-
- security.acme = {
- acceptTerms = true;
- defaults = {
- email = "[email protected]";
- dnsProvider = "cloudflare";
- credentialsFile = config.age.secrets.cloudflareApiKey.path;
- };
- };
- };
-}
diff --git a/modules/nixos/server/default.nix b/modules/nixos/server/default.nix
deleted file mode 100644
index 9866cd0..0000000
--- a/modules/nixos/server/default.nix
+++ /dev/null
@@ -1,47 +0,0 @@
-{
- config,
- lib,
- pkgs,
- nixpkgs,
- ...
-}: let
- cfg = config.server;
- inherit (lib) mkDefault mkEnableOption mkIf;
-in {
- options.server.enable = mkEnableOption "enable server configuration";
-
- imports = [
- ./acme.nix
- ./secrets.nix
- ./services
- ];
-
- config = mkIf cfg.enable {
- _module.args.unstable = nixpkgs.legacyPackages.${pkgs.system};
-
- base = {
- enable = true;
- documentation.enable = false;
- defaultPackages.enable = false;
- networking.enable = false;
- };
-
- nix = {
- gc = {
- dates = "*-*-1,5,9,13,17,21,25,29 00:00:00";
- options = "-d --delete-older-than 2d";
- };
-
- settings.allowed-users = [config.networking.hostName];
- };
-
- programs = {
- git.enable = mkDefault true;
- vim.defaultEditor = mkDefault true;
- };
-
- security = {
- pam.enableSSHAgentAuth = mkDefault true;
- };
- };
-}
diff --git a/modules/nixos/server/secrets.nix b/modules/nixos/server/secrets.nix
deleted file mode 100644
index 62654f3..0000000
--- a/modules/nixos/server/secrets.nix
+++ /dev/null
@@ -1,25 +0,0 @@
-{
- config,
- lib,
- self,
- ...
-}: let
- cfg = config.server.secrets;
- inherit (lib) mkEnableOption mkIf;
-in {
- options.server.secrets = {
- enable = mkEnableOption "enable secret management";
- };
-
- config.age = let
- baseDir = "${self}/secrets/hosts/${config.networking.hostName}";
- in
- mkIf cfg.enable {
- identityPaths = ["/etc/age/key"];
-
- secrets = {
- rootPassword.file = "${baseDir}/rootPassword.age";
- userPassword.file = "${baseDir}/userPassword.age";
- };
- };
-}
diff --git a/modules/nixos/server/services/cloudflared.nix b/modules/nixos/server/services/cloudflared.nix
deleted file mode 100644
index 803e7da..0000000
--- a/modules/nixos/server/services/cloudflared.nix
+++ /dev/null
@@ -1,41 +0,0 @@
-{
- config,
- lib,
- self,
- ...
-}: let
- cfg = config.server.services.cloudflared;
- inherit (lib) mkEnableOption mkIf;
-in {
- options.server.services.cloudflared = {
- enable = mkEnableOption "cloudflared";
- };
-
- config = mkIf cfg.enable {
- age.secrets.cloudflaredCreds = {
- file = "${self}/secrets/hosts/${config.networking.hostName}/cloudflaredCreds.age";
- mode = "400";
- owner = "cloudflared";
- group = "cloudflared";
- };
-
- services.cloudflared = {
- enable = true;
- tunnels = {
- "${config.networking.hostName}-nginx" = {
- default = "http_status:404";
-
- ingress = let
- inherit (config.services) nginx;
- in
- lib.genAttrs
- (builtins.attrNames nginx.virtualHosts)
- (_: {service = "http://localhost:${builtins.toString nginx.defaultHTTPListenPort}";});
-
- originRequest.noTLSVerify = true;
- credentialsFile = config.age.secrets.cloudflaredCreds.path;
- };
- };
- };
- };
-}
diff --git a/modules/nixos/server/services/default.nix b/modules/nixos/server/services/default.nix
deleted file mode 100644
index 23f2542..0000000
--- a/modules/nixos/server/services/default.nix
+++ /dev/null
@@ -1,7 +0,0 @@
-_: {
- imports = [
- ./cloudflared.nix
- ./hercules.nix
- ./promtail.nix
- ];
-}
diff --git a/modules/nixos/server/services/hercules.nix b/modules/nixos/server/services/hercules.nix
deleted file mode 100644
index 4833791..0000000
--- a/modules/nixos/server/services/hercules.nix
+++ /dev/null
@@ -1,57 +0,0 @@
-{
- config,
- lib,
- self,
- unstable,
- ...
-}: let
- cfg = config.server.services.hercules-ci;
- inherit (lib) mkEnableOption mkIf;
-in {
- options.server.services.hercules-ci = {
- enable = mkEnableOption "enable hercules-ci";
- secrets.enable = mkEnableOption "manage secrets for hercules-ci";
- };
-
- config = mkIf cfg.enable {
- age.secrets = let
- baseDir = "${self}/secrets/hosts/${config.networking.hostName}";
- hercArgs = {
- mode = "400";
- owner = "hercules-ci-agent";
- group = "hercules-ci-agent";
- };
- in
- mkIf cfg.secrets.enable {
- binaryCache =
- {
- file = "${baseDir}/binaryCache.age";
- }
- // hercArgs;
-
- clusterToken =
- {
- file = "${baseDir}/clusterToken.age";
- }
- // hercArgs;
-
- secretsJson =
- {
- file = "${baseDir}/secretsJson.age";
- }
- // hercArgs;
- };
-
- services = {
- hercules-ci-agent = {
- enable = true;
- package = unstable.hercules-ci-agent;
- settings = {
- binaryCachesPath = config.age.secrets.binaryCache.path;
- clusterJoinTokenPath = config.age.secrets.clusterToken.path;
- secretsJsonPath = config.age.secrets.secretsJson.path;
- };
- };
- };
- };
-}
diff --git a/modules/nixos/server/services/promtail.nix b/modules/nixos/server/services/promtail.nix
deleted file mode 100644
index 63faf15..0000000
--- a/modules/nixos/server/services/promtail.nix
+++ /dev/null
@@ -1,47 +0,0 @@
-{
- config,
- lib,
- ...
-}: let
- cfg = config.server.services.promtail;
- inherit (lib) mkEnableOption mkIf mkOption types;
-in {
- options.server.services.promtail = {
- enable = mkEnableOption "enable promtail";
-
- clients = mkOption {
- type = types.listOf types.attrs;
- default = [{}];
- description = "clients for promtail";
- };
- };
-
- config.services.promtail = mkIf cfg.enable {
- enable = true;
- configuration = {
- inherit (cfg) clients;
- server.disable = true;
-
- scrape_configs = [
- {
- job_name = "journal";
-
- journal = {
- max_age = "12h";
- labels = {
- job = "systemd-journal";
- host = "${config.networking.hostName}";
- };
- };
-
- relabel_configs = [
- {
- source_labels = ["__journal__systemd_unit"];
- target_label = "unit";
- }
- ];
- }
- ];
- };
- };
-}