blob: ee4990cc35f4dc56ad976243f8498fa9ab1234d5 (
plain) (
tree)
|
|
{ depot, pkgs, ... }:
let
inherit (depot.users) wpcarro;
name = "diogenes";
domainName = "billandhiscomputer.com";
in wpcarro.terraform.googleCloudVM {
project = "wpcarros-infrastructure";
name = "diogenes";
region = "us-central1";
zone = "us-central1-a";
# DNS configuration
extraConfig = {
# billandhiscomputer.com
resource.google_dns_managed_zone."${name}" = {
inherit name;
dns_name = "${domainName}.";
};
resource.google_dns_record_set."${name}" = {
name = "${domainName}.";
type = "A";
ttl = 300; # 5m
managed_zone = "\${google_dns_managed_zone.${name}.name}";
rrdatas = ["\${google_compute_instance.${name}.network_interface[0].access_config[0].nat_ip}"];
};
resource.google_compute_instance."${name}" = {
network_interface.access_config = {
public_ptr_domain_name = "${domainName}.";
};
};
# monsterpoker.app
resource.google_dns_managed_zone."monsterpoker" = {
name = "monsterpoker";
dns_name = "monsterpoker.app.";
};
resource.google_dns_record_set."monsterpoker" = {
name = "monsterpoker.app.";
type = "A";
ttl = 300; # 5m
managed_zone = "\${google_dns_managed_zone.monsterpoker.name}";
rrdatas = ["\${google_compute_instance.${name}.network_interface[0].access_config[0].nat_ip}"];
};
};
configuration = {
imports = [
"${depot.path}/ops/modules/quassel.nix"
];
networking = {
firewall.allowedTCPPorts = [
22 # ssh
80 # http
443 # https
6698 # quassel
];
firewall.allowedUDPPortRanges = [
{ from = 60000; to = 61000; } # mosh
];
};
# Use the TVL binary cache
tvl.cache.enable = true;
users = {
mutableUsers = true;
users = {
root = {
openssh.authorizedKeys.keys = wpcarro.keys.all;
};
wpcarro = {
isNormalUser = true;
extraGroups = [ "wheel" "quassel" ];
openssh.authorizedKeys.keys = wpcarro.keys.all;
shell = pkgs.fish;
};
# This is required so that quasselcore can read the ACME cert in
# /var/lib/acme, which is only available to user=acme or group=nginx.
quassel.extraGroups = [ "nginx" ];
};
};
security = {
acme = {
acceptTerms = true;
email = "wpcarro@gmail.com";
};
sudo.wheelNeedsPassword = false;
};
programs = wpcarro.common.programs // {
mosh.enable = true;
};
# I won't have an Emacs server running on diogenes, and I'll likely be in an
# SSH session from within vterm. As such, Vim is one of the few editors that
# I tolerably navigate this way.
environment.variables = {
EDITOR = "vim";
};
environment.systemPackages = wpcarro.common.shell-utils;
services = wpcarro.common.services // {
# TODO(wpcarro): Re-enable this when rebuild-system better supports
# terraform deployments.
# depot.auto-deploy = {
# enable = true;
# interval = "1h";
# };
# TODO(wpcarro): Re-enable this after debugging ACME and NXDOMAIN.
depot.quassel = {
enable = true;
acmeHost = domainName;
bindAddresses = [
"0.0.0.0"
];
};
journaldriver = {
enable = true;
logStream = "home";
googleCloudProject = "wpcarros-infrastructure";
applicationCredentials = "/etc/gcp/key.json";
};
nginx = {
enable = true;
enableReload = true;
recommendedTlsSettings = true;
recommendedGzipSettings = true;
recommendedProxySettings = true;
# for journaldriver
commonHttpConfig = ''
log_format json_combined escape=json
'{'
'"remote_addr":"$remote_addr",'
'"method":"$request_method",'
'"host":"$host",'
'"uri":"$request_uri",'
'"status":$status,'
'"request_size":$request_length,'
'"response_size":$body_bytes_sent,'
'"response_time":$request_time,'
'"referrer":"$http_referer",'
'"user_agent":"$http_user_agent"'
'}';
access_log syslog:server=unix:/dev/log,nohostname json_combined;
'';
virtualHosts = {
"${domainName}" = {
addSSL = true;
enableACME = true;
root = wpcarro.website.root;
};
"monsterpoker.app" = {
addSSL = true;
enableACME = true;
root = wpcarro.clients.monsterpoker;
};
};
};
};
system.stateVersion = "21.11";
};
}
|