about summary refs log blame commit diff
path: root/users/wpcarro/nixos/diogenes/default.nix
blob: ee4990cc35f4dc56ad976243f8498fa9ab1234d5 (plain) (tree)
1
2
3
4
5
6
7
8
9
10
11
12
13
14


                     
                                









                                        
                            



                                                  
 
                                                
                              




                                                                                                     


                                                  
                                                  

        













                                                                                                     
    
 















                                             
 

                              
 
             










                                                         


                                                                             

        
 




                                    
 
                                      

      

                                           

      




                                                                                

      










                                                                         















































                                                                          




                                                

          
      
 

                                  
 
{ depot, pkgs, ... }:

let
  inherit (depot.users) wpcarro;
  name = "diogenes";
  domainName = "billandhiscomputer.com";
in wpcarro.terraform.googleCloudVM {
  project = "wpcarros-infrastructure";
  name = "diogenes";
  region = "us-central1";
  zone = "us-central1-a";

  # DNS configuration
  extraConfig = {
    # billandhiscomputer.com
    resource.google_dns_managed_zone."${name}" = {
      inherit name;
      dns_name = "${domainName}.";
    };

    resource.google_dns_record_set."${name}" = {
      name = "${domainName}.";
      type = "A";
      ttl = 300; # 5m
      managed_zone = "\${google_dns_managed_zone.${name}.name}";
      rrdatas = ["\${google_compute_instance.${name}.network_interface[0].access_config[0].nat_ip}"];
    };

    resource.google_compute_instance."${name}" = {
      network_interface.access_config = {
        public_ptr_domain_name = "${domainName}.";
      };
    };

    # monsterpoker.app
    resource.google_dns_managed_zone."monsterpoker" = {
      name = "monsterpoker";
      dns_name = "monsterpoker.app.";
    };

    resource.google_dns_record_set."monsterpoker" = {
      name = "monsterpoker.app.";
      type = "A";
      ttl = 300; # 5m
      managed_zone = "\${google_dns_managed_zone.monsterpoker.name}";
      rrdatas = ["\${google_compute_instance.${name}.network_interface[0].access_config[0].nat_ip}"];
    };
  };

  configuration = {
    imports = [
      "${depot.path}/ops/modules/quassel.nix"
    ];

    networking = {
      firewall.allowedTCPPorts = [
        22   # ssh
        80   # http
        443  # https
        6698 # quassel
      ];
      firewall.allowedUDPPortRanges = [
        { from = 60000; to = 61000; } # mosh
      ];
    };

    # Use the TVL binary cache
    tvl.cache.enable = true;

    users = {
      mutableUsers = true;
      users = {
        root = {
          openssh.authorizedKeys.keys = wpcarro.keys.all;
        };
        wpcarro = {
          isNormalUser = true;
          extraGroups = [ "wheel" "quassel" ];
          openssh.authorizedKeys.keys = wpcarro.keys.all;
          shell = pkgs.fish;
        };
        # This is required so that quasselcore can read the ACME cert in
        # /var/lib/acme, which is only available to user=acme or group=nginx.
        quassel.extraGroups = [ "nginx" ];
      };
    };

    security = {
      acme = {
        acceptTerms = true;
        email = "wpcarro@gmail.com";
      };

      sudo.wheelNeedsPassword = false;
    };

    programs = wpcarro.common.programs // {
      mosh.enable = true;
    };

    # I won't have an Emacs server running on diogenes, and I'll likely be in an
    # SSH session from within vterm. As such, Vim is one of the few editors that
    # I tolerably navigate this way.
    environment.variables = {
      EDITOR = "vim";
    };

    environment.systemPackages = wpcarro.common.shell-utils;

    services = wpcarro.common.services // {
      # TODO(wpcarro): Re-enable this when rebuild-system better supports
      # terraform deployments.
      # depot.auto-deploy = {
      #   enable = true;
      #   interval = "1h";
      # };

      # TODO(wpcarro): Re-enable this after debugging ACME and NXDOMAIN.
      depot.quassel = {
        enable = true;
        acmeHost = domainName;
        bindAddresses = [
          "0.0.0.0"
        ];
      };

      journaldriver = {
        enable = true;
        logStream = "home";
        googleCloudProject = "wpcarros-infrastructure";
        applicationCredentials = "/etc/gcp/key.json";
      };

      nginx = {
        enable = true;
        enableReload = true;

        recommendedTlsSettings = true;
        recommendedGzipSettings = true;
        recommendedProxySettings = true;

        # for journaldriver
        commonHttpConfig = ''
          log_format json_combined escape=json
          '{'
              '"remote_addr":"$remote_addr",'
              '"method":"$request_method",'
              '"host":"$host",'
              '"uri":"$request_uri",'
              '"status":$status,'
              '"request_size":$request_length,'
              '"response_size":$body_bytes_sent,'
              '"response_time":$request_time,'
              '"referrer":"$http_referer",'
              '"user_agent":"$http_user_agent"'
          '}';

          access_log syslog:server=unix:/dev/log,nohostname json_combined;
        '';

        virtualHosts = {
          "${domainName}" = {
            addSSL = true;
            enableACME = true;
            root = wpcarro.website.root;
          };
          "monsterpoker.app" = {
            addSSL = true;
            enableACME = true;
            root = wpcarro.clients.monsterpoker;
          };
        };
      };
    };

    system.stateVersion = "21.11";
  };
}