2023-05-20 16:54:50 +01:00
|
|
|
{ config, pkgs, lib, ... }:
|
|
|
|
|
|
|
|
{
|
|
|
|
imports = [
|
|
|
|
../../modules/common/default.nix
|
|
|
|
./hardware-configuration.nix
|
|
|
|
];
|
|
|
|
|
|
|
|
config = {
|
|
|
|
system.stateVersion = "22.11";
|
|
|
|
|
|
|
|
networking.hostName = "tywin";
|
|
|
|
networking.domain = "storage.ts.hillion.co.uk";
|
2023-05-30 20:21:07 +01:00
|
|
|
networking.hostId = "2a9b6df5";
|
2023-05-20 16:54:50 +01:00
|
|
|
|
|
|
|
boot.loader.systemd-boot.enable = true;
|
|
|
|
boot.loader.efi.canTouchEfiVariables = true;
|
|
|
|
|
|
|
|
## Tailscale
|
|
|
|
age.secrets."tailscale/tywin.storage.ts.hillion.co.uk".file = ../../secrets/tailscale/tywin.storage.ts.hillion.co.uk.age;
|
|
|
|
custom.tailscale = {
|
|
|
|
enable = true;
|
|
|
|
preAuthKeyFile = config.age.secrets."tailscale/tywin.storage.ts.hillion.co.uk".path;
|
2023-07-01 18:51:48 +01:00
|
|
|
ipv4Addr = "100.115.31.91";
|
|
|
|
ipv6Addr = "fd7a:115c:a1e0:ab12:4843:cd96:6273:1f5b";
|
2023-05-20 16:54:50 +01:00
|
|
|
};
|
|
|
|
|
2023-05-30 20:21:07 +01:00
|
|
|
## Filesystems
|
2023-05-20 16:54:50 +01:00
|
|
|
fileSystems."/".options = [ "compress=zstd" ];
|
2023-06-17 11:28:17 +01:00
|
|
|
|
2023-05-30 20:21:07 +01:00
|
|
|
boot.supportedFilesystems = [ "zfs" ];
|
|
|
|
boot.zfs = {
|
|
|
|
forceImportRoot = false;
|
|
|
|
extraPools = [ "data" ];
|
|
|
|
};
|
2023-06-17 11:28:17 +01:00
|
|
|
boot.kernelParams = [ "zfs.zfs_arc_max=25769803776" ];
|
2023-05-30 21:18:12 +01:00
|
|
|
|
2023-07-01 14:28:49 +01:00
|
|
|
services.zfs.autoScrub = {
|
|
|
|
enable = true;
|
|
|
|
interval = "Tue, 02:00";
|
|
|
|
};
|
2023-07-01 17:30:49 +01:00
|
|
|
services.sanoid.enable = true;
|
2023-07-01 14:28:49 +01:00
|
|
|
|
2023-06-16 11:57:11 +01:00
|
|
|
fileSystems."/mnt/d0".options = [ "x-systemd.mount-timeout=3m" ];
|
2023-07-15 00:11:07 +01:00
|
|
|
fileSystems."/mnt/d1".options = [ "x-systemd.mount-timeout=3m" ];
|
2023-06-16 11:57:11 +01:00
|
|
|
|
2023-07-02 22:43:53 +01:00
|
|
|
## Backups
|
|
|
|
### Git
|
|
|
|
age.secrets."git/git_backups_ecdsa".file = ../../secrets/git/git_backups_ecdsa.age;
|
|
|
|
age.secrets."git/git_backups_remotes".file = ../../secrets/git/git_backups_remotes.age;
|
|
|
|
custom.backups.git = {
|
|
|
|
enable = true;
|
|
|
|
sshKey = config.age.secrets."git/git_backups_ecdsa".path;
|
|
|
|
reposFile = config.age.secrets."git/git_backups_remotes".path;
|
|
|
|
repos = [ "https://gitea.hillion.co.uk/JakeHillion/nixos.git" ];
|
|
|
|
};
|
|
|
|
|
2023-05-30 21:18:12 +01:00
|
|
|
## Resilio
|
|
|
|
custom.resilio.enable = true;
|
|
|
|
|
2023-06-08 11:00:30 +01:00
|
|
|
services.resilio.deviceName = "tywin.storage";
|
2023-05-30 21:18:12 +01:00
|
|
|
services.resilio.directoryRoot = "/data/users/jake/sync";
|
|
|
|
services.resilio.storagePath = "/data/users/jake/sync/.sync";
|
|
|
|
|
|
|
|
custom.resilio.folders =
|
|
|
|
let
|
|
|
|
folderNames = [
|
|
|
|
"dad"
|
|
|
|
"joseph"
|
|
|
|
"projects"
|
|
|
|
"resources"
|
|
|
|
"sync"
|
|
|
|
];
|
|
|
|
mkFolder = name: {
|
|
|
|
name = name;
|
|
|
|
secret = {
|
|
|
|
name = "resilio/plain/${name}";
|
|
|
|
file = ../../secrets/resilio/plain/${name}.age;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
in
|
|
|
|
builtins.map (mkFolder) folderNames;
|
2023-05-11 21:12:57 +01:00
|
|
|
|
2023-07-08 15:50:46 +01:00
|
|
|
age.secrets."resilio/restic/128G.key" = {
|
|
|
|
file = ../../secrets/restic/128G.age;
|
|
|
|
owner = "rslsync";
|
|
|
|
group = "rslsync";
|
|
|
|
};
|
|
|
|
services.restic.backups."sync" = {
|
|
|
|
repository = "rest:http://restic.tywin.storage.ts.hillion.co.uk/128G";
|
|
|
|
user = "rslsync";
|
|
|
|
passwordFile = config.age.secrets."resilio/restic/128G.key".path;
|
|
|
|
|
|
|
|
timerConfig = {
|
|
|
|
Persistent = true;
|
|
|
|
OnUnitInactiveSec = "15m";
|
|
|
|
RandomizedDelaySec = "5m";
|
|
|
|
};
|
|
|
|
|
|
|
|
paths = [ "/data/users/jake/sync" ];
|
|
|
|
exclude = [
|
|
|
|
"/data/users/jake/sync/.sync"
|
|
|
|
"/data/users/jake/sync/*/.sync"
|
|
|
|
|
|
|
|
"/data/users/jake/sync/resources/media/films"
|
|
|
|
"/data/users/jake/sync/resources/media/iso"
|
|
|
|
"/data/users/jake/sync/resources/media/tv"
|
|
|
|
|
|
|
|
"/data/users/jake/sync/dad/media"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2023-07-01 18:51:48 +01:00
|
|
|
## Restic
|
|
|
|
age.secrets."restic/128G.key" = {
|
|
|
|
file = ../../secrets/restic/128G.age;
|
|
|
|
owner = "restic";
|
|
|
|
group = "restic";
|
|
|
|
};
|
|
|
|
age.secrets."restic/1.6T.key" = {
|
|
|
|
file = ../../secrets/restic/1.6T.age;
|
|
|
|
owner = "restic";
|
|
|
|
group = "restic";
|
|
|
|
};
|
|
|
|
|
|
|
|
services.restic.server = {
|
|
|
|
enable = true;
|
|
|
|
appendOnly = true;
|
|
|
|
extraFlags = [ "--no-auth" ];
|
|
|
|
dataDir = "/data/backups/restic";
|
|
|
|
listenAddress = "127.0.0.1:8000"; # TODO: can this be a Unix socket?
|
|
|
|
};
|
|
|
|
services.caddy = {
|
|
|
|
enable = true;
|
|
|
|
virtualHosts."http://restic.tywin.storage.ts.hillion.co.uk".extraConfig = ''
|
|
|
|
bind ${config.custom.tailscale.ipv4Addr} ${config.custom.tailscale.ipv6Addr}
|
|
|
|
reverse_proxy http://localhost:8000
|
|
|
|
'';
|
|
|
|
};
|
2023-07-08 15:50:31 +01:00
|
|
|
systemd.services.caddy.requires = [ "tailscaled.service" ];
|
|
|
|
|
2023-07-01 18:51:48 +01:00
|
|
|
services.restic.backups."prune-128G" = {
|
|
|
|
repository = "/data/backups/restic/128G";
|
|
|
|
user = "restic";
|
|
|
|
passwordFile = config.age.secrets."restic/128G.key".path;
|
|
|
|
|
|
|
|
timerConfig = {
|
|
|
|
Persistent = true;
|
|
|
|
OnCalendar = "02:30";
|
|
|
|
RandomizedDelaySec = "1h";
|
|
|
|
};
|
|
|
|
|
|
|
|
pruneOpts = [
|
2023-07-02 22:43:53 +01:00
|
|
|
"--keep-last 48"
|
2023-07-01 18:51:48 +01:00
|
|
|
"--keep-within-hourly 7d"
|
|
|
|
"--keep-within-daily 1m"
|
|
|
|
"--keep-within-weekly 6m"
|
|
|
|
"--keep-within-monthly 24m"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
services.restic.backups."prune-1.6T" = {
|
|
|
|
repository = "/data/backups/restic/1.6T";
|
|
|
|
user = "restic";
|
|
|
|
passwordFile = config.age.secrets."restic/1.6T.key".path;
|
|
|
|
|
|
|
|
timerConfig = {
|
|
|
|
Persistent = true;
|
|
|
|
OnCalendar = "Wed, 02:30";
|
|
|
|
RandomizedDelaySec = "4h";
|
|
|
|
};
|
|
|
|
|
|
|
|
pruneOpts = [
|
|
|
|
"--keep-within-daily 14d"
|
|
|
|
"--keep-within-weekly 2m"
|
|
|
|
"--keep-within-monthly 18m"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2023-05-11 21:12:57 +01:00
|
|
|
## Chia
|
|
|
|
age.secrets."chia/farmer.key" = {
|
|
|
|
file = ../../secrets/chia/farmer.key.age;
|
|
|
|
owner = "chia";
|
|
|
|
group = "chia";
|
|
|
|
};
|
|
|
|
custom.chia = {
|
|
|
|
enable = true;
|
2023-06-04 21:36:07 +01:00
|
|
|
openFirewall = true;
|
2023-05-11 21:12:57 +01:00
|
|
|
path = "/data/chia";
|
|
|
|
keyFile = config.age.secrets."chia/farmer.key".path;
|
|
|
|
targetAddress = "xch1tl87mjd9zpugs7qy2ysc3j4qlftqlyjn037jywq6v2y4kp22g74qahn6sw";
|
2023-07-15 00:11:07 +01:00
|
|
|
plotDirectories = builtins.genList (i: "/mnt/d${toString i}/plots/contract-k32") 2;
|
2023-05-11 21:12:57 +01:00
|
|
|
};
|
2023-07-01 17:30:49 +01:00
|
|
|
services.sanoid.datasets."data/chia" = {
|
|
|
|
autosnap = true;
|
|
|
|
autoprune = true;
|
|
|
|
|
|
|
|
hourly = 0;
|
|
|
|
daily = 7;
|
|
|
|
weekly = 12;
|
|
|
|
monthly = 6;
|
|
|
|
};
|
2023-06-11 17:09:10 +01:00
|
|
|
|
|
|
|
## Storj
|
|
|
|
age.secrets."storj/zfs_auth" = {
|
|
|
|
file = ../../secrets/storj/tywin/zfs_auth.age;
|
|
|
|
owner = "storj";
|
|
|
|
group = "storj";
|
|
|
|
};
|
|
|
|
custom.storj = {
|
|
|
|
enable = true;
|
|
|
|
openFirewall = true;
|
|
|
|
email = "jake+storj@hillion.co.uk";
|
|
|
|
wallet = "0x03cebe2608945D51f0bcE6c5ef70b4948fCEcfEe";
|
|
|
|
};
|
2023-06-28 22:12:56 +01:00
|
|
|
|
|
|
|
custom.storj.instances =
|
|
|
|
let
|
|
|
|
mkStorj = index: {
|
|
|
|
name = "d${toString index}";
|
|
|
|
value = {
|
|
|
|
configDir = "/mnt/d${toString index}/storj/config";
|
|
|
|
identityDir = "/mnt/d${toString index}/storj/identity";
|
|
|
|
|
|
|
|
serverPort = 28967 + 1 + index;
|
|
|
|
externalAddress = "d${toString index}.tywin.storj.hillion.co.uk:${toString (28967 + 1 + index)}";
|
|
|
|
consoleAddress = "100.115.31.91:${toString (14002 + 1 + index)}";
|
|
|
|
|
|
|
|
storage = "1000GB";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
instances = builtins.genList (x: x) 1;
|
|
|
|
in
|
|
|
|
builtins.listToAttrs (builtins.map mkStorj instances) // {
|
|
|
|
zfs = {
|
|
|
|
configDir = "/data/storj/config";
|
|
|
|
identityDir = "/data/storj/identity";
|
|
|
|
storage = "500GB";
|
|
|
|
consoleAddress = "100.115.31.91:14002";
|
|
|
|
serverPort = 28967;
|
|
|
|
externalAddress = "zfs.tywin.storj.hillion.co.uk:28967";
|
|
|
|
authorizationTokenFile = config.age.secrets."storj/zfs_auth".path;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2023-07-01 18:51:48 +01:00
|
|
|
networking.firewall.interfaces."tailscale0".allowedTCPPorts = [
|
|
|
|
80 # Caddy (restic.tywin.storage.ts.)
|
|
|
|
14002 # Storj Dashboard (zfs.)
|
|
|
|
14003 # Storj Dashboard (d0.)
|
|
|
|
];
|
2023-05-20 16:54:50 +01:00
|
|
|
};
|
|
|
|
}
|