{ config, pkgs, lib, ... }: { imports = [ ../../modules/common/default.nix ./hardware-configuration.nix ]; config = { system.stateVersion = "22.11"; networking.hostName = "tywin"; networking.domain = "storage.ts.hillion.co.uk"; networking.hostId = "2a9b6df5"; boot.loader.systemd-boot.enable = true; boot.loader.efi.canTouchEfiVariables = true; custom.locations.autoServe = true; ## Tailscale age.secrets."tailscale/tywin.storage.ts.hillion.co.uk".file = ../../secrets/tailscale/tywin.storage.ts.hillion.co.uk.age; custom.tailscale = { enable = true; preAuthKeyFile = config.age.secrets."tailscale/tywin.storage.ts.hillion.co.uk".path; ipv4Addr = "100.115.31.91"; ipv6Addr = "fd7a:115c:a1e0:ab12:4843:cd96:6273:1f5b"; }; ## Filesystems fileSystems."/".options = [ "compress=zstd" ]; boot.supportedFilesystems = [ "zfs" ]; boot.zfs = { forceImportRoot = false; extraPools = [ "data" ]; }; boot.kernelParams = [ "zfs.zfs_arc_max=25769803776" ]; services.zfs.autoScrub = { enable = true; interval = "Tue, 02:00"; }; services.sanoid.enable = true; fileSystems."/mnt/d0".options = [ "x-systemd.mount-timeout=3m" ]; fileSystems."/mnt/d1".options = [ "x-systemd.mount-timeout=3m" ]; fileSystems."/mnt/d2".options = [ "x-systemd.mount-timeout=3m" ]; ## Backups ### Git age.secrets."git/git_backups_ecdsa".file = ../../secrets/git/git_backups_ecdsa.age; age.secrets."git/git_backups_remotes".file = ../../secrets/git/git_backups_remotes.age; custom.backups.git = { enable = true; sshKey = config.age.secrets."git/git_backups_ecdsa".path; reposFile = config.age.secrets."git/git_backups_remotes".path; repos = [ "https://gitea.hillion.co.uk/JakeHillion/nixos.git" ]; }; ## Resilio custom.resilio.enable = true; services.resilio.deviceName = "tywin.storage"; services.resilio.directoryRoot = "/data/users/jake/sync"; services.resilio.storagePath = "/data/users/jake/sync/.sync"; custom.resilio.folders = let folderNames = [ "dad" "joseph" "projects" "resources" "sync" ]; mkFolder = name: { name = name; secret = { name = "resilio/plain/${name}"; file = ../../secrets/resilio/plain/${name}.age; }; }; in builtins.map (mkFolder) folderNames; age.secrets."resilio/restic/128G.key" = { file = ../../secrets/restic/128G.age; owner = "rslsync"; group = "rslsync"; }; services.restic.backups."sync" = { repository = "rest:http://restic.tywin.storage.ts.hillion.co.uk/128G"; user = "rslsync"; passwordFile = config.age.secrets."resilio/restic/128G.key".path; timerConfig = { Persistent = true; OnUnitInactiveSec = "15m"; RandomizedDelaySec = "5m"; }; paths = [ "/data/users/jake/sync" ]; exclude = [ "/data/users/jake/sync/.sync" "/data/users/jake/sync/*/.sync" "/data/users/jake/sync/resources/media/films" "/data/users/jake/sync/resources/media/iso" "/data/users/jake/sync/resources/media/tv" "/data/users/jake/sync/dad/media" ]; }; ## Restic age.secrets."restic/128G.key" = { file = ../../secrets/restic/128G.age; owner = "restic"; group = "restic"; }; age.secrets."restic/1.6T.key" = { file = ../../secrets/restic/1.6T.age; owner = "restic"; group = "restic"; }; services.restic.server = { enable = true; appendOnly = true; extraFlags = [ "--no-auth" ]; dataDir = "/data/backups/restic"; listenAddress = "127.0.0.1:8000"; # TODO: can this be a Unix socket? }; services.caddy = { enable = true; virtualHosts."http://restic.tywin.storage.ts.hillion.co.uk".extraConfig = '' bind ${config.custom.tailscale.ipv4Addr} ${config.custom.tailscale.ipv6Addr} reverse_proxy http://localhost:8000 ''; }; systemd.services.caddy.requires = [ "tailscaled.service" ]; services.restic.backups."prune-128G" = { repository = "/data/backups/restic/128G"; user = "restic"; passwordFile = config.age.secrets."restic/128G.key".path; timerConfig = { Persistent = true; OnCalendar = "02:30"; RandomizedDelaySec = "1h"; }; pruneOpts = [ "--keep-last 48" "--keep-within-hourly 7d" "--keep-within-daily 1m" "--keep-within-weekly 6m" "--keep-within-monthly 24m" ]; }; services.restic.backups."prune-1.6T" = { repository = "/data/backups/restic/1.6T"; user = "restic"; passwordFile = config.age.secrets."restic/1.6T.key".path; timerConfig = { Persistent = true; OnCalendar = "Wed, 02:30"; RandomizedDelaySec = "4h"; }; pruneOpts = [ "--keep-within-daily 14d" "--keep-within-weekly 2m" "--keep-within-monthly 18m" ]; }; ## Chia age.secrets."chia/farmer.key" = { file = ../../secrets/chia/farmer.key.age; owner = "chia"; group = "chia"; }; custom.chia = { enable = true; openFirewall = true; path = "/data/chia"; keyFile = config.age.secrets."chia/farmer.key".path; targetAddress = "xch1tl87mjd9zpugs7qy2ysc3j4qlftqlyjn037jywq6v2y4kp22g74qahn6sw"; plotDirectories = builtins.genList (i: "/mnt/d${toString i}/plots/contract-k32") 3; }; services.sanoid.datasets."data/chia" = { autosnap = true; autoprune = true; hourly = 0; daily = 7; weekly = 12; monthly = 6; }; ## Storj age.secrets."storj/zfs_auth" = { file = ../../secrets/storj/tywin/zfs_auth.age; owner = "storj"; group = "storj"; }; custom.storj = { enable = true; openFirewall = true; email = "jake+storj@hillion.co.uk"; wallet = "0x03cebe2608945D51f0bcE6c5ef70b4948fCEcfEe"; }; custom.storj.instances = let mkStorj = index: { name = "d${toString index}"; value = { configDir = "/mnt/d${toString index}/storj/config"; identityDir = "/mnt/d${toString index}/storj/identity"; serverPort = 28967 + 1 + index; externalAddress = "d${toString index}.tywin.storj.hillion.co.uk:${toString (28967 + 1 + index)}"; consoleAddress = "100.115.31.91:${toString (14002 + 1 + index)}"; storage = "1000GB"; }; }; instances = builtins.genList (x: x) 2; in builtins.listToAttrs (builtins.map mkStorj instances) // { zfs = { configDir = "/data/storj/config"; identityDir = "/data/storj/identity"; storage = "500GB"; consoleAddress = "100.115.31.91:14002"; serverPort = 28967; externalAddress = "zfs.tywin.storj.hillion.co.uk:28967"; authorizationTokenFile = config.age.secrets."storj/zfs_auth".path; }; }; ## Downloads custom.services.downloads = { metadataPath = "/data/downloads/metadata"; downloadCachePath = "/data/downloads/torrents"; filmsPath = "/data/media/films"; tvPath = "/data/media/tv"; }; ## Plex users.users.plex.extraGroups = [ "mediaaccess" ]; services.plex = { enable = true; openFirewall = true; }; ## Firewall networking.firewall.interfaces."tailscale0".allowedTCPPorts = [ 80 # Caddy (restic.tywin.storage.ts.) 14002 # Storj Dashboard (zfs.) 14003 # Storj Dashboard (d0.) 14004 # Storj Dashboard (d1.) ]; }; }