{ config, lib, pkgs, ... }: with import ; let external-ip = config.krebs.build.host.nets.internet.ip4.addr; ext-if = config.makefu.server.primary-itf; in { imports = [ ./hardware-config.nix # # # # Security # Tools # services # # network # # buildbot ## Web # { services.taskserver.enable = true; services.taskserver.fqdn = config.krebs.build.host.name; services.taskserver.listenHost = "::"; services.taskserver.organisations.home.users = [ "makefu" ]; networking.firewall.extraCommands = '' iptables -A INPUT -i retiolum -p tcp --dport 53589 -j ACCEPT ip6tables -A INPUT -i retiolum -p tcp --dport 53589 -j ACCEPT ''; } # # { # ncdc environment.systemPackages = [ pkgs.ncdc ]; networking.firewall = { allowedUDPPorts = [ 51411 ]; allowedTCPPorts = [ 51411 ]; }; } # # Temporary: # #{ # services.dockerRegistry.enable = true; # networking.firewall.allowedTCPPorts = [ 8443 ]; # services.nginx.virtualHosts."euer.krebsco.de" = { # forceSSL = true; # enableACME = true; # extraConfig = '' # client_max_body_size 1000M; # ''; # locations."/".proxyPass = "http://localhost:5000"; # }; #} { # wireguard server # opkg install wireguard luci-proto-wireguard # TODO: networking.nat # boot.kernel.sysctl."net.ipv4.ip_forward" = 1; # conf.all.proxy_arp =1 networking.firewall = { allowedUDPPorts = [ 51820 ]; extraCommands = '' iptables -t nat -A POSTROUTING -s 10.244.0.0/24 -o ${ext-if} -j MASQUERADE ''; }; networking.wireguard.interfaces.wg0 = { ips = [ "10.244.0.1/24" ]; listenPort = 51820; privateKeyFile = (toString ) + "/wireguard.key"; allowedIPsAsRoutes = true; peers = [ { # x allowedIPs = [ "10.244.0.2/32" ]; publicKey = "fe5smvKVy5GAn7EV4w4tav6mqIAKhGWQotm7dRuRt1g="; } { # vbob allowedIPs = [ "10.244.0.3/32" ]; publicKey = "Lju7EsCu1OWXhkhdNR7c/uiN60nr0TUPHQ+s8ULPQTw="; } { # x-test allowedIPs = [ "10.244.0.4/32" ]; publicKey = "vZ/AJpfDLJyU3DzvYeW70l4FNziVgSTumA89wGHG7XY="; } { # work-router allowedIPs = [ "10.244.0.5/32" ]; publicKey = "QJMwwYu/92koCASbHnR/vqe/rN00EV6/o7BGwLockDw="; } { # workr allowedIPs = [ "10.244.0.6/32" ]; publicKey = "OFhCF56BrV9tjqW1sxqXEKH/GdqamUT1SqZYSADl5GA="; } ]; }; } { # iperf3 networking.firewall.allowedUDPPorts = [ 5201 ]; networking.firewall.allowedTCPPorts = [ 5201 ]; } ]; makefu.dl-dir = "/var/download"; services.openssh.hostKeys = [ { bits = 4096; path = (toString ); type = "rsa"; } { path = (toString ); type = "ed25519"; } ]; ###### stable services.nginx.virtualHosts.cgit.serverAliases = [ "cgit.euer.krebsco.de" ]; krebs.build.host = config.krebs.hosts.gum; krebs.tinc.retiolum = { extraConfig = '' ListenAddress = ${external-ip} 53 ListenAddress = ${external-ip} 655 ListenAddress = ${external-ip} 21031 ''; connectTo = [ "muhbaasu" "tahoe" "flap" "wry" "ni" "fastpoke" "prism" "dishfire" "echelon" "cloudkrebs" ]; }; # access users.users = { root.openssh.authorizedKeys.keys = [ config.krebs.users.makefu-omo.pubkey ]; makefu.openssh.authorizedKeys.keys = [ config.krebs.users.makefu-vbob.pubkey config.krebs.users.makefu-bob.pubkey ]; }; # Chat environment.systemPackages = with pkgs;[ weechat bepasty-client-cli get tmux ]; services.bitlbee = { enable = true; libpurple_plugins = [ pkgs.telegram-purple ]; }; # Hardware # Network networking = { firewall = { allowPing = true; logRefusedConnections = false; allowedTCPPorts = [ # smtp 25 # http 80 443 # httptunnel 8080 8443 # tinc 655 # tinc-shack 21032 # tinc-retiolum 21031 # taskserver 53589 # temp vnc 18001 # temp reverseshell 31337 ]; allowedUDPPorts = [ # tinc 655 53 # tinc-retiolum 21031 # tinc-shack 21032 ]; }; nameservers = [ "8.8.8.8" ]; }; users.users.makefu.extraGroups = [ "download" "nginx" ]; }