rename pi and more shenanigans

This commit is contained in:
chaos 2024-08-31 15:37:15 +01:00
parent 05db80a3ee
commit 856dd0ff51
No known key found for this signature in database
5 changed files with 192 additions and 4 deletions

View file

@ -51,10 +51,10 @@ in rec {
modules = defaultModules ++ [./hetzner-arm/hetzner-arm.nix]; modules = defaultModules ++ [./hetzner-arm/hetzner-arm.nix];
}; };
raspberry = nixosUnstableSystem { raspberry-pi5 = nixosUnstableSystem {
specialArgs = specialArgs =
defaultSpecialArgs; defaultSpecialArgs;
system = "aarch64-linux"; system = "aarch64-linux";
modules = defaultModules ++ [./raspberry/raspberry.nix]; modules = defaultModules ++ [./raspberry-pi5/raspberry-pi5.nix];
}; };
} }

View file

@ -71,7 +71,7 @@
// piBootFwFiles; // piBootFwFiles;
in { in {
imports = with tree; [ imports = with tree; [
presets.nixos.encryptedDrive presets.nixos.serverEncryptedDrive
]; ];
boot = { boot = {
@ -81,6 +81,11 @@ in {
"8250.nr_uarts=11" "8250.nr_uarts=11"
"console=ttyAMA10,115200" "console=ttyAMA10,115200"
"console=tty0" "console=tty0"
"ip=192.168.178.26::192.168.178.1:255.255.255.0:raspberry:end0:any"
"boot.shell_on_fail"
"nohibernate"
"loglevel=4"
]; ];
loader = { loader = {
systemd-boot = { systemd-boot = {
@ -116,4 +121,35 @@ in {
fwFiles fwFiles
)} )}
''; '';
systemd.network = {
enable = true;
networks."end0" = {
name = "end0";
networkConfig.DHCP = "no";
address = [
# v4
"192.168.178.26/24"
# v6
"fe80::715e:ef0c:5429:e9cc/64"
"2a02:8012:7883:0:1072:c180:2363:1c92/64"
];
routes = [
# v4
{
Destination = "192.168.178.1";
}
{
Gateway = "192.168.178.1";
GatewayOnLink = true;
}
# v6
{
Gateway = "fe80::1";
}
];
};
};
} }

View file

@ -41,7 +41,7 @@ in {
allowedTCPPorts = [22]; allowedTCPPorts = [22];
}; };
networking.hostName = "raspberry"; networking.hostName = "raspberry-pi5";
time.timeZone = "Europe/London"; time.timeZone = "Europe/London";
system.stateVersion = "24.05"; system.stateVersion = "24.05";

View file

@ -0,0 +1,143 @@
{pkgs, ...}: {
services.secrets = {
enable = true;
vaultLogin = {
enable = true;
loginUsername = "hetzner-arm";
};
packages = with pkgs; [
apacheHttpd
];
requiredVaultPaths = [
"api-keys/data/backblaze/Chaos-Backups"
"private-public-keys/data/restic/Social"
"api-keys/data/chaos_mail/gotosocial"
"private-public-keys/data/restic/Forgejo"
"api-keys/data/mpd"
"api-keys/data/music-stream"
"api-keys/data/radicale"
"private-public-keys/data/restic/Radicale"
"private-public-keys/data/restic/Vault"
];
secrets = {
vault_password = {
manual = true;
};
ssh_host_ed25519_key = {
path = "/etc/ssh/ssh_host_ed25519_key";
permissions = "600";
fetchScript = ''
[ ! -d "$SYSROOT/etc/ssh" ] && mkdir -p "$SYSROOT/etc/ssh/"
simple_get "/private-public-keys/ssh/root@hetzner-arm" .private | base64 -d > "$secretFile"
'';
};
ssh_host_ed25519_key_pub = {
path = "/etc/ssh/ssh_host_ed25519_key.pub";
permissions = "600";
fetchScript = ''
[ ! -d "$SYSROOT/etc/ssh" ] && mkdir -p "$SYSROOT/etc/ssh/"
simple_get "/private-public-keys/ssh/root@hetzner-arm" .private | base64 -d > "$secretFile"
'';
};
# this doesn't need to be a secret and can be generated at install time
# but it makes it easier to install.
# it's stored in /nix store anyway
initrd_ssh_host_ed25519_key = {
path = "/initrd_ssh_host_ed25519_key";
permissions = "600";
fetchScript = ''
simple_get "/private-public-keys/ssh/root@hetzner-arm-decrypt" .private | base64 -d > "$secretFile"
'';
};
# B2 Keys for all backups
restic_backups_env = {
fetchScript = ''
cat << EOF > "$secretFile"
AWS_ACCESS_KEY_ID=$(simple_get "/api-keys/backblaze/Chaos-Backups" .keyID)
AWS_SECRET_ACCESS_KEY=$(simple_get "/api-keys/backblaze/Chaos-Backups" .applicationKey)
EOF
'';
};
restic_password_social = {
fetchScript = ''
simple_get "/private-public-keys/restic/Social" .password > "$secretFile"
'';
};
gotosocial_env = {
fetchScript = ''
smtp_password=$(simple_get "/api-keys/chaos_mail/gotosocial" .password)
echo "GTS_SMTP_PASSWORD=$smtp_password" > "$secretFile"
'';
};
restic_password_forgejo = {
fetchScript = ''
simple_get "/private-public-keys/restic/Forgejo" .password > "$secretFile"
'';
};
mpd_control_password = {
user = "mpd";
group = "mpd";
fetchScript = ''
simple_get "/api-keys/mpd" .password > "$secretFile"
'';
};
music_stream_passwd = {
user = "nginx";
group = "nginx";
fetchScript = ''
username=$(simple_get "/api-keys/music-stream" .username)
password=$(simple_get "/api-keys/music-stream" .password)
htpasswd -bc "$secretFile" "$username" "$password" 2>/dev/null
'';
};
radicale_htpasswd = {
user = "radicale";
group = "radicale";
fetchScript = ''
if [ -f "$secretFile" ]; then
rm "$secretFile"
fi
touch "$secretFile"
data=$(kv_get "/api-keys/radicale" | base64)
for username in $(echo "$data" | base64 -d | jq -r ".data.data | keys | .[]"); do
password=$(echo "$data" | base64 -d | jq -r ".data.data.\"$username\"")
htpasswd -bB "$secretFile" "$username" "$password" 2>/dev/null
done
'';
};
restic_password_radicale = {
fetchScript = ''
simple_get "/private-public-keys/restic/Radicale" .password > "$secretFile"
'';
};
restic_password_vault = {
fetchScript = ''
simple_get "/private-public-keys/restic/Vault" .password > "$secretFile"
'';
};
};
};
}

View file

@ -0,0 +1,9 @@
#!/usr/bin/env bash
SCRIPT_DIR=$( cd -- "$( dirname -- "${BASH_SOURCE[0]}" )" &> /dev/null && pwd )
cd $SCRIPT_DIR
cd $(git rev-parse --show-toplevel)
DEFAULT_HOST="root@192.168.178.26"
TARGET_HOST=${HOST:-${DEFAULT_HOST}}
nixos-rebuild switch --flake .#raspberry-pi5 --target-host "$TARGET_HOST" --impure --no-build-nix --fast --use-substitutes -s "$@"