## generate keys with: # tinc generate-keys # ssh-keygen -f ssh.id_ed25519 -t ed25519 -C host with import ; { config, ... }: let hostDefaults = hostName: host: foldl' recursiveUpdate {} [ { owner = config.krebs.users.makefu; } # Retiolum defaults (let pubkey-path = ./retiolum + "/${hostName}.pub"; in optionalAttrs (pathExists pubkey-path) { nets.retiolum = { tinc.pubkey = readFile pubkey-path; aliases = [ "${hostName}.r" ]; ip6.addr = (krebs.genipv6 "retiolum" "makefu" { inherit hostName; }).address; }; }) # Wiregrill defaults (let pubkey-path = ./wiregrill + "/${hostName}.pub"; in optionalAttrs (pathExists pubkey-path) { nets.wiregrill = { aliases = [ "${hostName}.w" ]; ip6.addr = (krebs.genipv6 "wiregrill" "makefu" { inherit hostName; }).address; wireguard.pubkey = readFile pubkey-path; }; }) # SSHD defaults (let pubkey-path = ./sshd + "/${hostName}.pub"; in optionalAttrs (pathExists pubkey-path) { ssh.pubkey = readFile pubkey-path; # We assume that if the sshd pubkey exits then there must be a privkey in # the screts store as well ssh.privkey.path = ; }) host ]; pub-for = name: builtins.readFile (./ssh + "/${name}.pub"); w6 = ip: (krebs.genipv6 "wiregrill" "makefu" ip).address; in { hosts = mapAttrs hostDefaults { cake = rec { cores = 4; ci = false; nets = { retiolum.ip4.addr = "10.243.136.236"; }; }; crapi = rec { # raspi1 cores = 1; ci = false; nets = { retiolum.ip4.addr = "10.243.136.237"; }; }; firecracker = { cores = 4; nets = { retiolum.ip4.addr = "10.243.12.12"; }; }; studio = rec { ci = false; cores = 4; nets = { retiolum.ip4.addr = "10.243.227.163"; }; }; fileleech = rec { ci = false; cores = 4; nets = { retiolum.ip4.addr = "10.243.113.98"; }; }; tsp = { ci = true; cores = 1; nets = { retiolum.ip4.addr = "10.243.0.212"; }; }; x = { ci = true; cores = 4; nets = { retiolum.ip4.addr = "10.243.0.91"; wiregrill = { # defaults }; }; }; filepimp = rec { ci = false; cores = 1; nets = { lan = { ip4.addr = "192.168.1.12"; aliases = [ "filepimp.lan" ]; }; retiolum.ip4.addr = "10.243.153.102"; }; }; omo = rec { ci = true; cores = 2; nets = { lan = { ip4.addr = "192.168.1.11"; aliases = [ "omo.lan" ]; }; retiolum = { ip4.addr = "10.243.0.89"; aliases = [ "omo.r" "dcpp.omo.r" "torrent.omo.r" ]; }; }; }; wbob = rec { ci = true; cores = 4; nets = { lan = { ip4.addr = "192.168.8.11"; aliases = [ "wbob.lan" "log.wbob.lan" ]; }; retiolum = { ip4.addr = "10.243.214.15"; aliases = [ "wbob.r" "hydra.wbob.r" "log.wbob.r" ]; }; }; }; gum = rec { ci = true; extraZones = { "krebsco.de" = '' boot IN A ${nets.internet.ip4.addr} boot.euer IN A ${nets.internet.ip4.addr} cache.euer IN A ${nets.internet.ip4.addr} cache.gum IN A ${nets.internet.ip4.addr} cgit.euer IN A ${nets.internet.ip4.addr} dl.euer IN A ${nets.internet.ip4.addr} dockerhub IN A ${nets.internet.ip4.addr} euer IN A ${nets.internet.ip4.addr} euer IN MX 1 aspmx.l.google.com. ghook IN A ${nets.internet.ip4.addr} git.euer IN A ${nets.internet.ip4.addr} gold IN A ${nets.internet.ip4.addr} graph IN A ${nets.internet.ip4.addr} gum IN A ${nets.internet.ip4.addr} iso.euer IN A ${nets.internet.ip4.addr} mon.euer IN A ${nets.internet.ip4.addr} netdata.euer IN A ${nets.internet.ip4.addr} nixos.unstable IN CNAME krebscode.github.io. o.euer IN A ${nets.internet.ip4.addr} photostore IN A ${nets.internet.ip4.addr} pigstarter IN A ${nets.internet.ip4.addr} share.euer IN A ${nets.internet.ip4.addr} wg.euer IN A ${nets.internet.ip4.addr} wiki.euer IN A ${nets.internet.ip4.addr} wikisearch IN A ${nets.internet.ip4.addr} io IN NS gum.krebsco.de. mediengewitter IN CNAME over.dose.io. ''; }; cores = 8; nets = rec { internet = { ip4.addr = "144.76.26.247"; ip6.addr = "2a01:4f8:191:12f6::2"; aliases = [ "gum.i" "nextgum.i" ]; }; wiregrill = { via = internet; ip4.addr = "10.244.245.1"; ip6.addr = w6 "1"; wireguard.port = 51821; wireguard.subnets = [ (krebs.genipv6 "wiregrill" "makefu" 0).subnetCIDR "10.244.245.0/24" # required for routing directly to gum via rockit ]; }; retiolum = { via = internet; ip4.addr = "10.243.0.213"; aliases = [ "gum.r" "backup.makefu.r" "blog.gum.r" "blog.makefu.r" "cache.gum.r" "cgit.gum.r" "dcpp.gum.r" "dcpp.nextgum.r" "graph.r" "logs.makefu.r" "netdata.makefu.r" "nextgum.r" "o.gum.r" "search.makefu.r" "stats.makefu.r" "torrent.gum.r" "tracker.makefu.r" "wiki.gum.r" "wiki.makefu.r" ]; }; }; }; sdev = rec { ci = true; cores = 1; nets = { retiolum.ip4.addr = "10.243.83.237"; }; }; # non-stockholm flap = rec { cores = 1; extraZones = { "krebsco.de" = '' flap IN A ${nets.internet.ip4.addr} ''; }; nets = { internet = { ip4.addr = "162.248.11.162"; aliases = [ "flap.i" ]; }; retiolum = { ip4.addr = "10.243.211.172"; }; }; }; nukular = rec { cores = 1; nets = { retiolum = { ip4.addr = "10.243.231.219"; }; }; }; filebitch = rec { cores = 4; nets = { retiolum = { ip4.addr = "10.243.189.130"; }; }; }; rockit = rec { # router@home cores = 1; nets.wiregrill.ip4.addr = "10.244.245.2"; }; senderechner = rec { cores = 2; nets = { retiolum = { ip4.addr = "10.243.0.163"; }; }; }; }; users = rec { makefu = { mail = "makefu@x.r"; pubkey = pub-for "makefu.x"; pgp.pubkeys.default = builtins.readFile ./pgp/default.asc; pgp.pubkeys.brain = builtins.readFile ./pgp/brain.asc; }; makefu-omo = { inherit (makefu) mail pgp; pubkey = pub-for "makefu.omo"; }; makefu-tsp = { inherit (makefu) mail pgp; pubkey = pub-for "makefu.tsp"; }; makefu-vbob = { inherit (makefu) mail pgp; pubkey = pub-for "makefu.vbob"; }; makefu-tempx = { inherit (makefu) mail pgp; pubkey = pub-for "makefu.tempx"; }; makefu-android = { inherit (makefu) mail pgp; pubkey = pub-for "makefu.android"; }; makefu-remote-builder = { inherit (makefu) mail pgp; pubkey = pub-for "makefu.remote-builder"; }; makefu-bob = { inherit (makefu) mail pgp; pubkey = pub-for "makefu.bob"; }; }; }