summaryrefslogtreecommitdiffstats
path: root/lass/2configs/blue-host.nix
blob: 6d46cb8c1ec5ae72203f153045ab8ec807082afe (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
{ config, lib, pkgs, ... }:
with import <stockholm/lib>;
let
  all_hosts = [
    "icarus"
    "shodan"
    "daedalus"
    "skynet"
    "prism"
  ];
  remote_hosts = filter (h: h != config.networking.hostName) all_hosts;

in {
  imports = [
    <stockholm/lass/2configs/container-networking.nix>
    { #hack for already defined
      systemd.services."container@blue".reloadIfChanged = mkForce false;
      systemd.services."container@blue".preStart = ''
        ${pkgs.mount}/bin/mount | ${pkgs.gnugrep}/bin/grep -q '^encfs on /var/lib/containers/blue'
      '';
      systemd.services."container@blue".preStop = ''
        /run/wrappers/bin/fusermount -u /var/lib/containers/blue
      '';
    }
  ];

  system.activationScripts.containerPermissions = ''
    mkdir -p /var/lib/containers
    chmod 711 /var/lib/containers
  '';

  containers.blue = {
    config = { ... }: {
      environment.systemPackages = [
        pkgs.git
        pkgs.rxvt_unicode.terminfo
      ];
      services.openssh.enable = true;
      users.users.root.openssh.authorizedKeys.keys = [
        config.krebs.users.lass.pubkey
      ];
    };
    autoStart = false;
    enableTun = true;
    privateNetwork = true;
    hostAddress = "10.233.2.9";
    localAddress = "10.233.2.10";
  };


  systemd.services = builtins.listToAttrs (map (host:
    let
    in nameValuePair "sync-blue-${host}" {
    bindsTo = [ "container@blue.service" ];
    wantedBy = [ "container@blue.service" ];
    # ssh needed for rsync
    path = [ pkgs.openssh ];
    serviceConfig = {
      Restart = "always";
      RestartSec = 10;
      ExecStart = pkgs.writeDash "sync-blue-${host}" ''
        set -efu
        #make sure blue is running
        /run/wrappers/bin/ping -c1 blue.r > /dev/null

        #make sure the container is unlocked
        ${pkgs.mount}/bin/mount | ${pkgs.gnugrep}/bin/grep -q '^encfs on /var/lib/containers/blue'

        #make sure our target is reachable
        ${pkgs.untilport}/bin/untilport ${host}.r 22 2>/dev/null

        #start sync
        ${pkgs.lsyncd}/bin/lsyncd -log scarce ${pkgs.writeText "lsyncd-config.lua" ''
          settings {
            nodaemon = true,
            inotifyMode = "CloseWrite or Modify",
          }
          sync {
            default.rsyncssh,
            source = "/var/lib/containers/.blue",
            host = "${host}.r",
            targetdir = "/var/lib/containers/.blue",
            rsync = {
              owner = true,
              group = true,
            };
            ssh = {
              binary = "${pkgs.openssh}/bin/ssh";
              identityFile = "/var/lib/containers/blue/home/lass/.ssh/id_rsa",
            },
          }
        ''}
      '';
    };
    unitConfig.ConditionPathExists = "!/var/run/ppp0.pid";
    }
  ) remote_hosts);

  environment.systemPackages = [
    (pkgs.writeDashBin "start-blue" ''
      set -ef
      if ping -c1 blue.r >/dev/null; then
        echo 'blue is already running. bailing out'
        exit 23
      fi
      if ! $(mount | ${pkgs.gnugrep}/bin/grep -qi '^encfs on /var/lib/containers/blue'); then
        ${pkgs.encfs}/bin/encfs --public /var/lib/containers/.blue /var/lib/containers/blue
      fi
      nixos-container start blue
      nixos-container run blue -- nixos-rebuild -I /var/src switch
    '')
  ];
}