oizys/hosts/algiz/services.nix
2025-02-17 13:23:52 -06:00

113 lines
2.6 KiB
Nix

{
config,
pkgs,
enabled,
...
}:
let
atticPort = "5656";
harmoniaPort = "5657";
static-attic = pkgs.runCommandLocal "static-files" { } ''
mkdir $out
cp ${./caddy/attic/index.html} $out/index.html
'';
static-nix-cache = pkgs.runCommandLocal "static-files-nix-cache" { } ''
mkdir $out
cp -r ${./caddy/nix-cache}/* $out
'';
check-attic = pkgs.writeShellScriptBin "check-attic" ''
sudo du -sh /var/lib/atticd/
'';
in
{
services.resolved = enabled;
services.fail2ban = enabled // {
maxretry = 5;
bantime = "24h";
};
services.openssh = enabled // {
settings.PasswordAuthentication = false;
};
security.polkit = enabled; # attic was looking for this...
environment.systemPackages = [
pkgs.attic-client
check-attic
];
services.atticd = enabled // {
# Replace with absolute path to your credentials file
environmentFile = config.sops.secrets."atticd-env".path;
settings = {
listen = "[::]:${atticPort}";
jwt = { };
# Data chunking
#
# Warning: If you change any of the values here, it will be
# difficult to reuse existing chunks for newly-uploaded NARs
# since the cutpoints will be different. As a result, the
# deduplication ratio will suffer for a while after the change.
chunking = {
# The minimum NAR size to trigger chunking
#
# If 0, chunking is disabled entirely for newly-uploaded NARs.
# If 1, all NARs are chunked.
nar-size-threshold = 64 * 1024; # 64 KiB
# The preferred minimum size of a chunk, in bytes
min-size = 16 * 1024; # 16 KiB
# The preferred average size of a chunk, in bytes
avg-size = 64 * 1024; # 64 KiB
# The preferred maximum size of a chunk, in bytes
max-size = 256 * 1024; # 256 KiB
};
};
};
services.harmonia = enabled // {
signKeyPaths = [ config.sops.secrets.harmonia-key.path ];
settings = {
bind = "[::]:${harmoniaPort}";
};
};
services.caddy = enabled // {
extraConfig = builtins.readFile ./caddy/Caddyfile;
virtualHosts = {
"attic.dayl.in".extraConfig = ''
redir /oizys /
handle / {
root * ${static-attic}
file_server
}
handle /* {
reverse_proxy http://localhost:${atticPort}
}
'';
"nix-cache.dayl.in".extraConfig = ''
handle / {
root * ${static-nix-cache}
file_server
}
handle /* {
reverse_proxy http://localhost:${harmoniaPort}
}
'';
};
};
}