cleaned up config
This commit is contained in:
parent
c6cd05576d
commit
f940982b40
|
@ -23,8 +23,8 @@
|
||||||
./modules/git.nix
|
./modules/git.nix
|
||||||
./modules/nix-settings.nix
|
./modules/nix-settings.nix
|
||||||
./modules/zfs.nix
|
./modules/zfs.nix
|
||||||
|
./modules/microvm.nix
|
||||||
|
|
||||||
(import ./modules/microvm.nix {routed = true;})
|
|
||||||
(import ./modules/networking-shared.nix {hostname = "server";})
|
(import ./modules/networking-shared.nix {hostname = "server";})
|
||||||
(import ./modules/users.nix {main-user = "baritone";})
|
(import ./modules/users.nix {main-user = "baritone";})
|
||||||
];
|
];
|
||||||
|
@ -39,21 +39,11 @@
|
||||||
# Enable microcode updates
|
# Enable microcode updates
|
||||||
hardware.enableRedistributableFirmware = true;
|
hardware.enableRedistributableFirmware = true;
|
||||||
|
|
||||||
# programs.zsh = {
|
|
||||||
# enable = true;
|
|
||||||
# enableGlobalCompInit = true;
|
|
||||||
# shellAliases = {
|
|
||||||
# "nrb" = "sudo nixos-rebuild switch --flake /etc/nixos";
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
wget
|
wget
|
||||||
curl
|
curl
|
||||||
git
|
git
|
||||||
vim
|
vim
|
||||||
|
|
||||||
inputs.agenix.packages."${system}".default
|
|
||||||
];
|
];
|
||||||
|
|
||||||
programs.nano.enable = false;
|
programs.nano.enable = false;
|
||||||
|
|
|
@ -1,8 +1,15 @@
|
||||||
{config, ...}: {
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
inputs,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
age.identityPaths = [
|
age.identityPaths = [
|
||||||
"/home/baritone/.ssh/id_ed25519"
|
"/home/baritone/.ssh/id_ed25519"
|
||||||
];
|
];
|
||||||
age.secrets = {
|
age.secrets = {
|
||||||
forgejo-runner-token.file = ../secrets/forgejo-runner-token.age;
|
forgejo-runner-token.file = ../secrets/forgejo-runner-token.age;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
environment.systemPackages = [inputs.agenix.packages."${pkgs.system}".default];
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{routed ? false}: {
|
{
|
||||||
pkgs,
|
pkgs,
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
|
|
|
@ -8,8 +8,4 @@
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
zfs
|
zfs
|
||||||
];
|
];
|
||||||
|
|
||||||
# Microvm be fucking shit up
|
|
||||||
# fileSystems."/nix/store".fsType = lib.mkForce "zfs";
|
|
||||||
# fileSystems."/nix/store".device = lib.mkForce "zroot/nix/store";
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -23,7 +23,10 @@
|
||||||
ports-list = (pkgs.lib.attrsets.mapAttrsToList (name: value: value.port) ports) ++ [9091];
|
ports-list = (pkgs.lib.attrsets.mapAttrsToList (name: value: value.port) ports) ++ [9091];
|
||||||
in {
|
in {
|
||||||
microvm.autostart = [vm-name];
|
microvm.autostart = [vm-name];
|
||||||
imports = [./nginx.nix];
|
imports = [
|
||||||
|
./nginx.nix
|
||||||
|
../modules/microvm.nix
|
||||||
|
];
|
||||||
|
|
||||||
users.extraUsers.microvm.extraGroups = [
|
users.extraUsers.microvm.extraGroups = [
|
||||||
"jellyfin" # access to media folder
|
"jellyfin" # access to media folder
|
||||||
|
|
|
@ -3,8 +3,34 @@
|
||||||
lib,
|
lib,
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
}: {
|
}: let
|
||||||
services.fail2ban = {
|
jails = {
|
||||||
|
forgejo = mkJail "forgejo" "^.*Failed authentication attempt for .* from <ADDR>.*$";
|
||||||
|
jellyfin = mkJail "jellyfin" "^.*Authentication request for .* has been denied \\(IP: <ADDR>\\)\\.";
|
||||||
|
sonarr = mkJail "sonarr" "^.*Auth-Failure ip <ADDR> username.*$";
|
||||||
|
radarr = mkJail "sonarr" "^.*Auth-Failure ip <ADDR> username.*$";
|
||||||
|
vaultwarden = mkJail "vaultwarden" "^.*Username or password is incorrect. Try again. IP: <ADDR>\\. Username: .*$";
|
||||||
|
};
|
||||||
|
|
||||||
|
mkJail = name: filter: {
|
||||||
|
jail.settings = {
|
||||||
|
enabled = true;
|
||||||
|
filter = name;
|
||||||
|
backend = "systemd";
|
||||||
|
port = "80,443";
|
||||||
|
maxretry = 8;
|
||||||
|
bantime = "24h";
|
||||||
|
findtime = "30m";
|
||||||
|
journalmatch = "_SYSTEMD_UNIT=${name}.service";
|
||||||
|
};
|
||||||
|
filter = ''
|
||||||
|
[Definition]
|
||||||
|
failregex = ${filter}
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
services.fail2ban = let
|
||||||
|
in {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
||||||
bantime = "24h";
|
bantime = "24h";
|
||||||
|
@ -15,7 +41,8 @@
|
||||||
overalljails = true;
|
overalljails = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
jails = {
|
jails =
|
||||||
|
{
|
||||||
dovecot = lib.mkIf config.services.dovecot2.enable {
|
dovecot = lib.mkIf config.services.dovecot2.enable {
|
||||||
settings = {
|
settings = {
|
||||||
# block IPs which failed to log-in
|
# block IPs which failed to log-in
|
||||||
|
@ -24,97 +51,24 @@
|
||||||
maxretry = 3;
|
maxretry = 3;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
}
|
||||||
jellyfin = lib.mkIf config.services.jellyfin.enable {
|
// (lib.attrsets.mapAttrs (name: value: value.jail) jails);
|
||||||
settings = {
|
|
||||||
filter = "jellyfin";
|
|
||||||
backend = "systemd";
|
|
||||||
enabled = true;
|
|
||||||
port = "80,443";
|
|
||||||
maxretry = 8;
|
|
||||||
bantime = "24h";
|
|
||||||
findtime = "30m";
|
|
||||||
journalmatch = "_SYSTEMD_UNIT=jellyfin.service";
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
|
||||||
forgejo = lib.mkIf config.services.forgejo.enable {
|
environment.etc =
|
||||||
settings = {
|
{
|
||||||
filter = "forgejo";
|
|
||||||
backend = "systemd";
|
|
||||||
enabled = true;
|
|
||||||
port = "80,443";
|
|
||||||
maxretry = 8;
|
|
||||||
bantime = "24h";
|
|
||||||
findtime = "30m";
|
|
||||||
journalmatch = "_SYSTEMD_UNIT=forgejo.service";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
sonarr = lib.mkIf (config.microvm.vms."auto-torrent" != null) {
|
|
||||||
settings = {
|
|
||||||
filter = "arr";
|
|
||||||
backend = "auto";
|
|
||||||
enabled = true;
|
|
||||||
port = "80,443";
|
|
||||||
maxretry = 8;
|
|
||||||
bantime = "24h";
|
|
||||||
findtime = "30m";
|
|
||||||
logpath = "/var/lib/auto-torrent/sonarr/logs/*.txt";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
radarr = lib.mkIf (config.microvm.vms."auto-torrent" != null) {
|
|
||||||
settings = {
|
|
||||||
filter = "arr";
|
|
||||||
backend = "auto";
|
|
||||||
enabled = true;
|
|
||||||
port = "80,443";
|
|
||||||
maxretry = 8;
|
|
||||||
bantime = "24h";
|
|
||||||
findtime = "30m";
|
|
||||||
logpath = "/var/lib/auto-torrent/radarr/logs/*.txt";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
vaultwarden = lib.mkIf config.services.vaultwarden.enable {
|
|
||||||
settings = {
|
|
||||||
filter = "vaultwarden";
|
|
||||||
backend = "systemd";
|
|
||||||
enabled = true;
|
|
||||||
port = "80,443";
|
|
||||||
maxretry = 8;
|
|
||||||
bantime = "24h";
|
|
||||||
findtime = "30m";
|
|
||||||
journalmatch = "_SYSTEMD_UNIT=vaultwarden.service";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
environment.etc = {
|
|
||||||
# Jellyfin
|
|
||||||
"fail2ban/filter.d/jellyfin.local".text = pkgs.lib.mkDefault (pkgs.lib.mkAfter ''
|
|
||||||
[Definition]
|
|
||||||
failregex = ^.*Authentication request for .* has been denied \(IP: <ADDR>\)\.
|
|
||||||
'');
|
|
||||||
# Forgejo
|
|
||||||
"fail2ban/filter.d/forgejo.local".text = pkgs.lib.mkDefault (pkgs.lib.mkAfter ''
|
|
||||||
[Definition]
|
|
||||||
failregex = ^.*Failed authentication attempt for .* from <ADDR>.*$
|
|
||||||
'');
|
|
||||||
# *arr
|
|
||||||
"fail2ban/filter.d/arr.local".text = pkgs.lib.mkDefault (pkgs.lib.mkAfter ''
|
|
||||||
[Definition]
|
|
||||||
failregex = ^.*Auth-Failure ip <ADDR> username.*$
|
|
||||||
'');
|
|
||||||
# Vaultwarden
|
|
||||||
"fail2ban/filter.d/vaultwarden.local".text = pkgs.lib.mkDefault (pkgs.lib.mkAfter ''
|
|
||||||
[Definition]
|
|
||||||
failregex = ^.*Username or password is incorrect. Try again. IP: <ADDR>\. Username: .*$
|
|
||||||
'');
|
|
||||||
# Defines a filter that detects URL probing by reading the Nginx access log
|
# Defines a filter that detects URL probing by reading the Nginx access log
|
||||||
"fail2ban/filter.d/nginx-url-probe.local".text = pkgs.lib.mkDefault (pkgs.lib.mkAfter ''
|
"fail2ban/filter.d/nginx-url-probe.local".text = lib.mkDefault (lib.mkAfter ''
|
||||||
[Definition]
|
[Definition]
|
||||||
failregex = ^<HOST>.*(GET /(wp-|admin|boaform|phpmyadmin|\.env|\.git)|\.(dll|so|cfm|asp)|(\?|&)(=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000|=PHPE9568F36-D428-11d2-A769-00AA001ACF42|=PHPE9568F35-D428-11d2-A769-00AA001ACF42|=PHPE9568F34-D428-11d2-A769-00AA001ACF42)|\\x[0-9a-zA-Z]{2})
|
failregex = ^<HOST>.*(GET /(wp-|admin|boaform|phpmyadmin|\.env|\.git)|\.(dll|so|cfm|asp)|(\?|&)(=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000|=PHPE9568F36-D428-11d2-A769-00AA001ACF42|=PHPE9568F35-D428-11d2-A769-00AA001ACF42|=PHPE9568F34-D428-11d2-A769-00AA001ACF42)|\\x[0-9a-zA-Z]{2})
|
||||||
'');
|
'');
|
||||||
};
|
}
|
||||||
|
// (with lib.attrsets;
|
||||||
|
mapAttrs' (
|
||||||
|
name: value:
|
||||||
|
nameValuePair
|
||||||
|
"fail2ban/filter.d/${name}.local"
|
||||||
|
{text = lib.mkDefault (lib.mkAfter value.filter);}
|
||||||
|
)
|
||||||
|
jails);
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,7 +3,10 @@
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
imports = [./docker.nix];
|
imports = [
|
||||||
|
./docker.nix
|
||||||
|
../modules/age.nix
|
||||||
|
];
|
||||||
services.gitea-actions-runner = {
|
services.gitea-actions-runner = {
|
||||||
package = pkgs.forgejo-runner;
|
package = pkgs.forgejo-runner;
|
||||||
instances = {
|
instances = {
|
||||||
|
|
Loading…
Reference in a new issue