{ config, pkgs, ... }: let cfg = config.deuxfleurs; in with builtins; with pkgs.lib; { options.deuxfleurs = { # Parameters for individual nodes network_interface = mkOption { description = "Network interface name to configure"; type = types.str; }; lan_ip = mkOption { description = "IP address of this node on the local network interface"; type = types.str; }; lan_ip_prefix_length = mkOption { description = "Prefix length associated with lan_ip"; type = types.int; }; ipv6 = mkOption { description = "Public IPv6 address of this node"; type = types.str; }; ipv6_prefix_length = mkOption { description = "Prefix length associated with ipv6 ip"; type = types.int; }; wesher_cluster_prefix = mkOption { description = "IP address prefix for the Wesher overlay network"; type = types.str; }; wesher_cluster_prefix_length = mkOption { description = "IP address prefix length for the Wesher overlay network"; type = types.int; default = 16; }; cluster_ip = mkOption { description = "IP address of this node on the Wesher mesh network"; type = types.str; }; is_raft_server = mkOption { description = "Make this node a RAFT server for the Nomad and Consul deployments"; type = types.bool; default = false; }; # Parameters that generally vary between sites lan_default_gateway = mkOption { description = "IP address of the default route on the locak network interface"; type = types.str; }; site_name = mkOption { description = "Site (availability zone) on which this node is deployed"; type = types.str; }; # Parameters common to all nodes cluster_name = mkOption { description = "Name of this Deuxfleurs deployment"; type = types.str; }; admin_accounts = mkOption { description = "List of users having an admin account on cluster nodes, maps user names to a list of authorized SSH keys"; type = types.attrsOf (types.listOf types.str); }; }; config = { # Configure admin accounts on all nodes users.users = builtins.mapAttrs (name: publicKeys: { isNormalUser = true; extraGroups = [ "wheel" ]; openssh.authorizedKeys.keys = publicKeys; }) cfg.admin_accounts; # Configure network interfaces networking.interfaces = attrsets.setAttrByPath [ cfg.network_interface ] { useDHCP = false; ipv4.addresses = [ { address = cfg.lan_ip; prefixLength = cfg.lan_ip_prefix_length; } ]; ipv6.addresses = [ { address = cfg.ipv6; prefixLength = cfg.ipv6_prefix_length; } ]; }; networking.defaultGateway = { address = cfg.lan_default_gateway; interface = cfg.network_interface; }; # wesher overlay network services.wesher = { enable = true; bindAddr = cfg.ipv6; overlayNet = "${cfg.wesher_cluster_prefix}/${toString cfg.wesher_cluster_prefix_length}"; interface = "wg0"; logLevel = "debug"; }; # Configure /etc/hosts to link all hostnames to their Wireguard IP #networking.extraHosts = builtins.concatStringsSep "\n" (map # ({ hostname, IP, ...}: "${IP} ${hostname}") # (cfg.cluster_nodes ++ cfg.admin_nodes)); # Enable Hashicorp Consul & Nomad services.consul.enable = true; services.consul.extraConfig = (if cfg.is_raft_server then { server = true; bootstrap_expect = 3; } else {}) // { datacenter = cfg.cluster_name; node_meta = { "site" = cfg.site_name; }; ui = true; bind_addr = "${cfg.cluster_ip}"; ports.http = -1; addresses.https = "0.0.0.0"; ports.https = 8501; ca_file = "/var/lib/consul/pki/consul-ca.crt"; cert_file = "/var/lib/consul/pki/consul2022.crt"; key_file = "/var/lib/consul/pki/consul2022.key"; verify_incoming = true; verify_outgoing = true; verify_server_hostname = true; }; services.nomad.enable = true; services.nomad.package = pkgs.nomad_1_1; services.nomad.settings = (if cfg.is_raft_server then { server = { enabled = true; bootstrap_expect = 3; }; } else {}) // { region = cfg.cluster_name; datacenter = cfg.site_name; advertise = { rpc = "${cfg.cluster_ip}"; http = "${cfg.cluster_ip}"; serf = "${cfg.cluster_ip}"; }; consul = { address = "localhost:8501"; ca_file = "/var/lib/nomad/pki/consul2022.crt"; cert_file = "/var/lib/nomad/pki/consul2022-client.crt"; key_file = "/var/lib/nomad/pki/consul2022-client.key"; ssl = true; }; client = { enabled = true; network_interface = "wg0"; meta = { "site" = cfg.site_name; }; }; tls = { http = true; rpc = true; ca_file = "/var/lib/nomad/pki/nomad-ca.crt"; cert_file = "/var/lib/nomad/pki/nomad2022.crt"; key_file = "/var/lib/nomad/pki/nomad2022.key"; verify_server_hostname = true; verify_https_client = true; }; plugin = [ { docker = [ { config = [ { volumes.enabled = true; allow_privileged = true; } ]; } ]; } ]; }; # ---- Firewall config ---- # Open ports in the firewall. networking.firewall = { enable = true; # Allow anyone to connect on SSH port allowedTCPPorts = [ (builtins.head ({ openssh.ports = [22]; } // config.services).openssh.ports) ]; # Allow specific hosts access to specific things in the cluster extraCommands = '' # Allow everything from router (usefull for UPnP/IGD) iptables -A INPUT -s 192.168.1.254 -j ACCEPT # Allow docker containers to access all ports iptables -A INPUT -s 172.17.0.0/16 -j ACCEPT # Allow other nodes on VPN to access all ports iptables -A INPUT -s ${cfg.wesher_cluster_prefix}/${toString cfg.wesher_cluster_prefix_length} -j ACCEPT ''; # When stopping firewall, delete all rules that were configured manually above extraStopCommands = '' iptables -D INPUT -s 192.168.1.254 -j ACCEPT iptables -D INPUT -s 172.17.0.0/16 -j ACCEPT iptables -D INPUT -s ${cfg.wesher_cluster_prefix}/${toString cfg.wesher_cluster_prefix_length} -j ACCEPT ''; }; }; }