file location adjustments

disko may not be required here depending on the fact we are leveraging
lxc containers
This commit is contained in:
Jermeiah S 2025-06-14 06:01:03 -04:00
parent 8f7a75814d
commit 906179fbed
No known key found for this signature in database
7 changed files with 129 additions and 28 deletions

View file

@ -6,4 +6,9 @@
++ [
flake.inputs.disko.nixosModules.default
];
nixpkgs.overlays = [ flake.inputs.self.overlays.default ];
services.tailscale = {
enable = true;
};
}

View file

@ -0,0 +1,91 @@
{
lib,
config,
pkgs,
...
}:
let
cfg = config.services.otf;
in
{
options.services.otf = {
enable = lib.mkEnableOption "Open Terraform Framework";
# It is important to expose the datadirectory to the user so we make it a reusable option
dataDir = lib.mkOption {
type = lib.types.str;
default = "/var/lib/otf";
description = "Directory to store OTF data.";
};
package = lib.mkPackageOption pkgs "otf" { };
pgPackage = lib.mkPackageOption pkgs "postgresql_16" { };
# this application is configured entirely by environment variables and needs to be exposed
environment = lib.mkOption {
type =
with lib.types;
attrsOf (
nullOr (oneOf [
str
path
package
])
);
default = {
OTF_ADDRESS = "localhost:9000";
OTF_SITE_TOKEN = "my-token";
OTF_SSL = "false";
# the application needs a secret for encryption and other things
# TODO: make mechanism to load via file
OTF_SECRET = "f73e55eada59bd1c37d69ae3bbacd982";
# more options can be set but these are a reminder for myself
OTF_CERT_FILE = "";
OTF_KEY_FILE = "";
};
description = "Environment variables for the OTF service.";
};
};
config = lib.mkIf cfg.enable {
# it is best for this project to have a dedicated user for database access
users.groups.otf = { };
users.users.otf = {
isSystemUser = true;
home = cfg.dataDir;
createHome = true;
group = "otf";
};
services.postgresql = {
enable = true;
# this lets us set the package
# TODO: expose to end user
package = cfg.pgPackage;
# This enabled autoconfig of both a database and a user of the same name
ensureDatabases = [ "otf" ];
ensureUsers = [
{
name = "otf";
ensureDBOwnership = true;
}
];
};
systemd.services.otf = {
description = "Open Terraform Framework";
after = [
"network.target"
"postgresql.service"
];
requires = [ "postgresql.service" ];
wantedBy = [ "multi-user.target" ];
inherit (cfg) environment;
serviceConfig = {
User = "otf";
Group = "otf";
WorkingDirectory = cfg.dataDir;
ExecStart = "${cfg.package}/bin/otfd";
Restart = "on-failure";
};
};
};
}

View file

@ -1,4 +1,5 @@
_: {
services.openssh.enable = true;
security = {
sudo.execWheelOnly = true;
pam = {

View file

@ -0,0 +1,22 @@
{
lib,
config,
pkgs,
...
}:
{
users.users.root.openssh.authorizedKeys.keys =
with config.users.users;
sky.openssh.authorizedKeys.keys;
users.users.sky = {
isNormalUser = true;
name = "sky";
extraGroups = [
"wheel"
];
uid = 1000;
openssh.authorizedKeys.keys = [
"ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBA9i9HoP7X8Ufzz8rAaP7Nl3UOMZxQHMrsnA5aEQfpTyIQ1qW68jJ4jGK5V6Wv27MMc3czDU1qfFWIbGEWurUHQ="
];
};
}