depot/cluster/services/ipfs/cluster.nix

85 lines
2.4 KiB
Nix
Raw Permalink Normal View History

{ cluster, config, depot, lib, ... }:
let
2023-08-31 01:55:45 +03:00
inherit (depot.lib.meta) domain;
inherit (depot.lib.nginx) vhosts;
inherit (cluster.config.services.ipfs) secrets;
cfg = config.services.ipfs-cluster;
ipfsCfg = config.services.ipfs;
apiSocket = "/run/ipfs-cluster/ipfs-cluster-api.sock";
pinSvcSocket = "/run/ipfs-cluster/ipfs-pinning-service-api.sock";
proxySocket = "/run/ipfs-cluster/ipfs-api-proxy.sock";
in {
imports = [
depot.nixosModules.ipfs-cluster
];
system.ascensions.ipfs-cluster = {
requiredBy = [ "ipfs-cluster.service" ];
incantations = i: [ ];
};
services.ipfs-cluster = {
enable = true;
consensus = "crdt";
dataDir = "/srv/storage/ipfs/cluster";
secretFile = secrets.clusterSecret.path;
pinSvcBasicAuthFile = secrets.pinningServiceCredentials.path;
openSwarmPort = true;
settings = {
cluster = {
peer_addresses = [
"/ip4/95.216.8.12/tcp/9096/p2p/12D3KooWFqccQN24XbpJbguWmtqAJwKarPXxMNqGCz1wSQqKL97D"
"/ip4/152.67.79.222/tcp/9096/p2p/12D3KooWKoDuA7iEB9XVZazErzFUGqQ6msSYRPJodNicPxKx7K1f"
];
replication_factor_min = 1;
replication_factor_max = 2;
};
api = {
ipfsproxy = {
listen_multiaddress = "/unix${proxySocket}";
node_multiaddress = ipfsCfg.apiAddress;
};
pinsvcapi.http_listen_multiaddress = "/unix${pinSvcSocket}";
restapi.http_listen_multiaddress = "/unix${apiSocket}";
};
ipfs_connector.ipfshttp.node_multiaddress = ipfsCfg.apiAddress;
};
};
systemd.services.ipfs-cluster = {
postStart = ''
chmod 0660 ${apiSocket} ${pinSvcSocket} ${proxySocket}
'';
serviceConfig = {
TimeoutStartSec = "600s";
IPAddressDeny = [
"10.0.0.0/8"
"100.64.0.0/10"
"169.254.0.0/16"
"172.16.0.0/12"
"192.0.0.0/24"
"192.0.2.0/24"
"192.168.0.0/16"
"198.18.0.0/15"
"198.51.100.0/24"
"203.0.113.0/24"
"240.0.0.0/4"
"100::/64"
"2001:2::/48"
"2001:db8::/32"
"fc00::/7"
"fe80::/10"
];
};
};
services.nginx.virtualHosts."pin.${domain}" = vhosts.proxy "http://unix:${pinSvcSocket}";
users.users.nginx.extraGroups = [ cfg.group ];
security.acme.certs."pin.${domain}" = {
2023-12-04 20:31:03 +02:00
dnsProvider = "exec";
webroot = lib.mkForce null;
};
}