diff options
| author | Gregor Kleen <gkleen@yggdrasil.li> | 2025-05-24 20:26:52 +0200 |
|---|---|---|
| committer | Gregor Kleen <gkleen@yggdrasil.li> | 2025-05-24 20:26:52 +0200 |
| commit | 2a45b6837ea381c893d0ebde2f8cce2897331c35 (patch) | |
| tree | 8c04e981d1fdf00afd5d503e62b50fe9daa1fcad /hosts | |
| parent | b8c7aac98efdd794de6cc1f8ef935fff05786214 (diff) | |
| download | nixos-2a45b6837ea381c893d0ebde2f8cce2897331c35.tar nixos-2a45b6837ea381c893d0ebde2f8cce2897331c35.tar.gz nixos-2a45b6837ea381c893d0ebde2f8cce2897331c35.tar.bz2 nixos-2a45b6837ea381c893d0ebde2f8cce2897331c35.tar.xz nixos-2a45b6837ea381c893d0ebde2f8cce2897331c35.zip | |
kimai
Diffstat (limited to 'hosts')
| -rw-r--r-- | hosts/surtr/bifrost/default.nix | 4 | ||||
| -rw-r--r-- | hosts/surtr/default.nix | 2 | ||||
| -rw-r--r-- | hosts/surtr/dns/default.nix | 2 | ||||
| -rw-r--r-- | hosts/surtr/dns/keys/kimai.yggdrasil.li_acme | 19 | ||||
| -rw-r--r-- | hosts/surtr/dns/zones/li.yggdrasil.soa | 10 | ||||
| -rw-r--r-- | hosts/surtr/kimai.nix | 66 | ||||
| -rw-r--r-- | hosts/surtr/tls/tsig_keys/kimai.yggdrasil.li | 19 | ||||
| -rw-r--r-- | hosts/vidhar/default.nix | 2 | ||||
| -rw-r--r-- | hosts/vidhar/kimai/default.nix | 89 | ||||
| -rw-r--r-- | hosts/vidhar/kimai/ruleset.nft | 149 | ||||
| -rw-r--r-- | hosts/vidhar/network/ruleset.nft | 12 |
11 files changed, 367 insertions, 7 deletions
diff --git a/hosts/surtr/bifrost/default.nix b/hosts/surtr/bifrost/default.nix index fbfde757..52ab43f5 100644 --- a/hosts/surtr/bifrost/default.nix +++ b/hosts/surtr/bifrost/default.nix | |||
| @@ -18,7 +18,7 @@ in { | |||
| 18 | ListenPort = 51822; | 18 | ListenPort = 51822; |
| 19 | }; | 19 | }; |
| 20 | wireguardPeers = [ | 20 | wireguardPeers = [ |
| 21 | { AllowedIPs = [ "2a03:4000:52:ada:4:1::/96" ]; | 21 | { AllowedIPs = [ "2a03:4000:52:ada:4:1::/96" "2a03:4000:52:ada:6::/80" ]; |
| 22 | PublicKey = trim (readFile ../../vidhar/network/bifrost/vidhar.pub); | 22 | PublicKey = trim (readFile ../../vidhar/network/bifrost/vidhar.pub); |
| 23 | } | 23 | } |
| 24 | ]; | 24 | ]; |
| @@ -34,6 +34,8 @@ in { | |||
| 34 | routes = [ | 34 | routes = [ |
| 35 | { Destination = "2a03:4000:52:ada:4::/80"; | 35 | { Destination = "2a03:4000:52:ada:4::/80"; |
| 36 | } | 36 | } |
| 37 | { Destination = "2a03:4000:52:ada:6::/80"; | ||
| 38 | } | ||
| 37 | ]; | 39 | ]; |
| 38 | linkConfig = { | 40 | linkConfig = { |
| 39 | RequiredForOnline = false; | 41 | RequiredForOnline = false; |
diff --git a/hosts/surtr/default.nix b/hosts/surtr/default.nix index d420040a..9d3101c0 100644 --- a/hosts/surtr/default.nix +++ b/hosts/surtr/default.nix | |||
| @@ -7,7 +7,7 @@ with lib; | |||
| 7 | tmpfs-root qemu-guest openssh rebuild-machines zfs | 7 | tmpfs-root qemu-guest openssh rebuild-machines zfs |
| 8 | ./zfs.nix ./dns ./tls ./http ./bifrost ./matrix ./postgresql | 8 | ./zfs.nix ./dns ./tls ./http ./bifrost ./matrix ./postgresql |
| 9 | ./prometheus ./email ./vpn ./borg.nix ./etebase ./immich.nix | 9 | ./prometheus ./email ./vpn ./borg.nix ./etebase ./immich.nix |
| 10 | ./paperless.nix ./hledger.nix ./audiobookshelf.nix | 10 | ./paperless.nix ./hledger.nix ./audiobookshelf.nix ./kimai.nix |
| 11 | ]; | 11 | ]; |
| 12 | 12 | ||
| 13 | config = { | 13 | config = { |
diff --git a/hosts/surtr/dns/default.nix b/hosts/surtr/dns/default.nix index 7aa3fb00..8aca2b97 100644 --- a/hosts/surtr/dns/default.nix +++ b/hosts/surtr/dns/default.nix | |||
| @@ -157,7 +157,7 @@ in { | |||
| 157 | ${concatMapStringsSep "\n" mkZone [ | 157 | ${concatMapStringsSep "\n" mkZone [ |
| 158 | { domain = "yggdrasil.li"; | 158 | { domain = "yggdrasil.li"; |
| 159 | addACLs = { "yggdrasil.li" = ["ymir_acme_acl"]; }; | 159 | addACLs = { "yggdrasil.li" = ["ymir_acme_acl"]; }; |
| 160 | acmeDomains = ["surtr.yggdrasil.li" "yggdrasil.li" "etesync.yggdrasil.li" "immich.yggdrasil.li" "app.etesync.yggdrasil.li" "paperless.yggdrasil.li" "hledger.yggdrasil.li" "audiobookshelf.yggdrasil.li"]; | 160 | acmeDomains = ["surtr.yggdrasil.li" "yggdrasil.li" "etesync.yggdrasil.li" "immich.yggdrasil.li" "app.etesync.yggdrasil.li" "paperless.yggdrasil.li" "hledger.yggdrasil.li" "audiobookshelf.yggdrasil.li" "kimai.yggdrasil.li"]; |
| 161 | } | 161 | } |
| 162 | { domain = "nights.email"; | 162 | { domain = "nights.email"; |
| 163 | addACLs = { "nights.email" = ["ymir_acme_acl"]; }; | 163 | addACLs = { "nights.email" = ["ymir_acme_acl"]; }; |
diff --git a/hosts/surtr/dns/keys/kimai.yggdrasil.li_acme b/hosts/surtr/dns/keys/kimai.yggdrasil.li_acme new file mode 100644 index 00000000..bdfb135a --- /dev/null +++ b/hosts/surtr/dns/keys/kimai.yggdrasil.li_acme | |||
| @@ -0,0 +1,19 @@ | |||
| 1 | { | ||
| 2 | "data": "ENC[AES256_GCM,data:sKFt4pH0Xn7Qm6JFMg/2N7Ht7jtMJukfN+U3dQaoYXPbhRJ+heEtDpXV/WP4AlfbfpIOgTPW3mcmQCwKFNhS00vEsQA4728FfXZzDDmZCa3hwg51wDbL7XUOr0OePgzi86lt0Q193K6CkGqEAa1vFIb//ElEfBYIwdATbmcoAsM3mHhz58X7c1qf8LNuB93o/1N2xXXZI3NWOhOjlviTc2DAhffXDwlMJSYUhldnwtDKmLM1mooJzLgm2p9w7gRD7WPqEqZFq9uFDK69P9uX5T9hFHg=,iv:rAE4sYxxLou4tyD4RWTp3LjQP0cya95coy1MvwfEK/U=,tag:u4SSk8SZFlj0ks7d6tDocw==,type:str]", | ||
| 3 | "sops": { | ||
| 4 | "age": [ | ||
| 5 | { | ||
| 6 | "recipient": "age1rmmhetcmllq0ahl5qznlr0eya2zdxwl9h6y5wnl97d2wtyx5t99sm2u866", | ||
| 7 | "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB2KzdNUWhEcDB6QmtUTnVh\nNS9Nc2I4UjAzekxhRXo1UmY3SklPejV1TURJCm9NY2lVOERoMDFKTU56Mmh1NHEr\naGV4M1RoVldHV0xyc3Z0MnVqakpjMFUKLS0tIEYxSk9OUm9kMkdtcG5POWRGQVkx\nY1FEaXYwMGo0L0Z0aTVTZDA5aUFDWEUKJ+e/7lR/rNPNVnIy+wkiKiAYMxWp4L7q\nwnSTx451vSnxv9j3JWB43Y7XQC08cisWDj06ULw8FnEbKYOvTYj9mQ==\n-----END AGE ENCRYPTED FILE-----\n" | ||
| 8 | }, | ||
| 9 | { | ||
| 10 | "recipient": "age19a7j77w267z04zls7m28a8hj4a0g5af6ltye2d5wypg33c3l89csd4r9zq", | ||
| 11 | "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBwOTU3dUEzaXM5T1VkbDRO\nMm14OG1mUkk2bDRhdnBsMHBkc3kvUzlyNlQwCktFSHJhMnhoQ2J6bC9vUHNLWTRC\nRFpYeHo3N2xjWUhjQnRwQ2Nrc1pRUmsKLS0tIDdPeFBVdkxDd1JWSmcxQ0tLMTBD\ncHU3VExZOUhYUlJvbGNoK3FMK2VIbGMKFk94P9aBY04CPIi983f3Aalgh4fnU+/K\n2mxawSMf9jz8704N5XJfmr2hwNy8hqLIn8bjsEMAPTfE1YBGga4w0g==\n-----END AGE ENCRYPTED FILE-----\n" | ||
| 12 | } | ||
| 13 | ], | ||
| 14 | "lastmodified": "2025-05-24T09:42:23Z", | ||
| 15 | "mac": "ENC[AES256_GCM,data:diCeJGvBmM0Ng722eKoFwDe7pqZrdLPSLn5j9LfdaFI64BAbSbA5bAq4NFXqdJ1vttarD2A5rEafYoXUxP8228x2GhNyWUGW5AWgBjVPUc59gjs4wYKR5HlkVMIadhTwNheEyoEjrxX40GNBgCG7X3ocOtOYKbKECp433gdAPDg=,iv:d+yJMWj2RyFnveo2ZNrpNeV+amXM+H7vdC0A2F7mwjA=,tag:yjibG2iusdprp0ORghYWhw==,type:str]", | ||
| 16 | "unencrypted_suffix": "_unencrypted", | ||
| 17 | "version": "3.10.2" | ||
| 18 | } | ||
| 19 | } | ||
diff --git a/hosts/surtr/dns/zones/li.yggdrasil.soa b/hosts/surtr/dns/zones/li.yggdrasil.soa index 7273827b..ebb298b4 100644 --- a/hosts/surtr/dns/zones/li.yggdrasil.soa +++ b/hosts/surtr/dns/zones/li.yggdrasil.soa | |||
| @@ -1,7 +1,7 @@ | |||
| 1 | $ORIGIN yggdrasil.li. | 1 | $ORIGIN yggdrasil.li. |
| 2 | $TTL 3600 | 2 | $TTL 3600 |
| 3 | @ IN SOA ns.yggdrasil.li. hostmaster.yggdrasil.li ( | 3 | @ IN SOA ns.yggdrasil.li. hostmaster.yggdrasil.li ( |
| 4 | 2025050900 ; serial | 4 | 2025052400 ; serial |
| 5 | 10800 ; refresh | 5 | 10800 ; refresh |
| 6 | 3600 ; retry | 6 | 3600 ; retry |
| 7 | 604800 ; expire | 7 | 604800 ; expire |
| @@ -101,6 +101,14 @@ _acme-challenge.audiobookshelf IN NS ns.yggdrasil.li. | |||
| 101 | 101 | ||
| 102 | audiobookshelf IN HTTPS 1 . alpn="h2,h3" ipv4hint="202.61.241.61" ipv6hint="2a03:4000:52:ada::" | 102 | audiobookshelf IN HTTPS 1 . alpn="h2,h3" ipv4hint="202.61.241.61" ipv6hint="2a03:4000:52:ada::" |
| 103 | 103 | ||
| 104 | kimai IN A 202.61.241.61 | ||
| 105 | kimai IN AAAA 2a03:4000:52:ada:: | ||
| 106 | kimai IN MX 0 surtr.yggdrasil.li | ||
| 107 | kimai IN TXT "v=spf1 redirect=surtr.yggdrasil.li" | ||
| 108 | _acme-challenge.kimai IN NS ns.yggdrasil.li. | ||
| 109 | |||
| 110 | kimai IN HTTPS 1 . alpn="h2,h3" ipv4hint="202.61.241.61" ipv6hint="2a03:4000:52:ada::" | ||
| 111 | |||
| 104 | vidhar IN AAAA 2a03:4000:52:ada:4:1:: | 112 | vidhar IN AAAA 2a03:4000:52:ada:4:1:: |
| 105 | vidhar IN MX 0 ymir.yggdrasil.li | 113 | vidhar IN MX 0 ymir.yggdrasil.li |
| 106 | vidhar IN TXT "v=spf1 redirect=yggdrasil.li" | 114 | vidhar IN TXT "v=spf1 redirect=yggdrasil.li" |
diff --git a/hosts/surtr/kimai.nix b/hosts/surtr/kimai.nix new file mode 100644 index 00000000..a3712bb2 --- /dev/null +++ b/hosts/surtr/kimai.nix | |||
| @@ -0,0 +1,66 @@ | |||
| 1 | { config, ... }: | ||
| 2 | |||
| 3 | { | ||
| 4 | config = { | ||
| 5 | security.acme.rfc2136Domains = { | ||
| 6 | "kimai.yggdrasil.li" = { | ||
| 7 | restartUnits = ["nginx.service"]; | ||
| 8 | }; | ||
| 9 | }; | ||
| 10 | |||
| 11 | services.nginx = { | ||
| 12 | upstreams."kimai" = { | ||
| 13 | servers = { | ||
| 14 | "[2a03:4000:52:ada:6::2]:80" = {}; | ||
| 15 | }; | ||
| 16 | extraConfig = '' | ||
| 17 | keepalive 8; | ||
| 18 | ''; | ||
| 19 | }; | ||
| 20 | virtualHosts = { | ||
| 21 | "kimai.yggdrasil.li" = { | ||
| 22 | kTLS = true; | ||
| 23 | http3 = true; | ||
| 24 | forceSSL = true; | ||
| 25 | sslCertificate = "/run/credentials/nginx.service/kimai.yggdrasil.li.pem"; | ||
| 26 | sslCertificateKey = "/run/credentials/nginx.service/kimai.yggdrasil.li.key.pem"; | ||
| 27 | sslTrustedCertificate = "/run/credentials/nginx.service/kimai.yggdrasil.li.chain.pem"; | ||
| 28 | extraConfig = '' | ||
| 29 | charset utf-8; | ||
| 30 | ''; | ||
| 31 | |||
| 32 | locations = { | ||
| 33 | "/".extraConfig = '' | ||
| 34 | proxy_pass http://kimai; | ||
| 35 | |||
| 36 | proxy_http_version 1.1; | ||
| 37 | proxy_set_header Upgrade $http_upgrade; | ||
| 38 | proxy_set_header Connection "upgrade"; | ||
| 39 | |||
| 40 | proxy_redirect off; | ||
| 41 | proxy_set_header Host $host; | ||
| 42 | proxy_set_header X-Real-IP $remote_addr; | ||
| 43 | proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | ||
| 44 | proxy_set_header X-Forwarded-Host $server_name; | ||
| 45 | proxy_set_header X-Forwarded-Proto $scheme; | ||
| 46 | |||
| 47 | client_max_body_size 0; | ||
| 48 | proxy_request_buffering off; | ||
| 49 | proxy_buffering off; | ||
| 50 | ''; | ||
| 51 | }; | ||
| 52 | }; | ||
| 53 | }; | ||
| 54 | }; | ||
| 55 | |||
| 56 | systemd.services.nginx = { | ||
| 57 | serviceConfig = { | ||
| 58 | LoadCredential = [ | ||
| 59 | "kimai.yggdrasil.li.key.pem:${config.security.acme.certs."kimai.yggdrasil.li".directory}/key.pem" | ||
| 60 | "kimai.yggdrasil.li.pem:${config.security.acme.certs."kimai.yggdrasil.li".directory}/fullchain.pem" | ||
| 61 | "kimai.yggdrasil.li.chain.pem:${config.security.acme.certs."kimai.yggdrasil.li".directory}/chain.pem" | ||
| 62 | ]; | ||
| 63 | }; | ||
| 64 | }; | ||
| 65 | }; | ||
| 66 | } | ||
diff --git a/hosts/surtr/tls/tsig_keys/kimai.yggdrasil.li b/hosts/surtr/tls/tsig_keys/kimai.yggdrasil.li new file mode 100644 index 00000000..b9199975 --- /dev/null +++ b/hosts/surtr/tls/tsig_keys/kimai.yggdrasil.li | |||
| @@ -0,0 +1,19 @@ | |||
| 1 | { | ||
| 2 | "data": "ENC[AES256_GCM,data:ATcU3Ix7o5d/49rD5H8je1ozTjoghrloMh5DIZ5WE3oYauUAknpGfr9xq92V,iv:vy9YK5Ot7CCjMtgAGVeAUQuaSw4F5kmmZ0GJYV9kCdQ=,tag:F/MXTUM2AI1fGXa9Ewn8yQ==,type:str]", | ||
| 3 | "sops": { | ||
| 4 | "age": [ | ||
| 5 | { | ||
| 6 | "recipient": "age1rmmhetcmllq0ahl5qznlr0eya2zdxwl9h6y5wnl97d2wtyx5t99sm2u866", | ||
| 7 | "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBDMEF0cUdydERYVzJCa3pW\nTlo0NUFON0d5RGJFVnVTNVg3cjNEUERQMEdFClEvQW5odlNEd2F1VTFmMWQrL2RB\ncllFZVpIVVJrNTJsSGF4UEdZMnVmQzAKLS0tIFUrQkkzRVZiOFNiTnFCT1pEYVRM\nQm8wV1JkQ3RrR1dkL0FsNkhsY2kxa1kKGnAo/6oibgXexUU31THdLu6X+pRtrkjD\nZnXGPZ2xaESDVUVEYQPVpNrjt9brZGJBI1BasrkEwHAXMbJC236yYQ==\n-----END AGE ENCRYPTED FILE-----\n" | ||
| 8 | }, | ||
| 9 | { | ||
| 10 | "recipient": "age19a7j77w267z04zls7m28a8hj4a0g5af6ltye2d5wypg33c3l89csd4r9zq", | ||
| 11 | "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB3MGs1Z2ZqK2pqWHdVYTJH\naTlncHdPa3Zld0JhQW5Ccmc1SStWSnlDR0JrCmpML2d4TGdldUdoZCtaWVpPZVl0\nVm4waWVBS1orRS90ZS96N0Y2M29LY0UKLS0tIEI1Z2VVbVVxRUpOZEN4NnBRRklC\nQXloelZCb04xbmduTlVuL005TlRGMHMKfLB6zA3sj3HgDBC7VGfGVB6I1zJpt0PV\nkCV2yADgvAA2pT9HPg9IWAEpTPysOBiuE2jPNtFvylZYwTDHoumFnQ==\n-----END AGE ENCRYPTED FILE-----\n" | ||
| 12 | } | ||
| 13 | ], | ||
| 14 | "lastmodified": "2025-05-24T09:42:23Z", | ||
| 15 | "mac": "ENC[AES256_GCM,data:0pk1LpWPmX9td/TwJFxwWp5pTDyW78UtHXMDah+V9Tmgi8hH7ONdysgjwpDwS/c4zGnMA3qtobEL286U3//CTXt2qVsiUGLsnngzs2E6yBg8oGMYlGrch4M355Fl5ZxYsc8QLA6qWcuZ4H3QW8PnoqdJixcHoYLoxG01dzh4Bc0=,iv:zchk4enI1D80BkJLji5RLm7OTk3GeF8nYHuwqBxCXIM=,tag:bgkknPMqkSidi6bDFfv6UQ==,type:str]", | ||
| 16 | "unencrypted_suffix": "_unencrypted", | ||
| 17 | "version": "3.10.2" | ||
| 18 | } | ||
| 19 | } | ||
diff --git a/hosts/vidhar/default.nix b/hosts/vidhar/default.nix index c9470ee9..7da17e6f 100644 --- a/hosts/vidhar/default.nix +++ b/hosts/vidhar/default.nix | |||
| @@ -4,7 +4,7 @@ with lib; | |||
| 4 | 4 | ||
| 5 | { | 5 | { |
| 6 | imports = with flake.nixosModules.systemProfiles; [ | 6 | imports = with flake.nixosModules.systemProfiles; [ |
| 7 | ./zfs.nix ./network ./samba.nix ./dns ./prometheus ./borg ./pgbackrest ./postgresql.nix ./immich.nix ./paperless ./hledger ./audiobookshelf | 7 | ./zfs.nix ./network ./samba.nix ./dns ./prometheus ./borg ./pgbackrest ./postgresql.nix ./immich.nix ./paperless ./hledger ./audiobookshelf ./kimai |
| 8 | tmpfs-root zfs | 8 | tmpfs-root zfs |
| 9 | initrd-all-crypto-modules default-locale openssh rebuild-machines | 9 | initrd-all-crypto-modules default-locale openssh rebuild-machines |
| 10 | build-server | 10 | build-server |
diff --git a/hosts/vidhar/kimai/default.nix b/hosts/vidhar/kimai/default.nix new file mode 100644 index 00000000..0258697b --- /dev/null +++ b/hosts/vidhar/kimai/default.nix | |||
| @@ -0,0 +1,89 @@ | |||
| 1 | { flake, config, ... }: | ||
| 2 | |||
| 3 | { | ||
| 4 | config = { | ||
| 5 | boot.enableContainers = true; | ||
| 6 | boot.kernel.sysctl = { | ||
| 7 | "net.netfilter.nf_log_all_netns" = true; | ||
| 8 | }; | ||
| 9 | |||
| 10 | containers."kimai" = { | ||
| 11 | autoStart = true; | ||
| 12 | ephemeral = true; | ||
| 13 | bindMounts = { | ||
| 14 | "/var/lib/kimai" = { | ||
| 15 | hostPath = "/var/lib/kimai/state"; | ||
| 16 | isReadOnly = false; | ||
| 17 | }; | ||
| 18 | "/var/lib/mysql" = { | ||
| 19 | hostPath = "/var/lib/kimai/mysql"; | ||
| 20 | isReadOnly = false; | ||
| 21 | }; | ||
| 22 | }; | ||
| 23 | privateNetwork = true; | ||
| 24 | # forwardPorts = [ | ||
| 25 | # { containerPort = 80; | ||
| 26 | # hostPort = 28983; | ||
| 27 | # } | ||
| 28 | # ]; | ||
| 29 | hostAddress = "192.168.52.113"; | ||
| 30 | localAddress = "192.168.52.114"; | ||
| 31 | hostAddress6 = "2a03:4000:52:ada:6::1"; | ||
| 32 | localAddress6 = "2a03:4000:52:ada:6::2"; | ||
| 33 | config = let hostConfig = config; in { config, pkgs, lib, ... }: { | ||
| 34 | system.stateVersion = lib.mkIf hostConfig.containers."kimai".ephemeral config.system.nixos.release; | ||
| 35 | system.configurationRevision = lib.mkIf (flake ? rev) flake.rev; | ||
| 36 | nixpkgs.pkgs = hostConfig.nixpkgs.pkgs; | ||
| 37 | |||
| 38 | services.kimai.sites."kimai.yggdrasil.li" = { | ||
| 39 | database.socket = "/run/mysqld/mysqld.sock"; | ||
| 40 | }; | ||
| 41 | |||
| 42 | networking = { | ||
| 43 | useDHCP = false; | ||
| 44 | useNetworkd = true; | ||
| 45 | useHostResolvConf = false; | ||
| 46 | firewall.enable = false; | ||
| 47 | nftables = { | ||
| 48 | enable = true; | ||
| 49 | rulesetFile = ./ruleset.nft; | ||
| 50 | }; | ||
| 51 | }; | ||
| 52 | |||
| 53 | services.resolved.fallbackDns = [ | ||
| 54 | "9.9.9.10#dns10.quad9.net" | ||
| 55 | "149.112.112.10#dns10.quad9.net" | ||
| 56 | "2620:fe::10#dns10.quad9.net" | ||
| 57 | "2620:fe::fe:10#dns10.quad9.net" | ||
| 58 | ]; | ||
| 59 | |||
| 60 | systemd.network = { | ||
| 61 | networks.upstream = { | ||
| 62 | name = "eth0"; | ||
| 63 | matchConfig = { | ||
| 64 | Name = "eth0"; | ||
| 65 | }; | ||
| 66 | linkConfig = { | ||
| 67 | RequiredForOnline = true; | ||
| 68 | }; | ||
| 69 | networkConfig = { | ||
| 70 | Address = [ "192.168.52.114/32" "2a03:4000:52:ada:6::2/128" ]; | ||
| 71 | LLMNR = false; | ||
| 72 | MulticastDNS = false; | ||
| 73 | }; | ||
| 74 | routes = [ | ||
| 75 | { Destination = "192.168.52.113/32"; } | ||
| 76 | { Destination = "2a03:4000:52:ada:6::1/128"; } | ||
| 77 | { Destination = "0.0.0.0/0"; | ||
| 78 | Gateway = "192.168.52.113"; | ||
| 79 | } | ||
| 80 | { Destination = "::/0"; | ||
| 81 | Gateway = "2a03:4000:52:ada:6::1"; | ||
| 82 | } | ||
| 83 | ]; | ||
| 84 | }; | ||
| 85 | }; | ||
| 86 | }; | ||
| 87 | }; | ||
| 88 | }; | ||
| 89 | } | ||
diff --git a/hosts/vidhar/kimai/ruleset.nft b/hosts/vidhar/kimai/ruleset.nft new file mode 100644 index 00000000..ad4db6d5 --- /dev/null +++ b/hosts/vidhar/kimai/ruleset.nft | |||
| @@ -0,0 +1,149 @@ | |||
| 1 | define icmp_protos = {ipv6-icmp, icmp, igmp} | ||
| 2 | |||
| 3 | table arp filter { | ||
| 4 | limit lim_arp { | ||
| 5 | rate over 50 mbytes/second burst 50 mbytes | ||
| 6 | } | ||
| 7 | |||
| 8 | counter arp-rx {} | ||
| 9 | counter arp-tx {} | ||
| 10 | |||
| 11 | counter arp-ratelimit-rx {} | ||
| 12 | counter arp-ratelimit-tx {} | ||
| 13 | |||
| 14 | chain input { | ||
| 15 | type filter hook input priority filter | ||
| 16 | policy accept | ||
| 17 | |||
| 18 | limit name lim_arp counter name arp-ratelimit-rx drop | ||
| 19 | |||
| 20 | counter name arp-rx | ||
| 21 | } | ||
| 22 | |||
| 23 | chain output { | ||
| 24 | type filter hook output priority filter | ||
| 25 | policy accept | ||
| 26 | |||
| 27 | limit name lim_arp counter name arp-ratelimit-tx drop | ||
| 28 | |||
| 29 | counter name arp-tx | ||
| 30 | } | ||
| 31 | } | ||
| 32 | |||
| 33 | table inet filter { | ||
| 34 | limit lim_reject { | ||
| 35 | rate over 1000/second burst 1000 packets | ||
| 36 | } | ||
| 37 | |||
| 38 | limit lim_icmp { | ||
| 39 | rate over 50 mbytes/second burst 50 mbytes | ||
| 40 | } | ||
| 41 | |||
| 42 | counter invalid-fw {} | ||
| 43 | counter fw-lo {} | ||
| 44 | |||
| 45 | counter reject-ratelimit-fw {} | ||
| 46 | counter reject-fw {} | ||
| 47 | counter reject-tcp-fw {} | ||
| 48 | counter reject-icmp-fw {} | ||
| 49 | |||
| 50 | counter drop-fw {} | ||
| 51 | |||
| 52 | counter invalid-rx {} | ||
| 53 | |||
| 54 | counter rx-lo {} | ||
| 55 | counter invalid-local4-rx {} | ||
| 56 | counter invalid-local6-rx {} | ||
| 57 | |||
| 58 | counter icmp-ratelimit-rx {} | ||
| 59 | counter icmp-rx {} | ||
| 60 | |||
| 61 | counter kimai-rx {} | ||
| 62 | |||
| 63 | counter established-rx {} | ||
| 64 | |||
| 65 | counter reject-ratelimit-rx {} | ||
| 66 | counter reject-rx {} | ||
| 67 | counter reject-tcp-rx {} | ||
| 68 | counter reject-icmp-rx {} | ||
| 69 | |||
| 70 | counter drop-rx {} | ||
| 71 | |||
| 72 | counter tx-lo {} | ||
| 73 | |||
| 74 | counter icmp-ratelimit-tx {} | ||
| 75 | counter icmp-tx {} | ||
| 76 | |||
| 77 | counter kimai-tx {} | ||
| 78 | |||
| 79 | counter tx {} | ||
| 80 | |||
| 81 | chain forward { | ||
| 82 | type filter hook forward priority filter | ||
| 83 | policy drop | ||
| 84 | |||
| 85 | |||
| 86 | ct state invalid log level debug prefix "kimai: drop invalid forward: " counter name invalid-fw drop | ||
| 87 | |||
| 88 | |||
| 89 | iifname lo counter name fw-lo accept | ||
| 90 | |||
| 91 | |||
| 92 | limit name lim_reject log level debug prefix "kimai: drop forward: " counter name reject-ratelimit-fw drop | ||
| 93 | log level debug prefix "kimai: reject forward: " counter name reject-fw | ||
| 94 | meta l4proto tcp ct state new counter name reject-tcp-fw reject with tcp reset | ||
| 95 | ct state new counter name reject-icmp-fw reject | ||
| 96 | |||
| 97 | |||
| 98 | counter name drop-fw | ||
| 99 | } | ||
| 100 | |||
| 101 | chain input { | ||
| 102 | type filter hook input priority filter | ||
| 103 | policy drop | ||
| 104 | |||
| 105 | |||
| 106 | ct state invalid log level debug prefix "kimai: drop invalid input: " counter name invalid-rx drop | ||
| 107 | |||
| 108 | |||
| 109 | iifname lo counter name rx-lo accept | ||
| 110 | iif != lo ip daddr 127.0.0.1/8 counter name invalid-local4-rx reject | ||
| 111 | iif != lo ip6 daddr ::1/128 counter name invalid-local6-rx reject | ||
| 112 | |||
| 113 | |||
| 114 | meta l4proto $icmp_protos limit name lim_icmp counter name icmp-ratelimit-rx drop | ||
| 115 | meta l4proto $icmp_protos counter name icmp-rx accept | ||
| 116 | |||
| 117 | |||
| 118 | tcp dport 80 counter name kimai-rx accept | ||
| 119 | |||
| 120 | |||
| 121 | ct state { established, related } counter name established-rx accept | ||
| 122 | |||
| 123 | |||
| 124 | limit name lim_reject log level debug prefix "kimai: drop input: " counter name reject-ratelimit-rx drop | ||
| 125 | log level debug prefix "kimai: reject input: " counter name reject-rx | ||
| 126 | meta l4proto tcp ct state new counter name reject-tcp-rx reject with tcp reset | ||
| 127 | ct state new counter name reject-icmp-rx reject | ||
| 128 | |||
| 129 | |||
| 130 | counter name drop-rx | ||
| 131 | } | ||
| 132 | |||
| 133 | chain output { | ||
| 134 | type filter hook output priority filter | ||
| 135 | policy accept | ||
| 136 | |||
| 137 | |||
| 138 | oifname lo counter name tx-lo accept | ||
| 139 | |||
| 140 | meta l4proto $icmp_protos limit name lim_icmp counter name icmp-ratelimit-tx drop | ||
| 141 | meta l4proto $icmp_protos counter name icmp-tx accept | ||
| 142 | |||
| 143 | |||
| 144 | tcp sport 80 counter name kimai-tx | ||
| 145 | |||
| 146 | |||
| 147 | counter name tx | ||
| 148 | } | ||
| 149 | } | ||
diff --git a/hosts/vidhar/network/ruleset.nft b/hosts/vidhar/network/ruleset.nft index 6b0ac9fc..7897fb3d 100644 --- a/hosts/vidhar/network/ruleset.nft +++ b/hosts/vidhar/network/ruleset.nft | |||
| @@ -60,6 +60,7 @@ table inet filter { | |||
| 60 | counter fw-lo {} | 60 | counter fw-lo {} |
| 61 | counter fw-lan {} | 61 | counter fw-lan {} |
| 62 | counter fw-gpon {} | 62 | counter fw-gpon {} |
| 63 | counter fw-kimai {} | ||
| 63 | 64 | ||
| 64 | counter fw-cups {} | 65 | counter fw-cups {} |
| 65 | 66 | ||
| @@ -95,6 +96,7 @@ table inet filter { | |||
| 95 | counter paperless-rx {} | 96 | counter paperless-rx {} |
| 96 | counter hledger-rx {} | 97 | counter hledger-rx {} |
| 97 | counter audiobookshelf-rx {} | 98 | counter audiobookshelf-rx {} |
| 99 | counter kimai-rx {} | ||
| 98 | 100 | ||
| 99 | counter established-rx {} | 101 | counter established-rx {} |
| 100 | 102 | ||
| @@ -127,6 +129,7 @@ table inet filter { | |||
| 127 | counter paperless-tx {} | 129 | counter paperless-tx {} |
| 128 | counter hledger-tx {} | 130 | counter hledger-tx {} |
| 129 | counter audiobookshelf-tx {} | 131 | counter audiobookshelf-tx {} |
| 132 | counter kimai-tx {} | ||
| 130 | 133 | ||
| 131 | counter tx {} | 134 | counter tx {} |
| 132 | 135 | ||
| @@ -150,8 +153,13 @@ table inet filter { | |||
| 150 | 153 | ||
| 151 | oifname { lan, gpon, bifrost } meta l4proto $icmp_protos jump forward_icmp_accept | 154 | oifname { lan, gpon, bifrost } meta l4proto $icmp_protos jump forward_icmp_accept |
| 152 | iifname lan oifname { gpon, bifrost } counter name fw-lan accept | 155 | iifname lan oifname { gpon, bifrost } counter name fw-lan accept |
| 156 | iifname ve-kimai oifname gpon counter name fw-kimai accept | ||
| 153 | 157 | ||
| 154 | iifname gpon oifname lan ct state { established, related } counter name fw-gpon accept | 158 | iifname gpon oifname lan ct state { established, related } counter name fw-gpon accept |
| 159 | iifname gpon oifname ve-kimai ct state { established, related } counter name fw-kimai accept | ||
| 160 | |||
| 161 | iifname bifrost oifname ve-kimai tcp dport 80 ip6 saddr $bifrost_surtr ip6 daddr 2a03:4000:52:ada:6::2 counter name kimai-rx accept | ||
| 162 | iifname ve-kimai oifname bifrost tcp sport 80 ip6 saddr 2a03:4000:52:ada:6::2 ip6 daddr $bifrost_surtr counter name kimai-tx accept | ||
| 155 | 163 | ||
| 156 | 164 | ||
| 157 | limit name lim_reject log level debug prefix "drop forward: " counter name reject-ratelimit-fw drop | 165 | limit name lim_reject log level debug prefix "drop forward: " counter name reject-ratelimit-fw drop |
| @@ -266,7 +274,7 @@ table inet filter { | |||
| 266 | 274 | ||
| 267 | table inet nat { | 275 | table inet nat { |
| 268 | counter gpon-nat {} | 276 | counter gpon-nat {} |
| 269 | # counter container-nat {} | 277 | counter kimai-nat {} |
| 270 | 278 | ||
| 271 | chain postrouting { | 279 | chain postrouting { |
| 272 | type nat hook postrouting priority srcnat | 280 | type nat hook postrouting priority srcnat |
| @@ -274,7 +282,7 @@ table inet nat { | |||
| 274 | 282 | ||
| 275 | 283 | ||
| 276 | meta nfproto ipv4 oifname gpon counter name gpon-nat masquerade | 284 | meta nfproto ipv4 oifname gpon counter name gpon-nat masquerade |
| 277 | # iifname ve-* oifname gpon counter name container-nat masquerade | 285 | iifname ve-kimai oifname gpon counter name kimai-nat masquerade |
| 278 | } | 286 | } |
| 279 | } | 287 | } |
| 280 | 288 | ||
