mio-ops/profiles/cardano-node.nix

70 lines
1.6 KiB
Nix
Raw Normal View History

2020-05-13 04:59:08 +00:00
# NixOps configuration for the hosts running a Cardano node
2022-03-07 14:26:15 +00:00
{
config,
pkgs,
lib,
2023-08-03 11:29:09 +00:00
cardano-node,
iohkNix,
2022-03-07 14:26:15 +00:00
...
}: let
2023-08-03 11:29:09 +00:00
cardanoNodeProject = import (cardano-node + "/nix") {
gitrev = cardano-node.rev;
2021-11-16 04:57:23 +00:00
};
in {
2023-08-03 11:29:09 +00:00
imports = [../secrets/cardano/producers.nix "${cardano-node.cardano-node}/nix/nixos"];
2020-05-13 04:59:08 +00:00
2022-03-07 14:26:15 +00:00
environment.systemPackages = [cardanoNodeProject.cardano-cli];
2020-05-13 04:59:08 +00:00
services = {
cardano-node = {
enable = true;
2020-07-30 03:01:37 +00:00
environment = "mainnet";
2020-05-13 04:59:08 +00:00
hostAddr = "0.0.0.0";
2022-03-07 14:26:15 +00:00
nodeConfig =
iohkNix.cardanoLib.environments.mainnet.nodeConfig
// {
hasPrometheus = ["127.0.0.1" 12798];
setupScribes = [
{
scKind = "JournalSK";
scName = "cardano";
scFormat = "ScText";
}
];
defaultScribes = [["JournalSK" "cardano"]];
};
2020-05-14 08:17:45 +00:00
kesKey = "/run/keys/cardano-kes";
vrfKey = "/run/keys/cardano-vrf";
operationalCertificate = "/run/keys/cardano-opcert";
2020-05-13 04:59:08 +00:00
};
};
systemd = {
services = {
cardano-node = {
# Ensure cardano-node starts after nixops keys are loaded
after = [
"cardano-kes-key.service"
"cardano-opcert-key.service"
"cardano-vrf-key.service"
];
wants = [
"cardano-kes-key.service"
"cardano-opcert-key.service"
"cardano-vrf-key.service"
];
};
};
};
2020-05-13 04:59:08 +00:00
networking = {
firewall = {
allowedTCPPorts = [
2021-11-16 04:57:23 +00:00
3001 # cardano-node
2020-05-13 04:59:08 +00:00
];
};
};
2022-03-07 14:26:15 +00:00
users.groups.keys.members = ["cardano-node"]; # Required due to NixOps issue #1204
2020-05-13 04:59:08 +00:00
}