]>
Commit | Line | Data |
---|---|---|
a1bb33c4 IB |
1 | { |
2 | network = { | |
3 | description = "Immae's network"; | |
4 | enableRollback = true; | |
5 | }; | |
6 | ||
7fff3ab2 IB |
7 | # FIXME: improve purity by enforcing sandbox = true in |
8 | # /etc/nix/nix.conf (need to do something about environment variables | |
9 | # before) | |
10 | ||
f3d9c61e IB |
11 | # Full backup: |
12 | # The star after /var/lib/* avoids deleting all folders in case of problem | |
13 | # rsync -e "ssh -i /root/.ssh/id_charon_vpn" -aAXvz --delete --numeric-ids --super --rsync-path="sudo rsync" /var/lib/* immae@immae.eu: | |
f8bde3d6 | 14 | eldiron = { config, pkgs, mylibs, myconfig, ... }: |
4d4f13f4 | 15 | with mylibs; |
ab5d04b8 | 16 | { |
4d4f13f4 IB |
17 | _module.args = { |
18 | mylibs = import ../libs.nix; | |
f8bde3d6 IB |
19 | myconfig = { |
20 | ips = { | |
21 | main = "176.9.151.89"; | |
22 | production = "176.9.151.154"; | |
23 | integration = "176.9.151.155"; | |
24 | }; | |
25 | }; | |
4d4f13f4 IB |
26 | }; |
27 | ||
28 | imports = [ | |
3013caf1 | 29 | ./modules/certificates.nix |
10889174 IB |
30 | ./modules/gitolite |
31 | ./modules/databases | |
54307da4 | 32 | ./modules/websites |
4d4f13f4 IB |
33 | ]; |
34 | services.myGitolite.enable = true; | |
4d4f13f4 | 35 | services.myDatabases.enable = true; |
42429ef0 IB |
36 | services.myWebsites.production.enable = true; |
37 | services.myWebsites.integration.enable = true; | |
10889174 | 38 | services.myWebsites.tools.enable = true; |
4d4f13f4 | 39 | |
a1bb33c4 IB |
40 | networking = { |
41 | firewall = { | |
42 | enable = true; | |
10889174 | 43 | allowedTCPPorts = [ 22 ]; |
a1bb33c4 IB |
44 | }; |
45 | }; | |
46 | ||
47 | deployment = { | |
48 | targetEnv = "hetzner"; | |
49 | hetzner = { | |
50 | #robotUser = "defined in HETZNER_ROBOT_USER"; | |
51 | #robotPass = "defined in HETZNER_ROBOT_PASS"; | |
f8bde3d6 | 52 | mainIPv4 = myconfig.ips.main; |
a1bb33c4 IB |
53 | partitions = '' |
54 | clearpart --all --initlabel --drives=sda,sdb | |
55 | ||
56 | part swap1 --recommended --label=swap1 --fstype=swap --ondisk=sda | |
57 | part swap2 --recommended --label=swap2 --fstype=swap --ondisk=sdb | |
58 | ||
59 | part raid.1 --grow --ondisk=sda | |
60 | part raid.2 --grow --ondisk=sdb | |
61 | ||
62 | raid / --level=1 --device=md0 --fstype=ext4 --label=root raid.1 raid.2 | |
63 | ''; | |
64 | }; | |
65 | }; | |
66 | ||
10889174 | 67 | environment.systemPackages = [ |
ce6ee3b8 | 68 | pkgs.telnet |
beeed847 | 69 | pkgs.htop |
ce6ee3b8 IB |
70 | pkgs.vim |
71 | ]; | |
72 | ||
5566d26d IB |
73 | services.openssh.extraConfig = '' |
74 | AuthorizedKeysCommand /etc/ssh/ldap_authorized_keys | |
75 | AuthorizedKeysCommandUser nobody | |
76 | ''; | |
77 | ||
5566d26d IB |
78 | environment.etc."ssh/ldap_authorized_keys" = let |
79 | ldap_authorized_keys = | |
5c101474 IB |
80 | assert checkEnv "NIXOPS_SSHD_LDAP_PASSWORD"; |
81 | wrap { | |
5566d26d IB |
82 | name = "ldap_authorized_keys"; |
83 | file = ./ldap_authorized_keys.sh; | |
84 | vars = { | |
85 | LDAP_PASS = builtins.getEnv "NIXOPS_SSHD_LDAP_PASSWORD"; | |
86 | GITOLITE_SHELL = "${pkgs.gitolite}/bin/gitolite-shell"; | |
87 | ECHO = "${pkgs.coreutils}/bin/echo"; | |
88 | }; | |
89 | paths = [ pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.gnused pkgs.coreutils ]; | |
90 | }; | |
91 | in { | |
92 | enable = true; | |
93 | mode = "0755"; | |
94 | user = "root"; | |
95 | source = ldap_authorized_keys; | |
65fe7543 IB |
96 | }; |
97 | ||
a1bb33c4 IB |
98 | }; |
99 | } |