]> git.immae.eu Git - perso/Immae/Config/Nix.git/blob - virtual/eldiron.nix
Refactor websites.
[perso/Immae/Config/Nix.git] / virtual / eldiron.nix
1 {
2 network = {
3 description = "Immae's network";
4 enableRollback = true;
5 };
6
7 # Full backup:
8 # The star after /var/lib/* avoids deleting all folders in case of problem
9 # rsync -e "ssh -i /root/.ssh/id_charon_vpn" -aAXvz --delete --numeric-ids --super --rsync-path="sudo rsync" /var/lib/* immae@immae.eu:
10 eldiron = { config, pkgs, mylibs, myconfig, ... }:
11 with mylibs;
12 {
13 _module.args = {
14 mylibs = import ../libs.nix;
15 myconfig = {
16 ips = {
17 main = "176.9.151.89";
18 production = "176.9.151.154";
19 integration = "176.9.151.155";
20 };
21 };
22 };
23
24 imports = [
25 ./modules/certificates.nix
26 ./modules/gitolite
27 ./modules/databases
28 ./modules/websites
29 ];
30 services.myGitolite.enable = true;
31 services.myDatabases.enable = true;
32 services.myWebsites.production.enable = true;
33 services.myWebsites.integration.enable = true;
34 services.myWebsites.tools.enable = true;
35
36 networking = {
37 firewall = {
38 enable = true;
39 allowedTCPPorts = [ 22 ];
40 };
41 };
42
43 deployment = {
44 targetEnv = "hetzner";
45 hetzner = {
46 #robotUser = "defined in HETZNER_ROBOT_USER";
47 #robotPass = "defined in HETZNER_ROBOT_PASS";
48 mainIPv4 = myconfig.ips.main;
49 partitions = ''
50 clearpart --all --initlabel --drives=sda,sdb
51
52 part swap1 --recommended --label=swap1 --fstype=swap --ondisk=sda
53 part swap2 --recommended --label=swap2 --fstype=swap --ondisk=sdb
54
55 part raid.1 --grow --ondisk=sda
56 part raid.2 --grow --ondisk=sdb
57
58 raid / --level=1 --device=md0 --fstype=ext4 --label=root raid.1 raid.2
59 '';
60 };
61 };
62
63 environment.systemPackages = [
64 pkgs.telnet
65 pkgs.htop
66 pkgs.vim
67 ];
68
69 services.openssh.extraConfig = ''
70 AuthorizedKeysCommand /etc/ssh/ldap_authorized_keys
71 AuthorizedKeysCommandUser nobody
72 '';
73
74 environment.etc."ssh/ldap_authorized_keys" = let
75 ldap_authorized_keys =
76 assert checkEnv "NIXOPS_SSHD_LDAP_PASSWORD";
77 wrap {
78 name = "ldap_authorized_keys";
79 file = ./ldap_authorized_keys.sh;
80 vars = {
81 LDAP_PASS = builtins.getEnv "NIXOPS_SSHD_LDAP_PASSWORD";
82 GITOLITE_SHELL = "${pkgs.gitolite}/bin/gitolite-shell";
83 ECHO = "${pkgs.coreutils}/bin/echo";
84 };
85 paths = [ pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.gnused pkgs.coreutils ];
86 };
87 in {
88 enable = true;
89 mode = "0755";
90 user = "root";
91 source = ldap_authorized_keys;
92 };
93
94 };
95 }