3 description = "Immae's network";
7 eldiron = { config, pkgs, mylibs, myconfig, ... }:
11 mylibs = import ../libs.nix;
13 env = import ./environment.nix;
15 main = "176.9.151.89";
16 production = "176.9.151.154";
17 integration = "176.9.151.155";
23 ./modules/certificates.nix
28 services.myGitolite.enable = true;
29 services.myDatabases.enable = true;
30 services.myWebsites.production.enable = true;
31 services.myWebsites.integration.enable = true;
32 services.myWebsites.tools.enable = true;
37 allowedTCPPorts = [ 22 ];
42 targetEnv = "hetzner";
44 robotUser = myconfig.env.hetzner.user;
45 robotPass = myconfig.env.hetzner.pass;
46 mainIPv4 = myconfig.ips.main;
48 clearpart --all --initlabel --drives=sda,sdb
50 part swap1 --recommended --label=swap1 --fstype=swap --ondisk=sda
51 part swap2 --recommended --label=swap2 --fstype=swap --ondisk=sdb
53 part raid.1 --grow --ondisk=sda
54 part raid.2 --grow --ondisk=sdb
56 raid / --level=1 --device=md0 --fstype=ext4 --label=root raid.1 raid.2
61 environment.systemPackages = [
67 services.openssh.extraConfig = ''
68 AuthorizedKeysCommand /etc/ssh/ldap_authorized_keys
69 AuthorizedKeysCommandUser nobody
72 environment.etc."ssh/ldap_authorized_keys" = let
73 ldap_authorized_keys =
75 name = "ldap_authorized_keys";
76 file = ./ldap_authorized_keys.sh;
78 LDAP_PASS = myconfig.env.sshd.ldap.password;
79 GITOLITE_SHELL = "${pkgs.gitolite}/bin/gitolite-shell";
80 ECHO = "${pkgs.coreutils}/bin/echo";
82 paths = [ pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.gnused pkgs.coreutils ];
88 source = ldap_authorized_keys;