X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;ds=inline;f=nixops%2Feldiron.nix;h=3e346d46e60dbd76dd10dbe165309d4c5e10272f;hb=384ec543ef58e2cd8cafb9dad1c284fbc195144a;hp=4726d08ef831bccec5ddb5cfe58e90339853c3c5;hpb=596e62a678366c83ea8204316c45e91e1d90b0d8;p=perso%2FImmae%2FConfig%2FNix.git diff --git a/nixops/eldiron.nix b/nixops/eldiron.nix index 4726d08..3e346d4 100644 --- a/nixops/eldiron.nix +++ b/nixops/eldiron.nix @@ -6,9 +6,10 @@ }; eldiron = { config, pkgs, mylibs, myconfig, ... }: - with mylibs; { _module.args = { + pkgsNext = import {}; + pkgsPrevious = import {}; mylibs = import ../libs.nix { nixpkgs = pkgs; }; mypkgs = import ../default.nix; myconfig = { @@ -23,6 +24,7 @@ }; imports = [ + ./modules/ssh ./modules/certificates.nix ./modules/gitolite ./modules/databases @@ -32,6 +34,9 @@ ./modules/ftp ./modules/pub ./modules/task + ./modules/irc + ./modules/buildbot + ./modules/dns ]; services.myGitolite.enable = true; services.myDatabases.enable = true; @@ -39,19 +44,16 @@ services.myWebsites.integration.enable = true; services.myWebsites.tools.enable = true; services.pure-ftpd.enable = true; + services.irc.enable = true; services.pub.enable = true; services.myTasks.enable = true; + services.buildbot.enable = true; services.journald.extraConfig = '' MaxLevelStore="warning" MaxRetentionSec="1year" ''; - networking = { - firewall = { - enable = true; - allowedTCPPorts = [ 22 ]; - }; - }; + networking.firewall.enable = true; deployment = { targetEnv = "hetzner"; @@ -79,30 +81,6 @@ pkgs.vim ]; - services.openssh.extraConfig = '' - AuthorizedKeysCommand /etc/ssh/ldap_authorized_keys - AuthorizedKeysCommandUser nobody - ''; - - environment.etc."ssh/ldap_authorized_keys" = let - ldap_authorized_keys = - wrap { - name = "ldap_authorized_keys"; - file = ./ldap_authorized_keys.sh; - vars = { - LDAP_PASS = myconfig.env.sshd.ldap.password; - GITOLITE_SHELL = "${pkgs.gitolite}/bin/gitolite-shell"; - ECHO = "${pkgs.coreutils}/bin/echo"; - }; - paths = [ pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.gnused pkgs.coreutils ]; - }; - in { - enable = true; - mode = "0755"; - user = "root"; - source = ldap_authorized_keys; - }; - services.cron = { enable = true; systemCronJobs = [