X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=modules%2Fprivate%2Fsystem%2Fbackup-2.nix;h=1f226c0bdff723c766a5bc1d732c1c12ded00ee7;hb=282c67a117b7d349b30a96972b050d630f906dec;hp=5d692c65287e42060ab23a84d7cd2ffba32809c1;hpb=4227853a03923e04daf3dd511a4b5a1ab5d527e7;p=perso%2FImmae%2FConfig%2FNix.git diff --git a/modules/private/system/backup-2.nix b/modules/private/system/backup-2.nix index 5d692c6..1f226c0 100644 --- a/modules/private/system/backup-2.nix +++ b/modules/private/system/backup-2.nix @@ -1,45 +1,50 @@ -{ privateFiles }: -{ config, pkgs, myconfig, resources, ... }: +{ config, pkgs, resources, name, ... }: { - boot.kernelPackages = pkgs.linuxPackages_latest; - _module.args.privateFiles = privateFiles; - _module.args.hostFQDN = "backup-2.v.immae.eu"; - imports = builtins.attrValues (import ../..); - deployment = { - targetEnv = "hetznerCloud"; - hetznerCloud = { - authToken = myconfig.env.hetznerCloud.authToken; - datacenter = "hel1-dc2"; - location ="hel1"; - serverType = "cx11"; - }; + targetUser = "root"; + targetHost = config.hostEnv.ips.main.ip4; + substituteOnDestination = true; }; + # ssh-keyscan backup-2 | nix-shell -p ssh-to-age --run ssh-to-age + secrets.ageKeys = [ "age1kk3nr27qu42j28mcfdag5lhq0zu2pky7gfanvne8l4z2ctevjpgskmw0sr" ]; + boot.kernelPackages = pkgs.linuxPackages_latest; + myEnv = import ../../../nixops/secrets/environment.nix; + + imports = [ ] ++ builtins.attrValues (import ../..); fileSystems = { "/backup2" = { fsType = "ext4"; device = "UUID=b9425333-f567-435d-94d8-b26c22d93426"; }; + "/" = { device = "/dev/sda1"; fsType = "ext4"; }; }; networking = { firewall.enable = true; interfaces."ens3".ipv4.addresses = pkgs.lib.attrsets.mapAttrsToList (n: ips: { address = ips.ip4; prefixLength = 32; }) - (pkgs.lib.attrsets.filterAttrs (n: v: n != "main") myconfig.env.servers.backup-2.ips); + (pkgs.lib.attrsets.filterAttrs (n: v: n != "main") config.hostEnv.ips); interfaces."ens3".ipv6.addresses = pkgs.lib.flatten (pkgs.lib.attrsets.mapAttrsToList (n: ips: map (ip: { address = ip; prefixLength = (if n == "main" && ip == pkgs.lib.head ips.ip6 then 64 else 128); }) (ips.ip6 or [])) - myconfig.env.servers.backup-2.ips); + config.hostEnv.ips); + defaultGateway6 = { address = "fe80::1"; interface = "ens3"; }; + }; - defaultMailServer = { - directDelivery = true; - hostName = "eldiron.immae.eu:25"; - useTLS = true; - useSTARTTLS = true; - root = "postmaster@immae.eu"; - }; + boot.loader.grub.device = "nodev"; + + myServices.certificates.enable = true; + security.acme.certs."${name}" = { + user = config.services.nginx.user; + group = config.services.nginx.group; + }; + services.nginx = { + enable = true; + recommendedOptimisation = true; + recommendedGzipSettings = true; + recommendedProxySettings = true; }; + networking.firewall.allowedTCPPorts = [ 80 443 ]; services.cron = { mailto = "cron@immae.eu"; @@ -48,21 +53,24 @@ services.rsyncBackup = { mountpoint = "/backup2"; - mailto = myconfig.env.rsync_backup.mailto; - profiles = myconfig.env.rsync_backup.profiles; - ssh_key_public = myconfig.env.rsync_backup.ssh_key.public; - ssh_key_private = myconfig.env.rsync_backup.ssh_key.private; + profiles = config.myEnv.rsync_backup.profiles; + ssh_key_public = config.myEnv.rsync_backup.ssh_key.public; + ssh_key_private = config.myEnv.rsync_backup.ssh_key.private; }; + myServices.mailRelay.enable = true; + myServices.mailBackup.enable = true; myServices.monitoring.enable = true; myServices.databasesReplication = { postgresql = { enable = true; base = "/backup2"; + mainPackage = pkgs.postgresql; hosts = { eldiron = { slot = "backup_2"; - connection = "postgresql://backup-2:${myconfig.env.ldap.backup-2.password}@eldiron.immae.eu"; + connection = "postgresql://backup-2:${config.hostEnv.ldap.password}@eldiron.immae.eu"; + package = pkgs.postgresql; }; }; }; @@ -73,12 +81,12 @@ eldiron = { serverId = 2; # mysql resolves "backup-2" host and checks the ip, but uses /etc/hosts which only contains ip4 - host = myconfig.env.servers.eldiron.ips.main.ip4; + host = config.myEnv.servers.eldiron.ips.main.ip4; port = "3306"; user = "backup-2"; - password = myconfig.env.ldap.backup-2.password; + password = config.hostEnv.ldap.password; dumpUser = "root"; - dumpPassword = myconfig.env.databases.mysql.systemUsers.root; + dumpPassword = config.myEnv.databases.mysql.systemUsers.root; }; }; }; @@ -97,10 +105,10 @@ base = "/backup2"; hosts = { eldiron = { - url = "ldaps://${myconfig.env.ldap.host}:636"; - dn = myconfig.env.ldap.replication_dn; - password = myconfig.env.ldap.replication_pw; - base = myconfig.env.ldap.base; + url = "ldaps://${config.myEnv.ldap.host}:636"; + dn = config.myEnv.ldap.replication_dn; + password = config.myEnv.ldap.replication_pw; + base = config.myEnv.ldap.base; }; }; }; @@ -111,5 +119,5 @@ # database servers. You should change this only after NixOS release # notes say you should. # https://nixos.org/nixos/manual/release-notes.html - system.stateVersion = "19.03"; # Did you read the comment? + system.stateVersion = "20.03"; # Did you read the comment? }