X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=modules%2Fprivate%2Fsystem%2Fbackup-2.nix;h=1f226c0bdff723c766a5bc1d732c1c12ded00ee7;hb=282c67a117b7d349b30a96972b050d630f906dec;hp=615167150a10c27b4788fd90bc463f078d75e006;hpb=285380fe566700ab3bf4f69b0a1a10fb4d9bba3a;p=perso%2FImmae%2FConfig%2FNix.git diff --git a/modules/private/system/backup-2.nix b/modules/private/system/backup-2.nix index 6151671..1f226c0 100644 --- a/modules/private/system/backup-2.nix +++ b/modules/private/system/backup-2.nix @@ -1,51 +1,117 @@ -{ privateFiles }: -{ config, pkgs, myconfig, resources, ... }: +{ config, pkgs, resources, name, ... }: { - boot.kernelPackages = pkgs.linuxPackages_latest; - _module.args.privateFiles = privateFiles; - imports = builtins.attrValues (import ../..); - deployment = { - targetEnv = "hetznerCloud"; - hetznerCloud = { - authToken = myconfig.env.hetznerCloud.authToken; - datacenter = "hel1-dc2"; - location ="hel1"; - serverType = "cx11"; - }; + targetUser = "root"; + targetHost = config.hostEnv.ips.main.ip4; + substituteOnDestination = true; }; + # ssh-keyscan backup-2 | nix-shell -p ssh-to-age --run ssh-to-age + secrets.ageKeys = [ "age1kk3nr27qu42j28mcfdag5lhq0zu2pky7gfanvne8l4z2ctevjpgskmw0sr" ]; + boot.kernelPackages = pkgs.linuxPackages_latest; + myEnv = import ../../../nixops/secrets/environment.nix; + + imports = [ ] ++ builtins.attrValues (import ../..); fileSystems = { "/backup2" = { fsType = "ext4"; device = "UUID=b9425333-f567-435d-94d8-b26c22d93426"; }; + "/" = { device = "/dev/sda1"; fsType = "ext4"; }; }; networking = { firewall.enable = true; interfaces."ens3".ipv4.addresses = pkgs.lib.attrsets.mapAttrsToList (n: ips: { address = ips.ip4; prefixLength = 32; }) - (pkgs.lib.attrsets.filterAttrs (n: v: n != "main") myconfig.env.servers.backup-2.ips); + (pkgs.lib.attrsets.filterAttrs (n: v: n != "main") config.hostEnv.ips); interfaces."ens3".ipv6.addresses = pkgs.lib.flatten (pkgs.lib.attrsets.mapAttrsToList (n: ips: map (ip: { address = ip; prefixLength = (if n == "main" && ip == pkgs.lib.head ips.ip6 then 64 else 128); }) (ips.ip6 or [])) - myconfig.env.servers.backup-2.ips); - - defaultMailServer = { - directDelivery = true; - hostName = "eldiron.immae.eu:25"; - useTLS = true; - useSTARTTLS = true; - root = "postmaster@immae.eu"; - }; + config.hostEnv.ips); + defaultGateway6 = { address = "fe80::1"; interface = "ens3"; }; + }; + + boot.loader.grub.device = "nodev"; + + myServices.certificates.enable = true; + security.acme.certs."${name}" = { + user = config.services.nginx.user; + group = config.services.nginx.group; + }; + services.nginx = { + enable = true; + recommendedOptimisation = true; + recommendedGzipSettings = true; + recommendedProxySettings = true; + }; + networking.firewall.allowedTCPPorts = [ 80 443 ]; + + services.cron = { + mailto = "cron@immae.eu"; + enable = true; }; services.rsyncBackup = { mountpoint = "/backup2"; - mailto = myconfig.env.rsync_backup.mailto; - profiles = myconfig.env.rsync_backup.profiles; - ssh_key_public = myconfig.env.rsync_backup.ssh_key.public; - ssh_key_private = myconfig.env.rsync_backup.ssh_key.private; + profiles = config.myEnv.rsync_backup.profiles; + ssh_key_public = config.myEnv.rsync_backup.ssh_key.public; + ssh_key_private = config.myEnv.rsync_backup.ssh_key.private; + }; + + myServices.mailRelay.enable = true; + myServices.mailBackup.enable = true; + myServices.monitoring.enable = true; + myServices.databasesReplication = { + postgresql = { + enable = true; + base = "/backup2"; + mainPackage = pkgs.postgresql; + hosts = { + eldiron = { + slot = "backup_2"; + connection = "postgresql://backup-2:${config.hostEnv.ldap.password}@eldiron.immae.eu"; + package = pkgs.postgresql; + }; + }; + }; + mariadb = { + enable = true; + base = "/backup2"; + hosts = { + eldiron = { + serverId = 2; + # mysql resolves "backup-2" host and checks the ip, but uses /etc/hosts which only contains ip4 + host = config.myEnv.servers.eldiron.ips.main.ip4; + port = "3306"; + user = "backup-2"; + password = config.hostEnv.ldap.password; + dumpUser = "root"; + dumpPassword = config.myEnv.databases.mysql.systemUsers.root; + }; + }; + }; + redis = { + enable = true; + base = "/backup2"; + hosts = { + eldiron = { + host = "127.0.0.1"; + port = "16379"; + }; + }; + }; + openldap = { + enable = true; + base = "/backup2"; + hosts = { + eldiron = { + url = "ldaps://${config.myEnv.ldap.host}:636"; + dn = config.myEnv.ldap.replication_dn; + password = config.myEnv.ldap.replication_pw; + base = config.myEnv.ldap.base; + }; + }; + }; }; # This value determines the NixOS release with which your system is @@ -53,5 +119,5 @@ # database servers. You should change this only after NixOS release # notes say you should. # https://nixos.org/nixos/manual/release-notes.html - system.stateVersion = "19.03"; # Did you read the comment? + system.stateVersion = "20.03"; # Did you read the comment? }