X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=modules%2Fprivate%2Fsystem%2Fbackup-2.nix;h=c01a666b7deea692a212ca5cd8ef16fc1c544aea;hb=4c4652aabf2cb3ac8b40f2856eca07a1df9c27e0;hp=3d263f570419beb67ea5280762aa57919599dd78;hpb=d43e0c61af84940447dbcdd1deac848328dde46d;p=perso%2FImmae%2FConfig%2FNix.git diff --git a/modules/private/system/backup-2.nix b/modules/private/system/backup-2.nix index 3d263f5..c01a666 100644 --- a/modules/private/system/backup-2.nix +++ b/modules/private/system/backup-2.nix @@ -1,26 +1,37 @@ -{ privateFiles }: { config, pkgs, resources, name, ... }: { - boot.kernelPackages = pkgs.linuxPackages_latest; - myEnv = import "${privateFiles}/environment.nix" // { inherit privateFiles; }; - - imports = builtins.attrValues (import ../..); - deployment = { - targetEnv = "hetznerCloud"; - hetznerCloud = { - authToken = config.myEnv.hetznerCloud.authToken; - datacenter = "hel1-dc2"; - location ="hel1"; - serverType = "cx11"; + targetUser = "root"; + targetHost = config.hostEnv.ips.main.ip4; + substituteOnDestination = true; + }; + # ssh-keyscan backup-2 | nix-shell -p ssh-to-age --run ssh-to-age + secrets.ageKeys = [ "age1kk3nr27qu42j28mcfdag5lhq0zu2pky7gfanvne8l4z2ctevjpgskmw0sr" ]; + secrets.keys = { + "rsync_backup/identity" = { + user = "backup"; + group = "backup"; + permissions = "0400"; + text = config.myEnv.rsync_backup.ssh_key.private; + }; + "rsync_backup/identity.pub" = { + user = "backup"; + group = "backup"; + permissions = "0444"; + text = config.myEnv.rsync_backup.ssh_key.public; }; }; + boot.kernelPackages = pkgs.linuxPackages_latest; + myEnv = import ../../../nixops/secrets/environment.nix; + + imports = [ ] ++ builtins.attrValues (import ../..); fileSystems = { "/backup2" = { fsType = "ext4"; device = "UUID=b9425333-f567-435d-94d8-b26c22d93426"; }; + "/" = { device = "/dev/sda1"; fsType = "ext4"; }; }; networking = { @@ -34,6 +45,8 @@ defaultGateway6 = { address = "fe80::1"; interface = "ens3"; }; }; + boot.loader.grub.device = "nodev"; + myServices.certificates.enable = true; security.acme.certs."${name}" = { user = config.services.nginx.user; @@ -55,8 +68,8 @@ services.rsyncBackup = { mountpoint = "/backup2"; profiles = config.myEnv.rsync_backup.profiles; - ssh_key_public = config.myEnv.rsync_backup.ssh_key.public; - ssh_key_private = config.myEnv.rsync_backup.ssh_key.private; + ssh_key_public = config.secrets.fullPaths."rsync_backup/identity.pub"; + ssh_key_private = config.secrets.fullPaths."rsync_backup/identity"; }; myServices.mailRelay.enable = true; @@ -66,10 +79,12 @@ postgresql = { enable = true; base = "/backup2"; + mainPackage = pkgs.postgresql; hosts = { eldiron = { slot = "backup_2"; connection = "postgresql://backup-2:${config.hostEnv.ldap.password}@eldiron.immae.eu"; + package = pkgs.postgresql; }; }; };