X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=modules%2Fprivate%2Fsystem%2Fdilion.nix;h=b9be8b073430b7e7019526b099d5bb3fcf5684f9;hb=282c67a117b7d349b30a96972b050d630f906dec;hp=be8269e27f619fbaaf616adc52d07ef12da4061c;hpb=83e79a89399a0cbf8bae81e338c466abf4517e18;p=perso%2FImmae%2FConfig%2FNix.git diff --git a/modules/private/system/dilion.nix b/modules/private/system/dilion.nix index be8269e..b9be8b0 100644 --- a/modules/private/system/dilion.nix +++ b/modules/private/system/dilion.nix @@ -1,4 +1,3 @@ -{ privateFiles }: { config, pkgs, name, lib, ... }: { deployment = { @@ -6,6 +5,8 @@ targetHost = config.hostEnv.ips.main.ip4; substituteOnDestination = true; }; + # ssh-keyscan dilion | nix-shell -p ssh-to-age --run ssh-to-age + secrets.ageKeys = [ "age1x49n6qa0arkdpq8530s7umgm0gqkq90exv4jep97q30rfnzknpaqate06a" ]; nixpkgs.system = lib.mkOverride 900 "x86_64-linux"; boot = { loader = { @@ -31,7 +32,7 @@ powerManagement.cpuFreqGovernor = "powersave"; hardware.enableRedistributableFirmware = true; - myEnv = import "${privateFiles}/environment.nix" // { inherit privateFiles; }; + myEnv = import ../../../nixops/secrets/environment.nix; swapDevices = [ { label = "swap"; } ]; fileSystems = { @@ -76,12 +77,24 @@ }; myServices.ssh.modules = [ config.myServices.ssh.predefinedModules.regular ]; - imports = builtins.attrValues (import ../..); + imports = builtins.attrValues (import ../..) ++ [ ./dilion/vms.nix ]; system.nssModules = [ pkgs.libvirt ]; system.nssDatabases.hosts = lib.mkForce [ "files" "libvirt_guest" "mymachines" "dns" "myhostname" ]; programs.zsh.enable = true; + users.users.libvirt = { + hashedPassword = "!"; + shell = pkgs.bashInteractive; + isSystemUser = true; + group = "libvirtd"; + packages = [ pkgs.netcat-openbsd ]; + openssh.authorizedKeys.keys = [ + config.myEnv.buildbot.ssh_key.public + config.myEnv.sshd.rootKeys.ismael_flony + ]; + }; + users.users.backup = { hashedPassword = "!"; isSystemUser = true; @@ -118,7 +131,7 @@ after = [ "network.target" ]; serviceConfig = { - ExecStart = "${pkgs.socat}/bin/socat TCP-LISTEN:8022,fork TCP:nixops-99a7e1ba-54dc-11ea-a965-10bf487fe63b-caldance:22"; + ExecStart = "${pkgs.socat}/bin/socat TCP-LISTEN:8022,fork TCP:caldance:22"; }; }; @@ -170,7 +183,7 @@ recommendedGzipSettings = true; recommendedProxySettings = true; upstreams = { - caldance.servers."nixops-99a7e1ba-54dc-11ea-a965-10bf487fe63b-caldance:3031" = {}; + caldance.servers."caldance:3031" = {}; }; virtualHosts = { "dev.immae.eu" = {