X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=modules%2Fprivate%2Fsystem%2Feldiron.nix;h=8b2784d0d315ce87d0b1fbfe546f6689854e55ce;hb=5315b439af1f72c3282549508ae58d86d66e38ec;hp=fdc3692f0cc404376b20fe9419a86abaa864f14d;hpb=c081a03a97780afd845e017f279e0f1e96a86c8a;p=perso%2FImmae%2FConfig%2FNix.git diff --git a/modules/private/system/eldiron.nix b/modules/private/system/eldiron.nix index fdc3692..8b2784d 100644 --- a/modules/private/system/eldiron.nix +++ b/modules/private/system/eldiron.nix @@ -1,4 +1,3 @@ -{ privateFiles }: { config, pkgs, lib, ... }: { deployment = { @@ -6,6 +5,8 @@ targetHost = config.hostEnv.ips.main.ip4; substituteOnDestination = true; }; + # ssh-keyscan eldiron | nix-shell -p ssh-to-age --run ssh-to-age + secrets.ageKeys = [ "age1dxr5lhvtnjssfaqpnf6qx80h8gfwkxg3tdf35m6n9wljmk7wadfs3kmahj" ]; boot = { kernelModules = [ "kvm-intel" ]; blacklistedKernelModules = [ "nvidiafb" ]; @@ -28,7 +29,7 @@ ''; nix.maxJobs = 8; powerManagement.cpuFreqGovernor = "powersave"; - myEnv = import "${privateFiles}/environment.nix" // { inherit privateFiles; }; + myEnv = import ../../../nixops/secrets/environment.nix; fileSystems = { # pools: @@ -111,22 +112,20 @@ myServices.dns.enable = true; myServices.certificates.enable = true; myServices.websites.enable = true; + myServices.gemini.enable = true; myServices.mail.enable = true; myServices.ejabberd.enable = true; myServices.vpn.enable = true; - services.pure-ftpd.enable = true; - services.duplyBackup.enable = false; - services.duplyBackup.profiles.oldies.rootDir = "/var/lib/oldies"; + myServices.ftp.enable = true; services.netdata.enable = true; services.netdata.config.global."memory mode" = "none"; services.netdata.config.health."enabled" = "no"; services.netdata.config.web.mode = "none"; users.users."${config.services.netdata.user}".extraGroups = [ "keys" ]; - environment.etc."netdata/stream.conf".source = "/var/secrets/netdata-stream.conf"; - secrets.keys = [ - { - dest = "netdata-stream.conf"; + environment.etc."netdata/stream.conf".source = config.secrets.fullPaths."netdata-stream.conf"; + secrets.keys = { + "netdata-stream.conf" = { user = config.services.netdata.user; group = config.services.netdata.group; permissions = "0400"; @@ -136,15 +135,14 @@ destination = ${config.myEnv.monitoring.netdata_aggregator} api key = ${config.myEnv.monitoring.netdata_keys.eldiron} ''; - } - { - dest = "zrepl_backup/identity"; + }; + "zrepl_backup/identity" = { user = "root"; group = "root"; permissions = "0400"; text = config.myEnv.zrepl_backup.ssh_key.private; - } - ]; + }; + }; programs.ssh.knownHosts.dilion = { hostNames = ["dilion.immae.eu"]; publicKey = let @@ -166,11 +164,6 @@ ]; }; - fileSystems."/var/lib/pub/immae/devtools" = { - device = "/run/current-system/sw/bin/bindfs#/var/lib/ftp/devtools.immae.eu/"; - fsType = "fuse"; - options = [ "force-user=pub" "create-for-user=wwwrun" "create-for-group=wwwrun" ]; - }; environment.systemPackages = [ pkgs.bindfs ]; services.zrepl = {