X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=nixops%2Feldiron.nix;h=37f901e5e39855b63d3da7167c04e3914b03604d;hb=9ade8f6eb774dc7d19d82a070199b5024786b819;hp=4726d08ef831bccec5ddb5cfe58e90339853c3c5;hpb=596e62a678366c83ea8204316c45e91e1d90b0d8;p=perso%2FImmae%2FConfig%2FNix.git diff --git a/nixops/eldiron.nix b/nixops/eldiron.nix index 4726d08..37f901e 100644 --- a/nixops/eldiron.nix +++ b/nixops/eldiron.nix @@ -6,59 +6,64 @@ }; eldiron = { config, pkgs, mylibs, myconfig, ... }: - with mylibs; { + nixpkgs.overlays = builtins.attrValues (import ../overlays); _module.args = { - mylibs = import ../libs.nix { nixpkgs = pkgs; }; - mypkgs = import ../default.nix; + pkgsNext = import {}; + pkgsPrevious = import {}; + mylibs = import ../libs.nix { inherit pkgs; }; myconfig = { inherit privateFiles; env = import "${privateFiles}/environment.nix"; - ips = { - main = "176.9.151.89"; - production = "176.9.151.154"; - integration = "176.9.151.155"; - }; }; }; + boot.kernelPackages = pkgs.linuxPackages_latest; + + networking = { + firewall.enable = true; + # 176.9.151.89 declared in nixops -> infra / tools + interfaces."eth0".ipv4.addresses = pkgs.lib.attrsets.mapAttrsToList + (n: ips: { address = ips.ip4; prefixLength = 32; }) + (pkgs.lib.attrsets.filterAttrs (n: v: n != "main") myconfig.env.servers.eldiron.ips); + interfaces."eth0".ipv6.addresses = pkgs.lib.flatten (pkgs.lib.attrsets.mapAttrsToList + (n: ips: map (ip: { address = ip; prefixLength = (if n == "main" && ip == pkgs.lib.head ips.ip6 then 64 else 128); }) (ips.ip6 or [])) + myconfig.env.servers.eldiron.ips); + }; + imports = [ + ./modules/ssh ./modules/certificates.nix ./modules/gitolite - ./modules/databases - ./modules/mpd + ./modules/mpd.nix ./modules/websites - ./modules/mail - ./modules/ftp + ./modules/mail.nix + ./modules/ftp.nix ./modules/pub ./modules/task - ]; + ./modules/irc.nix + ./modules/buildbot + ./modules/dns.nix + ] ++ (builtins.attrValues (import ../modules)); + myServices.databases.enable = true; services.myGitolite.enable = true; - services.myDatabases.enable = true; - services.myWebsites.production.enable = true; - services.myWebsites.integration.enable = true; - services.myWebsites.tools.enable = true; services.pure-ftpd.enable = true; + services.irc.enable = true; services.pub.enable = true; services.myTasks.enable = true; + services.buildbot.enable = true; services.journald.extraConfig = '' MaxLevelStore="warning" MaxRetentionSec="1year" ''; - networking = { - firewall = { - enable = true; - allowedTCPPorts = [ 22 ]; - }; - }; deployment = { targetEnv = "hetzner"; hetzner = { robotUser = myconfig.env.hetzner.user; robotPass = myconfig.env.hetzner.pass; - mainIPv4 = myconfig.ips.main; + mainIPv4 = myconfig.env.servers.eldiron.ips.main.ip4; partitions = '' clearpart --all --initlabel --drives=sda,sdb @@ -73,35 +78,15 @@ }; }; - environment.systemPackages = [ + users.users.root.packages = [ pkgs.telnet pkgs.htop - pkgs.vim + pkgs.iftop ]; - services.openssh.extraConfig = '' - AuthorizedKeysCommand /etc/ssh/ldap_authorized_keys - AuthorizedKeysCommandUser nobody - ''; - - environment.etc."ssh/ldap_authorized_keys" = let - ldap_authorized_keys = - wrap { - name = "ldap_authorized_keys"; - file = ./ldap_authorized_keys.sh; - vars = { - LDAP_PASS = myconfig.env.sshd.ldap.password; - GITOLITE_SHELL = "${pkgs.gitolite}/bin/gitolite-shell"; - ECHO = "${pkgs.coreutils}/bin/echo"; - }; - paths = [ pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.gnused pkgs.coreutils ]; - }; - in { - enable = true; - mode = "0755"; - user = "root"; - source = ldap_authorized_keys; - }; + environment.systemPackages = [ + pkgs.vim + ]; services.cron = { enable = true;