X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=nixops%2Feldiron.nix;h=51af1f626622c55f0d9ab62bac7537bb144c0360;hb=8d213e2b1c934f6861f76aad5eb7c11097fa97de;hp=44d928b06a6ed5d1f9e2d99dd063f0d0065e0ff3;hpb=9fb4205e2ceadb79a93cbe44bd77ebebe8c94625;p=perso%2FImmae%2FConfig%2FNix.git diff --git a/nixops/eldiron.nix b/nixops/eldiron.nix index 44d928b..51af1f6 100644 --- a/nixops/eldiron.nix +++ b/nixops/eldiron.nix @@ -1,69 +1,42 @@ -{ privateFiles ? ./., nixpkgsNext ? null }: +{ privateFiles ? ./. }: { network = { description = "Immae's network"; enableRollback = true; }; - eldiron = { config, pkgs, mylibs, myconfig, ... }: - with mylibs; + eldiron = { config, pkgs, myconfig, ... }: { - _module.args = { - pkgsNext = if builtins.isNull nixpkgsNext then pkgs else import nixpkgsNext {}; - mylibs = import ../libs.nix { nixpkgs = pkgs; }; - mypkgs = import ../default.nix; - myconfig = { - inherit privateFiles; - env = import "${privateFiles}/environment.nix"; - ips = { - main = "176.9.151.89"; - production = "176.9.151.154"; - integration = "176.9.151.155"; - }; - }; - }; - - imports = [ - ./modules/certificates.nix - ./modules/gitolite - ./modules/databases - ./modules/mpd - ./modules/websites - ./modules/mail - ./modules/ftp - ./modules/pub - ./modules/task - ./modules/irc - ./modules/buildbot - ]; - services.myGitolite.enable = true; - services.myDatabases.enable = true; - services.myWebsites.production.enable = true; - services.myWebsites.integration.enable = true; - services.myWebsites.tools.enable = true; - services.pure-ftpd.enable = true; - services.irc.enable = true; - services.pub.enable = true; - services.myTasks.enable = true; - services.buildbot.enable = true; + boot.kernelPackages = pkgs.linuxPackages_latest; + _module.args.privateFiles = privateFiles; - services.journald.extraConfig = '' - MaxLevelStore="warning" - MaxRetentionSec="1year" - ''; networking = { - firewall = { - enable = true; - allowedTCPPorts = [ 22 ]; - }; + firewall.enable = true; + # 176.9.151.89 declared in nixops -> infra / tools + interfaces."eth0".ipv4.addresses = pkgs.lib.attrsets.mapAttrsToList + (n: ips: { address = ips.ip4; prefixLength = 32; }) + (pkgs.lib.attrsets.filterAttrs (n: v: n != "main") myconfig.env.servers.eldiron.ips); + interfaces."eth0".ipv6.addresses = pkgs.lib.flatten (pkgs.lib.attrsets.mapAttrsToList + (n: ips: map (ip: { address = ip; prefixLength = (if n == "main" && ip == pkgs.lib.head ips.ip6 then 64 else 128); }) (ips.ip6 or [])) + myconfig.env.servers.eldiron.ips); }; + imports = builtins.attrValues (import ../modules); + + myServices.buildbot.enable = true; + myServices.databases.enable = true; + myServices.gitolite.enable = true; + myServices.irc.enable = true; + myServices.pub.enable = true; + myServices.tasks.enable = true; + services.pure-ftpd.enable = true; + deployment = { targetEnv = "hetzner"; hetzner = { robotUser = myconfig.env.hetzner.user; robotPass = myconfig.env.hetzner.pass; - mainIPv4 = myconfig.ips.main; + mainIPv4 = myconfig.env.servers.eldiron.ips.main.ip4; partitions = '' clearpart --all --initlabel --drives=sda,sdb @@ -78,36 +51,6 @@ }; }; - environment.systemPackages = [ - pkgs.telnet - pkgs.htop - pkgs.vim - ]; - - services.openssh.extraConfig = '' - AuthorizedKeysCommand /etc/ssh/ldap_authorized_keys - AuthorizedKeysCommandUser nobody - ''; - - environment.etc."ssh/ldap_authorized_keys" = let - ldap_authorized_keys = - wrap { - name = "ldap_authorized_keys"; - file = ./ldap_authorized_keys.sh; - vars = { - LDAP_PASS = myconfig.env.sshd.ldap.password; - GITOLITE_SHELL = "${pkgs.gitolite}/bin/gitolite-shell"; - ECHO = "${pkgs.coreutils}/bin/echo"; - }; - paths = [ pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.gnused pkgs.coreutils ]; - }; - in { - enable = true; - mode = "0755"; - user = "root"; - source = ldap_authorized_keys; - }; - services.cron = { enable = true; systemCronJobs = [