X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=nixops%2Feldiron.nix;h=7d97377e8746c59b53499814e301dd55ae863f6d;hb=1a7188052f235fb632700478fad0108e4306107d;hp=4726d08ef831bccec5ddb5cfe58e90339853c3c5;hpb=596e62a678366c83ea8204316c45e91e1d90b0d8;p=perso%2FImmae%2FConfig%2FNix.git diff --git a/nixops/eldiron.nix b/nixops/eldiron.nix index 4726d08..7d97377 100644 --- a/nixops/eldiron.nix +++ b/nixops/eldiron.nix @@ -6,59 +6,68 @@ }; eldiron = { config, pkgs, mylibs, myconfig, ... }: - with mylibs; { + nixpkgs.overlays = builtins.attrValues (import ../overlays); _module.args = { - mylibs = import ../libs.nix { nixpkgs = pkgs; }; - mypkgs = import ../default.nix; + pkgsNext = import {}; + pkgsPrevious = import {}; + mylibs = import ../libs.nix { inherit pkgs; }; myconfig = { inherit privateFiles; env = import "${privateFiles}/environment.nix"; - ips = { - main = "176.9.151.89"; - production = "176.9.151.154"; - integration = "176.9.151.155"; - }; }; }; + boot.kernelPackages = pkgs.linuxPackages_latest; + + networking = { + firewall.enable = true; + # 176.9.151.89 declared in nixops -> infra / tools + interfaces."eth0".ipv4.addresses = pkgs.lib.attrsets.mapAttrsToList + (n: ips: { address = ips.ip4; prefixLength = 32; }) + (pkgs.lib.attrsets.filterAttrs (n: v: n != "main") myconfig.env.servers.eldiron.ips); + interfaces."eth0".ipv6.addresses = pkgs.lib.flatten (pkgs.lib.attrsets.mapAttrsToList + (n: ips: map (ip: { address = ip; prefixLength = (if n == "main" && ip == pkgs.lib.head ips.ip6 then 64 else 128); }) (ips.ip6 or [])) + myconfig.env.servers.eldiron.ips); + }; + imports = [ + ./modules/ssh ./modules/certificates.nix ./modules/gitolite ./modules/databases - ./modules/mpd + ./modules/mpd.nix ./modules/websites - ./modules/mail - ./modules/ftp + ./modules/mail.nix + ./modules/ftp.nix ./modules/pub ./modules/task - ]; + ./modules/irc.nix + ./modules/buildbot + ./modules/dns.nix + ] ++ (builtins.attrValues (import ../modules)); services.myGitolite.enable = true; services.myDatabases.enable = true; services.myWebsites.production.enable = true; services.myWebsites.integration.enable = true; services.myWebsites.tools.enable = true; services.pure-ftpd.enable = true; + services.irc.enable = true; services.pub.enable = true; services.myTasks.enable = true; + services.buildbot.enable = true; services.journald.extraConfig = '' MaxLevelStore="warning" MaxRetentionSec="1year" ''; - networking = { - firewall = { - enable = true; - allowedTCPPorts = [ 22 ]; - }; - }; deployment = { targetEnv = "hetzner"; hetzner = { robotUser = myconfig.env.hetzner.user; robotPass = myconfig.env.hetzner.pass; - mainIPv4 = myconfig.ips.main; + mainIPv4 = myconfig.env.servers.eldiron.ips.main.ip4; partitions = '' clearpart --all --initlabel --drives=sda,sdb @@ -73,35 +82,15 @@ }; }; - environment.systemPackages = [ + users.users.root.packages = [ pkgs.telnet pkgs.htop - pkgs.vim + pkgs.iftop ]; - services.openssh.extraConfig = '' - AuthorizedKeysCommand /etc/ssh/ldap_authorized_keys - AuthorizedKeysCommandUser nobody - ''; - - environment.etc."ssh/ldap_authorized_keys" = let - ldap_authorized_keys = - wrap { - name = "ldap_authorized_keys"; - file = ./ldap_authorized_keys.sh; - vars = { - LDAP_PASS = myconfig.env.sshd.ldap.password; - GITOLITE_SHELL = "${pkgs.gitolite}/bin/gitolite-shell"; - ECHO = "${pkgs.coreutils}/bin/echo"; - }; - paths = [ pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.gnused pkgs.coreutils ]; - }; - in { - enable = true; - mode = "0755"; - user = "root"; - source = ldap_authorized_keys; - }; + environment.systemPackages = [ + pkgs.vim + ]; services.cron = { enable = true;