X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=nixops%2Feldiron.nix;h=9d32bb3196d9b2630bf7505685794675dda0adae;hb=1f8d6a9a1804705ac68c486a2b8ccee9eaa76f48;hp=5dff7d4674203b58c7af6f5be83e8aea93b23f77;hpb=9690acd9e5ff473fdc88ef13bcc98bb698cfb269;p=perso%2FImmae%2FConfig%2FNix.git diff --git a/nixops/eldiron.nix b/nixops/eldiron.nix index 5dff7d4..9d32bb3 100644 --- a/nixops/eldiron.nix +++ b/nixops/eldiron.nix @@ -6,10 +6,11 @@ }; eldiron = { config, pkgs, mylibs, myconfig, ... }: - with mylibs; { _module.args = { - mylibs = import ../libs.nix; + pkgsNext = import {}; + pkgsPrevious = import {}; + mylibs = import ../libs.nix { nixpkgs = pkgs; }; mypkgs = import ../default.nix; myconfig = { inherit privateFiles; @@ -23,6 +24,7 @@ }; imports = [ + ./modules/ssh ./modules/certificates.nix ./modules/gitolite ./modules/databases @@ -30,6 +32,10 @@ ./modules/websites ./modules/mail ./modules/ftp + ./modules/pub + ./modules/task + ./modules/irc + ./modules/buildbot ]; services.myGitolite.enable = true; services.myDatabases.enable = true; @@ -37,17 +43,16 @@ services.myWebsites.integration.enable = true; services.myWebsites.tools.enable = true; services.pure-ftpd.enable = true; + services.irc.enable = true; + services.pub.enable = true; + services.myTasks.enable = true; + services.buildbot.enable = true; services.journald.extraConfig = '' MaxLevelStore="warning" MaxRetentionSec="1year" ''; - networking = { - firewall = { - enable = true; - allowedTCPPorts = [ 22 ]; - }; - }; + networking.firewall.enable = true; deployment = { targetEnv = "hetzner"; @@ -75,30 +80,6 @@ pkgs.vim ]; - services.openssh.extraConfig = '' - AuthorizedKeysCommand /etc/ssh/ldap_authorized_keys - AuthorizedKeysCommandUser nobody - ''; - - environment.etc."ssh/ldap_authorized_keys" = let - ldap_authorized_keys = - wrap { - name = "ldap_authorized_keys"; - file = ./ldap_authorized_keys.sh; - vars = { - LDAP_PASS = myconfig.env.sshd.ldap.password; - GITOLITE_SHELL = "${pkgs.gitolite}/bin/gitolite-shell"; - ECHO = "${pkgs.coreutils}/bin/echo"; - }; - paths = [ pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.gnused pkgs.coreutils ]; - }; - in { - enable = true; - mode = "0755"; - user = "root"; - source = ldap_authorized_keys; - }; - services.cron = { enable = true; systemCronJobs = [