]> git.immae.eu Git - perso/Immae/Config/Nix.git/blame - nixops/eldiron.nix
Add mpd and make adjustments
[perso/Immae/Config/Nix.git] / nixops / eldiron.nix
CommitLineData
5f5efa6f 1{ environment ? ./environment.nix }:
a1bb33c4
IB
2{
3 network = {
4 description = "Immae's network";
5 enableRollback = true;
6 };
7
f8bde3d6 8 eldiron = { config, pkgs, mylibs, myconfig, ... }:
4d4f13f4 9 with mylibs;
ab5d04b8 10 {
4d4f13f4
IB
11 _module.args = {
12 mylibs = import ../libs.nix;
f8bde3d6 13 myconfig = {
5f5efa6f 14 env = import environment;
f8bde3d6
IB
15 ips = {
16 main = "176.9.151.89";
17 production = "176.9.151.154";
18 integration = "176.9.151.155";
19 };
20 };
4d4f13f4
IB
21 };
22
23 imports = [
3013caf1 24 ./modules/certificates.nix
10889174
IB
25 ./modules/gitolite
26 ./modules/databases
e229e6f2 27 ./modules/mpd
54307da4 28 ./modules/websites
af421a8f 29 ./modules/mail
439049e5 30 ./modules/ftp
4d4f13f4
IB
31 ];
32 services.myGitolite.enable = true;
4d4f13f4 33 services.myDatabases.enable = true;
42429ef0
IB
34 services.myWebsites.production.enable = true;
35 services.myWebsites.integration.enable = true;
10889174 36 services.myWebsites.tools.enable = true;
439049e5 37 services.pure-ftpd.enable = true;
4d4f13f4 38
a1bb33c4
IB
39 networking = {
40 firewall = {
41 enable = true;
10889174 42 allowedTCPPorts = [ 22 ];
a1bb33c4
IB
43 };
44 };
45
46 deployment = {
47 targetEnv = "hetzner";
48 hetzner = {
9d90e7e2
IB
49 robotUser = myconfig.env.hetzner.user;
50 robotPass = myconfig.env.hetzner.pass;
f8bde3d6 51 mainIPv4 = myconfig.ips.main;
a1bb33c4
IB
52 partitions = ''
53 clearpart --all --initlabel --drives=sda,sdb
54
55 part swap1 --recommended --label=swap1 --fstype=swap --ondisk=sda
56 part swap2 --recommended --label=swap2 --fstype=swap --ondisk=sdb
57
58 part raid.1 --grow --ondisk=sda
59 part raid.2 --grow --ondisk=sdb
60
61 raid / --level=1 --device=md0 --fstype=ext4 --label=root raid.1 raid.2
62 '';
63 };
64 };
65
10889174 66 environment.systemPackages = [
ce6ee3b8 67 pkgs.telnet
beeed847 68 pkgs.htop
ce6ee3b8
IB
69 pkgs.vim
70 ];
71
5566d26d
IB
72 services.openssh.extraConfig = ''
73 AuthorizedKeysCommand /etc/ssh/ldap_authorized_keys
74 AuthorizedKeysCommandUser nobody
75 '';
76
5566d26d
IB
77 environment.etc."ssh/ldap_authorized_keys" = let
78 ldap_authorized_keys =
5c101474 79 wrap {
5566d26d
IB
80 name = "ldap_authorized_keys";
81 file = ./ldap_authorized_keys.sh;
82 vars = {
9d90e7e2 83 LDAP_PASS = myconfig.env.sshd.ldap.password;
5566d26d
IB
84 GITOLITE_SHELL = "${pkgs.gitolite}/bin/gitolite-shell";
85 ECHO = "${pkgs.coreutils}/bin/echo";
86 };
87 paths = [ pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.gnused pkgs.coreutils ];
88 };
89 in {
90 enable = true;
91 mode = "0755";
92 user = "root";
93 source = ldap_authorized_keys;
65fe7543
IB
94 };
95
6533428a
IB
96 services.cron = {
97 enable = true;
98 systemCronJobs = [
99 ''
100 # The star after /var/lib/* avoids deleting all folders in case of problem
9d8d1425 101 0 3,9,15,21 * * * root rsync -e "ssh -i /root/.ssh/id_charon_vpn" -aAXvz --delete --numeric-ids --super --rsync-path="sudo rsync" /var/lib/* immae@immae.eu: > /dev/null
6533428a
IB
102 ''
103 ];
104 };
a1bb33c4
IB
105 };
106}