]> git.immae.eu Git - perso/Immae/Config/Nix.git/blame - virtual/eldiron.nix
Fix deprecation for networking addresses in hetzner
[perso/Immae/Config/Nix.git] / virtual / eldiron.nix
CommitLineData
a1bb33c4
IB
1{
2 network = {
3 description = "Immae's network";
4 enableRollback = true;
5 };
6
f8bde3d6 7 eldiron = { config, pkgs, mylibs, myconfig, ... }:
4d4f13f4 8 with mylibs;
ab5d04b8 9 {
4d4f13f4
IB
10 _module.args = {
11 mylibs = import ../libs.nix;
f8bde3d6
IB
12 myconfig = {
13 ips = {
14 main = "176.9.151.89";
15 production = "176.9.151.154";
16 integration = "176.9.151.155";
17 };
18 };
4d4f13f4
IB
19 };
20
21 imports = [
3013caf1 22 ./modules/certificates.nix
10889174
IB
23 ./modules/gitolite
24 ./modules/databases
54307da4 25 ./modules/websites
4d4f13f4
IB
26 ];
27 services.myGitolite.enable = true;
4d4f13f4 28 services.myDatabases.enable = true;
42429ef0
IB
29 services.myWebsites.production.enable = true;
30 services.myWebsites.integration.enable = true;
10889174 31 services.myWebsites.tools.enable = true;
4d4f13f4 32
a1bb33c4
IB
33 networking = {
34 firewall = {
35 enable = true;
10889174 36 allowedTCPPorts = [ 22 ];
a1bb33c4
IB
37 };
38 };
39
40 deployment = {
41 targetEnv = "hetzner";
42 hetzner = {
43 #robotUser = "defined in HETZNER_ROBOT_USER";
44 #robotPass = "defined in HETZNER_ROBOT_PASS";
f8bde3d6 45 mainIPv4 = myconfig.ips.main;
a1bb33c4
IB
46 partitions = ''
47 clearpart --all --initlabel --drives=sda,sdb
48
49 part swap1 --recommended --label=swap1 --fstype=swap --ondisk=sda
50 part swap2 --recommended --label=swap2 --fstype=swap --ondisk=sdb
51
52 part raid.1 --grow --ondisk=sda
53 part raid.2 --grow --ondisk=sdb
54
55 raid / --level=1 --device=md0 --fstype=ext4 --label=root raid.1 raid.2
56 '';
57 };
58 };
59
10889174 60 environment.systemPackages = [
ce6ee3b8 61 pkgs.telnet
beeed847 62 pkgs.htop
ce6ee3b8
IB
63 pkgs.vim
64 ];
65
5566d26d
IB
66 services.openssh.extraConfig = ''
67 AuthorizedKeysCommand /etc/ssh/ldap_authorized_keys
68 AuthorizedKeysCommandUser nobody
69 '';
70
5566d26d
IB
71 environment.etc."ssh/ldap_authorized_keys" = let
72 ldap_authorized_keys =
5c101474
IB
73 assert checkEnv "NIXOPS_SSHD_LDAP_PASSWORD";
74 wrap {
5566d26d
IB
75 name = "ldap_authorized_keys";
76 file = ./ldap_authorized_keys.sh;
77 vars = {
78 LDAP_PASS = builtins.getEnv "NIXOPS_SSHD_LDAP_PASSWORD";
79 GITOLITE_SHELL = "${pkgs.gitolite}/bin/gitolite-shell";
80 ECHO = "${pkgs.coreutils}/bin/echo";
81 };
82 paths = [ pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.gnused pkgs.coreutils ];
83 };
84 in {
85 enable = true;
86 mode = "0755";
87 user = "root";
88 source = ldap_authorized_keys;
65fe7543
IB
89 };
90
a1bb33c4
IB
91 };
92}