1 { environment ? ./environment.nix }:
4 description = "Immae's network";
8 eldiron = { config, pkgs, mylibs, myconfig, ... }:
12 mylibs = import ../libs.nix;
14 env = import environment;
16 main = "176.9.151.89";
17 production = "176.9.151.154";
18 integration = "176.9.151.155";
24 ./modules/certificates.nix
32 services.myGitolite.enable = true;
33 services.myDatabases.enable = true;
34 services.myWebsites.production.enable = true;
35 services.myWebsites.integration.enable = true;
36 services.myWebsites.tools.enable = true;
37 services.pure-ftpd.enable = true;
39 services.journald.extraConfig = ''
40 MaxLevelStore="warning"
41 MaxRetentionSec="1year"
46 allowedTCPPorts = [ 22 ];
51 targetEnv = "hetzner";
53 robotUser = myconfig.env.hetzner.user;
54 robotPass = myconfig.env.hetzner.pass;
55 mainIPv4 = myconfig.ips.main;
57 clearpart --all --initlabel --drives=sda,sdb
59 part swap1 --recommended --label=swap1 --fstype=swap --ondisk=sda
60 part swap2 --recommended --label=swap2 --fstype=swap --ondisk=sdb
62 part raid.1 --grow --ondisk=sda
63 part raid.2 --grow --ondisk=sdb
65 raid / --level=1 --device=md0 --fstype=ext4 --label=root raid.1 raid.2
70 environment.systemPackages = [
76 services.openssh.extraConfig = ''
77 AuthorizedKeysCommand /etc/ssh/ldap_authorized_keys
78 AuthorizedKeysCommandUser nobody
81 environment.etc."ssh/ldap_authorized_keys" = let
82 ldap_authorized_keys =
84 name = "ldap_authorized_keys";
85 file = ./ldap_authorized_keys.sh;
87 LDAP_PASS = myconfig.env.sshd.ldap.password;
88 GITOLITE_SHELL = "${pkgs.gitolite}/bin/gitolite-shell";
89 ECHO = "${pkgs.coreutils}/bin/echo";
91 paths = [ pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.gnused pkgs.coreutils ];
97 source = ldap_authorized_keys;
104 # The star after /var/lib/* avoids deleting all folders in case of problem
105 0 3,9,15,21 * * * root rsync -e "ssh -i /root/.ssh/id_charon_vpn" -aAXvz --delete --numeric-ids --super --rsync-path="sudo rsync" /var/lib/* immae@immae.eu: > /dev/null