X-Git-Url: https://git.immae.eu/?p=perso%2FImmae%2FConfig%2FNix.git;a=blobdiff_plain;f=modules%2Fprivate%2Fsystem%2Fbackup-2.nix;h=4e24c1244253009ea0b844b319542cde52f0cbb1;hp=80fa36df1253fa883eca1e1371a34720a41c8587;hb=739d28eaf8cb226f74a7e7f5ad31fb152a90ee4b;hpb=ae485806dd34c6fbf905636a38be1e084324ea90 diff --git a/modules/private/system/backup-2.nix b/modules/private/system/backup-2.nix index 80fa36d..4e24c12 100644 --- a/modules/private/system/backup-2.nix +++ b/modules/private/system/backup-2.nix @@ -1,14 +1,15 @@ { privateFiles }: -{ config, pkgs, myconfig, resources, ... }: +{ config, pkgs, resources, ... }: { boot.kernelPackages = pkgs.linuxPackages_latest; - _module.args.privateFiles = privateFiles; + myEnv = import "${privateFiles}/environment.nix" // { inherit privateFiles; }; + imports = builtins.attrValues (import ../..); deployment = { targetEnv = "hetznerCloud"; hetznerCloud = { - authToken = myconfig.env.hetznerCloud.authToken; + authToken = config.myEnv.hetznerCloud.authToken; datacenter = "hel1-dc2"; location ="hel1"; serverType = "cx11"; @@ -26,10 +27,86 @@ firewall.enable = true; interfaces."ens3".ipv4.addresses = pkgs.lib.attrsets.mapAttrsToList (n: ips: { address = ips.ip4; prefixLength = 32; }) - (pkgs.lib.attrsets.filterAttrs (n: v: n != "main") myconfig.env.servers.backup-2.ips); + (pkgs.lib.attrsets.filterAttrs (n: v: n != "main") config.hostEnv.ips); interfaces."ens3".ipv6.addresses = pkgs.lib.flatten (pkgs.lib.attrsets.mapAttrsToList (n: ips: map (ip: { address = ip; prefixLength = (if n == "main" && ip == pkgs.lib.head ips.ip6 then 64 else 128); }) (ips.ip6 or [])) - myconfig.env.servers.backup-2.ips); + config.hostEnv.ips); + defaultGateway6 = { address = "fe80::1"; interface = "ens3"; }; + }; + + myServices.certificates.enable = true; + services.nginx = { + enable = true; + recommendedOptimisation = true; + recommendedGzipSettings = true; + recommendedProxySettings = true; + }; + networking.firewall.allowedTCPPorts = [ 80 443 ]; + + services.cron = { + mailto = "cron@immae.eu"; + enable = true; + }; + + services.rsyncBackup = { + mountpoint = "/backup2"; + profiles = config.myEnv.rsync_backup.profiles; + ssh_key_public = config.myEnv.rsync_backup.ssh_key.public; + ssh_key_private = config.myEnv.rsync_backup.ssh_key.private; + }; + + myServices.mailRelay.enable = true; + myServices.mailBackup.enable = true; + myServices.monitoring.enable = true; + myServices.databasesReplication = { + postgresql = { + enable = true; + base = "/backup2"; + hosts = { + eldiron = { + slot = "backup_2"; + connection = "postgresql://backup-2:${config.hostEnv.ldap.password}@eldiron.immae.eu"; + }; + }; + }; + mariadb = { + enable = true; + base = "/backup2"; + hosts = { + eldiron = { + serverId = 2; + # mysql resolves "backup-2" host and checks the ip, but uses /etc/hosts which only contains ip4 + host = config.myEnv.servers.eldiron.ips.main.ip4; + port = "3306"; + user = "backup-2"; + password = config.hostEnv.ldap.password; + dumpUser = "root"; + dumpPassword = config.myEnv.databases.mysql.systemUsers.root; + }; + }; + }; + redis = { + enable = true; + base = "/backup2"; + hosts = { + eldiron = { + host = "127.0.0.1"; + port = "16379"; + }; + }; + }; + openldap = { + enable = true; + base = "/backup2"; + hosts = { + eldiron = { + url = "ldaps://${config.myEnv.ldap.host}:636"; + dn = config.myEnv.ldap.replication_dn; + password = config.myEnv.ldap.replication_pw; + base = config.myEnv.ldap.base; + }; + }; + }; }; # This value determines the NixOS release with which your system is