diff options
author | Ismaël Bouya <ismael.bouya@normalesup.org> | 2023-10-04 01:35:06 +0200 |
---|---|---|
committer | Ismaël Bouya <ismael.bouya@normalesup.org> | 2023-10-04 02:11:48 +0200 |
commit | 1a64deeb894dc95e2645a75771732c6cc53a79ad (patch) | |
tree | 1b9df4838f894577a09b9b260151756272efeb53 /modules/private/databases/default.nix | |
parent | fa25ffd4583cc362075cd5e1b4130f33306103f0 (diff) | |
download | Nix-1a64deeb894dc95e2645a75771732c6cc53a79ad.tar.gz Nix-1a64deeb894dc95e2645a75771732c6cc53a79ad.tar.zst Nix-1a64deeb894dc95e2645a75771732c6cc53a79ad.zip |
Squash changes containing private information
There were a lot of changes since the previous commit, but a lot of them
contained personnal information about users. All thos changes got
stashed into a single commit (history is kept in a different place) and
private information was moved in a separate private repository
Diffstat (limited to 'modules/private/databases/default.nix')
-rw-r--r-- | modules/private/databases/default.nix | 57 |
1 files changed, 0 insertions, 57 deletions
diff --git a/modules/private/databases/default.nix b/modules/private/databases/default.nix deleted file mode 100644 index 1241658..0000000 --- a/modules/private/databases/default.nix +++ /dev/null | |||
@@ -1,57 +0,0 @@ | |||
1 | { lib, config, nodes, ... }: | ||
2 | let | ||
3 | cfg = config.myServices.databases; | ||
4 | in | ||
5 | { | ||
6 | options.myServices = { | ||
7 | databases.enable = lib.mkEnableOption "my databases service"; | ||
8 | databasesCerts = lib.mkOption { | ||
9 | description = "Default databases configurations for certificates as accepted by acme"; | ||
10 | }; | ||
11 | }; | ||
12 | |||
13 | config.myServices.databases = lib.mkIf cfg.enable { | ||
14 | mariadb = { | ||
15 | enable = true; | ||
16 | ldapConfig = { | ||
17 | inherit (config.myEnv.ldap) host base; | ||
18 | inherit (config.myEnv.databases.mysql.pam) dn filter password; | ||
19 | }; | ||
20 | replicationLdapConfig = { | ||
21 | inherit (config.myEnv.ldap) host base; | ||
22 | inherit (config.myEnv.servers.eldiron.ldap) dn password; | ||
23 | }; | ||
24 | credentials.root = config.myEnv.databases.mysql.systemUsers.root; | ||
25 | }; | ||
26 | |||
27 | openldap = { | ||
28 | accessFile = ../../../nixops/secrets/ldap.conf; | ||
29 | baseDn = config.myEnv.ldap.base; | ||
30 | rootDn = config.myEnv.ldap.root_dn; | ||
31 | rootPw = config.myEnv.ldap.root_pw; | ||
32 | enable = true; | ||
33 | }; | ||
34 | |||
35 | postgresql = { | ||
36 | ldapConfig = { | ||
37 | inherit (config.myEnv.ldap) host base; | ||
38 | inherit (config.myEnv.databases.postgresql.pam) dn filter password; | ||
39 | }; | ||
40 | replicationLdapConfig = { | ||
41 | inherit (config.myEnv.ldap) host base; | ||
42 | inherit (config.myEnv.servers.eldiron.ldap) dn password; | ||
43 | }; | ||
44 | authorizedHosts = { | ||
45 | }; | ||
46 | replicationHosts = { | ||
47 | backup-2 = { | ||
48 | ip4 = [config.myEnv.servers.backup-2.ips.main.ip4]; | ||
49 | ip6 = config.myEnv.servers.backup-2.ips.main.ip6; | ||
50 | }; | ||
51 | }; | ||
52 | enable = true; | ||
53 | }; | ||
54 | |||
55 | redis.enable = true; | ||
56 | }; | ||
57 | } | ||