Start migration to NixOS for storage1

This commit is contained in:
Paul-Henri Froidmont 2021-11-29 02:04:29 +01:00
parent 09d2ac3f05
commit 86124dcd4a
Signed by: phfroidmont
GPG key ID: BE948AFD7E7873BE
19 changed files with 589 additions and 173 deletions

View file

@ -11,11 +11,19 @@
../modules/custom-backup-job.nix
];
sops.secrets = {
borgSshKey = {
owner = config.services.borgbackup.jobs.data.user;
key = "borg/client_keys/backend1/private";
};
};
services.custom-backup-job = {
additionalPaths = [ "/var/lib/nextcloud/config" ];
additionalReadWritePaths = [ "/nix/var/data/murmur" ];
additionalPreHook = "cp /var/lib/murmur/murmur.sqlite /nix/var/data/murmur/murmur.sqlite";
readWritePaths = [ "/nix/var/data/murmur" ];
preHook = "cp /var/lib/murmur/murmur.sqlite /nix/var/data/murmur/murmur.sqlite";
startAt = "03:30";
sshKey = config.sops.secrets.borgPassphrase.path;
};
networking.localCommands = "ip addr add 95.216.177.3/32 dev enp1s0";
@ -34,7 +42,7 @@
allow localhost
check file nextcloud-data-mounted with path /var/lib/nextcloud/data/index.html
start = "${pkgs.systemd}/bin/systemctl start var-lib-nextcloud-data.mount"
start = "${pkgs.systemd}/bin/systemctl start nextcloud-data-sshfs.service"
'';
};

View file

@ -10,13 +10,21 @@
networking.firewall.interfaces."enp7s0".allowedTCPPorts = [ 5432 ];
sops.secrets = {
borgSshKey = {
owner = config.services.borgbackup.jobs.data.user;
key = "borg/client_keys/db1/private";
};
};
services.custom-backup-job = {
additionalReadWritePaths = [ "/nix/var/data/postgresql" ];
additionalPreHook = ''
readWritePaths = [ "/nix/var/data/postgresql" ];
preHook = ''
${pkgs.postgresql_12}/bin/pg_dump -U synapse synapse > /nix/var/data/postgresql/synapse.dmp
${pkgs.postgresql_12}/bin/pg_dump -U nextcloud nextcloud > /nix/var/data/postgresql/nextcloud.dmp
'';
startAt = "03:00";
sshKey = config.sops.secrets.borgSshKey.path;
};
networking.firewall.interfaces."ens10".allowedTCPPorts = [ 80 ];

View file

@ -4,5 +4,11 @@
../environment.nix
../hardware/hetzner-dedicated-storage1.nix
../modules/openssh.nix
../modules/mailserver.nix
];
security.acme.email = "letsencrypt.account@banditlair.com";
security.acme.acceptTerms = true;
networking.firewall.allowedTCPPorts = [ 80 ];
}