self-hosting/profiles/backend.nix
2021-11-29 02:04:29 +01:00

50 lines
1.3 KiB
Nix

{ config, lib, pkgs, ... }:
{
imports = [
../environment.nix
../hardware/hcloud.nix
../modules/openssh.nix
../modules/nginx.nix
../modules/murmur.nix
../modules/synapse.nix
../modules/nextcloud.nix
../modules/custom-backup-job.nix
];
sops.secrets = {
borgSshKey = {
owner = config.services.borgbackup.jobs.data.user;
key = "borg/client_keys/backend1/private";
};
};
services.custom-backup-job = {
additionalPaths = [ "/var/lib/nextcloud/config" ];
readWritePaths = [ "/nix/var/data/murmur" ];
preHook = "cp /var/lib/murmur/murmur.sqlite /nix/var/data/murmur/murmur.sqlite";
startAt = "03:30";
sshKey = config.sops.secrets.borgPassphrase.path;
};
networking.localCommands = "ip addr add 95.216.177.3/32 dev enp1s0";
networking.firewall.allowedTCPPorts = [ 80 443 64738 ];
networking.firewall.allowedUDPPorts = [ 64738 ];
services.monit = {
enable = true;
config = ''
set daemon 30
with start delay 90
set httpd
port 2812
use address 127.0.0.1
allow localhost
check file nextcloud-data-mounted with path /var/lib/nextcloud/data/index.html
start = "${pkgs.systemd}/bin/systemctl start nextcloud-data-sshfs.service"
'';
};
networking.firewall.interfaces."ens10".allowedTCPPorts = [ 80 ];
}