This repository has been archived on 2025-02-21. You can view files and clone it, but cannot push or open issues or pull requests.
nixos-servers/nixos/modules/terraform-database/default.nix

50 lines
1.4 KiB
Nix
Raw Normal View History

2023-11-24 13:52:51 +01:00
{ pkgs, lib, config, ... }:
2023-12-29 13:46:12 +01:00
let cfg = config.lab.terraformDatabase;
2023-11-24 13:52:51 +01:00
in {
2023-12-29 13:46:12 +01:00
options.lab.terraformDatabase.enable = lib.mkOption {
default = false;
type = lib.types.bool;
description = ''
Whether to start a postgreSQL database for Terraform states
'';
2023-11-24 13:52:51 +01:00
};
config = lib.mkIf cfg.enable {
networking.firewall.interfaces.${config.lab.networking.mainNicNamePattern}.allowedTCPPorts = [ 5432 ];
2023-12-29 13:46:12 +01:00
2023-11-24 13:52:51 +01:00
services.postgresql = {
enable = true;
ensureDatabases = [ "terraformstates" ];
package = pkgs.postgresql_15;
enableTCPIP = true;
2023-12-26 13:44:59 +01:00
2024-01-07 00:22:44 +01:00
dataDir = "${config.lab.storage.dataMountPoint}/postgresql/${config.services.postgresql.package.psqlSchema}";
2023-12-26 13:44:59 +01:00
2023-11-24 13:52:51 +01:00
authentication = ''
2023-11-25 13:41:49 +01:00
hostssl terraformstates terraform all cert
2023-11-24 13:52:51 +01:00
'';
2023-12-26 13:44:59 +01:00
settings =
let
serverCert = builtins.toFile "postgresql_server.crt"
(builtins.readFile ./postgresql_server.crt);
in
{
ssl = true;
ssl_cert_file = serverCert;
ssl_key_file = config.age.secrets."postgresql_server.key".path;
ssl_ca_file = serverCert;
};
2023-12-26 13:44:59 +01:00
ensureUsers = [{ name = "terraform"; }];
2023-11-24 13:52:51 +01:00
};
age.secrets."postgresql_server.key" = {
file = ../../secrets/postgresql_server.key.age;
2023-11-24 13:52:51 +01:00
mode = "400";
owner = builtins.toString config.ids.uids.postgres;
group = builtins.toString config.ids.gids.postgres;
};
};
}