{ pkgs, lib, config, ... }: let cfg = config.custom.terraformDatabase; in { options = { custom = { terraformDatabase.enable = lib.mkOption { default = false; type = lib.types.bool; description = '' Whether to start a postgreSQL database for Terraform states ''; }; }; }; config = lib.mkIf cfg.enable { services.postgresql = { enable = true; ensureDatabases = [ "terraformstates" ]; package = pkgs.postgresql_15; enableTCPIP = true; dataDir = lib.mkIf config.custom.dataDisk.enable "/mnt/data/postgresql/${config.services.postgresql.package.psqlSchema}"; # dataDir = # "/mnt/data/postgresql/${config.services.postgresql.package.psqlSchema}"; # TODO: for now trust, replace this with client certificate later authentication = '' hostssl terraformstates terraform all trust ''; settings = { ssl = true; ssl_cert_file = builtins.toFile "postgresql_server.crt" (builtins.readFile ../../postgresql_server.crt); ssl_key_file = config.age.secrets."postgresql_server.key".path; }; ensureUsers = [{ name = "terraform"; ensurePermissions = { "DATABASE terraformstates" = "ALL PRIVILEGES"; }; }]; }; age.secrets."postgresql_server.key" = { file = ../../secrets/postgresql_server.key.age; mode = "400"; owner = builtins.toString config.ids.uids.postgres; group = builtins.toString config.ids.gids.postgres; }; }; }