Compare commits

..

No commits in common. "e215f7aa1d5b8ebc79a2bdcbafe5b55b33aa00d1" and "820b52314f5ae01b700cca1ce3305fc089d76903" have entirely different histories.

8 changed files with 13 additions and 75 deletions

View file

@ -23,11 +23,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1627501942, "lastModified": 1626073055,
"narHash": "sha256-rG2PUTgzmXvf/fSDCWKhlRwZjZs1/0TySC5eYHVJrmg=", "narHash": "sha256-vocByfpVu6m9zvtJugDvmd6/9iT2HJuG4tmDICKd0lI=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "2272fc312d5dc477e70816d94e550d08729b307b", "rev": "775cb20bd4af7781fbf336fb201df02ee3d544bb",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -39,11 +39,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1627391865, "lastModified": 1626046891,
"narHash": "sha256-tPoWBO9Nzu3wuX37WcnctzL6LoDCErJLnfLGqqmXCm4=", "narHash": "sha256-Zt8saH+hAehXskW0iFAzk+iMillYoFBxvLReYNqGT9E=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "8ecc61c91a596df7d3293603a9c2384190c1b89a", "rev": "d8f8f31af9d77a48220e4e8a301d1e79774cb7d2",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -55,11 +55,11 @@
}, },
"nur": { "nur": {
"locked": { "locked": {
"lastModified": 1627534577, "lastModified": 1626192709,
"narHash": "sha256-cGVIlBkZZA9VvhXRRrWsTpkesJ/bSlGSPYPxafQVjSU=", "narHash": "sha256-REQ9ByMk4crAX37e8YDZOBl9Kxn+nTfnnLwwxczcoP0=",
"owner": "nix-community", "owner": "nix-community",
"repo": "NUR", "repo": "NUR",
"rev": "0e1a91ef1d0460adfb5c669a9c0114f46e67956c", "rev": "564ec91b61dab796f1af44502ff3a9c124f4d6da",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -20,7 +20,6 @@
./pirate.nix ./pirate.nix
./podgrab.nix ./podgrab.nix
./postgresql-backup.nix ./postgresql-backup.nix
./postgresql.nix
./quassel.nix ./quassel.nix
./rss-bridge.nix ./rss-bridge.nix
./sabnzbd.nix ./sabnzbd.nix

View file

@ -81,7 +81,6 @@ in
users.groups.drone = { }; users.groups.drone = { };
services.postgresql = { services.postgresql = {
enable = true;
ensureDatabases = [ "drone" ]; ensureDatabases = [ "drone" ];
ensureUsers = [{ ensureUsers = [{
name = "drone"; name = "drone";

View file

@ -63,6 +63,7 @@ in
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
services.postgresql = { services.postgresql = {
enable = true; enable = true;
package = pkgs.postgresql_12;
initialScript = pkgs.writeText "synapse-init.sql" '' initialScript = pkgs.writeText "synapse-init.sql" ''
CREATE ROLE "matrix-synapse" WITH LOGIN PASSWORD 'synapse'; CREATE ROLE "matrix-synapse" WITH LOGIN PASSWORD 'synapse';
CREATE DATABASE "matrix-synapse" WITH OWNER "matrix-synapse" CREATE DATABASE "matrix-synapse" WITH OWNER "matrix-synapse"

View file

@ -78,7 +78,7 @@ in
dashboards = [ dashboards = [
{ {
name = "Node Exporter"; name = "Node Exporter";
options.path = pkgs.nur.repos.alarsyo.grafanaDashboards.node-exporter; options.path = pkgs.nur.repos.alarsyo.grafana-dashboards.node-exporter;
disableDeletion = true; disableDeletion = true;
} }
]; ];

View file

@ -30,7 +30,7 @@ in
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
services.nextcloud = { services.nextcloud = {
enable = true; enable = true;
package = pkgs.nextcloud22; package = pkgs.nextcloud21;
hostName = nextcloudDomain; hostName = nextcloudDomain;
home = "/var/lib/nextcloud"; home = "/var/lib/nextcloud";
maxUploadSize = cfg.maxSize; maxUploadSize = cfg.maxSize;

View file

@ -44,7 +44,7 @@
services.grafana.provision.dashboards = [ services.grafana.provision.dashboards = [
{ {
name = "NGINX"; name = "NGINX";
options.path = pkgs.nur.repos.alarsyo.grafanaDashboards.nginx; options.path = pkgs.nur.repos.alarsyo.grafana-dashboards.nginx;
disableDeletion = true; disableDeletion = true;
} }
]; ];

View file

@ -1,61 +0,0 @@
{ config, lib, pkgs, ... }:
let
cfg = config.my.services.postgresql;
in
{
options.my.services.postgresql = with lib; {
enable = my.mkDisableOption "postgres configuration";
# Transient option to be enabled for migrations
upgradeScript = mkEnableOption "postgres upgrade script";
};
config = lib.mkMerge [
# Let other services enable postgres when they need it
(lib.mkIf cfg.enable {
services.postgresql = {
package = pkgs.postgresql_13;
};
})
# Taken from the manual
(lib.mkIf cfg.upgradeScript {
containers.temp-pg.config.services.postgresql = {
enable = true;
package = pkgs.postgresql_13;
};
environment.systemPackages =
let
newpg = config.containers.temp-pg.config.services.postgresql;
in
[
(pkgs.writeScriptBin "upgrade-pg-cluster" ''
#!/usr/bin/env bash
set -x
export OLDDATA="${config.services.postgresql.dataDir}"
export NEWDATA="${newpg.dataDir}"
export OLDBIN="${config.services.postgresql.package}/bin"
export NEWBIN="${newpg.package}/bin"
if [ "$OLDDATA" -ef "$NEWDATA" ]; then
echo "Cannot migrate to same data directory" >&2
exit 1
fi
install -d -m 0700 -o postgres -g postgres "$NEWDATA"
cd "$NEWDATA"
sudo -u postgres $NEWBIN/initdb -D "$NEWDATA"
systemctl stop postgresql # old one
sudo -u postgres $NEWBIN/pg_upgrade \
--old-datadir "$OLDDATA" --new-datadir "$NEWDATA" \
--old-bindir $OLDBIN --new-bindir $NEWBIN \
"$@"
'')
];
})
];
}