add db role

This commit is contained in:
asyncnomi 2025-08-02 00:09:30 +02:00
parent 18351a41f3
commit f05ce3bca5
5 changed files with 123 additions and 0 deletions

View file

@ -36,4 +36,15 @@
./shared/mail.nix
];
};
db = rec {
master = "db-mtz-lasuite-federez";
slaves = [
"db-ren-lasuite-federez"
];
hosts = [ master ] ++ slaves;
_inherit = [
./shared/db.nix
];
};
}

15
secrets/db/repli.age Normal file
View file

@ -0,0 +1,15 @@
age-encryption.org/v1
-> ssh-ed25519 Zvjaow Cr6SrhcqjjCORgH9MwAcYBuzy/c31XhJ+7fV90RLqgk
XisTJY3l8PzVykl3NDRRx1G0OhJaaC10fPC2V1kuPgU
-> ssh-ed25519 LcHAUw YNV4EkXmwRAEG9yAU1OeBfldS/N8tHmPoKYltrse5GM
xtklxh6Bli3xgKpBmcAlBknIMFDB8jBZtHns7wIciG4
-> ssh-ed25519 Ecp4NA O6sIMS8SBrid2Spm9kIB4bR5Cj4MFVUEtd1L2Xmx9gI
HrtYqnPkkW4FRRCtu5XpkxLRFIRZRtUMBn7qpVSrWFg
-> ssh-ed25519 vHebMw ReeyVVo2WyrcMuA7jjvbeM3fxxbWKMf7OKsymLmtkB8
5iYb8mnGh1w4/9pLtBn4GDzUlibhxMr4RDstqlNGUIw
-> ssh-ed25519 um7xWA fmz2nA3gqUtNjh+YWG4/Pb9mb6H1lO5GDN99SRFxdBQ
BPYb93QYS4opfngTD2MNOlXe3Dh71yPdW5e/v7/Qg04
-> ssh-ed25519 oRtTqQ magv/dJL8COzbtaNIumlREmXx0K0meJqM0q8HyVzRXk
zP2O9Ql34YSvzbFVfNWzT1z+Q9PdvcjviuI0ncDBklk
--- Ay4fJm3FHTZZWU9P3QgfXOPtwm5PIbVjp2b9Me87Xqk
Ãtlyn5Ï{•©<E280A2>º•w×Ñ¥`†ëjÃNä±^ `:ùEÐóï,ÉôoŽ™ùf>¢ªÝFø eB=Ëk½ç¾-Wä<57>µÜ³Žm™ÿ™

View file

@ -46,6 +46,11 @@ let
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJQ24UID4nGKru/to8wSoJ6LMcKwP3d9kZG7dlew0g9S root@mail-ren-lasuite-federez"
];
system-db = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMIJnmYY0ThWBzy7UshWY1k7ZJP+yp8z70Gtbc8QX3BY root@db-mtz-lasuite-federez"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPww9G5M8SSz8PWOJoX/C6hD12BLfGSRCnQQizOiCEGg root@db-ren-lasuite-federez"
];
asyncnomi = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIENo/g3BZ1bJViYE6EY4VZO96a4q8U4nWKjTprQJtjEH asyncnomi" ];
gamma = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKhuKmuBPLAtQSjy4E4UaEmf8Qj56414r+adAJ6BgmO8 gamma" ];
jeltz = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHabXDr/vrx361yaxKK58jHJB77TNVZvqhkIiaTB7ECI jeltz" ];
@ -104,4 +109,8 @@ in
"mail/dkim.age".publicKeys = system-mail ++ users;
"mail/mbox/test.age".publicKeys = system-mail ++ users;
# DB secrets
"db/repli.age".publicKeys = system-db ++ users;
}

7
shared/db.nix Normal file
View file

@ -0,0 +1,7 @@
{ ... }:
{
# Import dependencies
imports = [
./db/postgres.nix
];
}

81
shared/db/postgres.nix Normal file
View file

@ -0,0 +1,81 @@
{ config, lib, ... }:
let
# Import nodes
nodes = import ./../../nodes.nix;
myName = config.hostName;
myNode = nodes."${myName}";
# And mapping
mapping = import ./../../mapping.nix;
cfg = config.services.postgresql;
masterNode = nodes.${mapping.db.master};
masterIP = "172.19.${toString masterNode.zone}.${toString masterNode.id}";
in
{
age.secrets."repli" = {
file = ./../../secrets/db/repli.age;
owner = "postgres";
group = "postgres";
};
systemd.services.postgresql.environment = mkIf builtins.elem myName mapping.db.slaves {
PGPASSFILE = "${config.age.secrets.repli.path}";
};
services.postgresql = {
enable = true;
# Force postgres package major version
# to avoid any unwanted upgrades
package = pkgs.postgresql_17;
identMap = ''
# ArbitraryMapName systemUser DBUser
superuser_map root postgres
superuser_map postgres postgres
'';
authentication = lib.mkOverride 10 builtins.concatStringsSep "\n " [''
#type database DBuser auth-method optional_ident_map
local all all peer map=superuser_map
''] ++ lib.optionalAttrs myName == mapping.db.master [
map (slaveName: let slaveNode = nodes.${slaveName}; in
"host replication replication 172.19.${toString slaveNode.zone}.${toString slaveNode.id}/32 md5"
) mapping.db.slaves
] ++ lib.optionalAttrs builtins.elem myName mapping.db.slaves [''
host replication replication ${masterIP}/32 md5
''];
ensureUsers = [{
name = "replication";
ensureClauses.replication = true;
}];
settings = {
listen_addresses = "localhost,172.19.${toString myNode.zone}.${toString myNode.id}";
log_connections = true;
log_statement = "none";
logging_collector = true;
log_disconnections = true;
} // lib.optionalAttrs myName == mapping.db.master {
wal_level = "logical";
wal_sender_timeout = 10;
max_wal_senders = 16;
wal_keep_size = 1000; # In MB
} // lib.optionalAttrs builtins.elem myName mapping.db.slaves {
wal_level = "logical";
wal_receiver_timeout = 10;
primary_conninfo = "host=${masterIP} port=${cfg.settings.port} user=replication";
hot_standby = "on";
};
};
# The password looks like: "*:*:*:*:<password>"
# Cf: https://www.postgresql.org/docs/current/libpq-pgpass.html
systemd.services.postgresql.postStart = mkIf myName == mapping.db.master ''
$PSQL -tA <<'EOF'
DO $$
DECLARE password TEXT;
BEGIN
password := trim(both from split_part(replace(pg_read_file('${config.age.secrets.repli.path}'), E'\n', '''), ':', 5));
EXECUTE format('ALTER USER replication WITH PASSWORD '''%s''';', password);
END $$;
EOF
'';
}