nix-dotfiles/hosts/tsuki/services/postgres.nix

57 lines
1.4 KiB
Nix
Raw Normal View History

{ config, pkgs, lib, ... }: let
cfg = config.services.postgresql;
in {
services.postgresql = {
enable = true;
2022-06-22 20:16:57 +02:00
enableTCPIP = true;
authentication = pkgs.lib.mkOverride 10 ''
local all all trust
local hydra all ident map=hydra-users
host all all 127.0.0.1/32 trust
host all all ::1/128 trust
'';
settings = {
max_connections = 150;
};
};
services.postgresqlBackup = {
enable = true;
2024-01-23 05:24:47 +01:00
location = "/data/backup/postgres";
backupAll = true;
};
2023-02-25 19:06:06 +01:00
systemd.services.postgresqlBackup = {
2024-01-23 05:24:47 +01:00
requires = [ "postgresql.service" ];
};
systemd.services.postgresql = {
serviceConfig = {
Restart = "always";
RestartSec = 3;
ReadWritePaths = [ cfg.dataDir ];
NoNewPrivileges = true;
PrivateDevices = true;
ProtectClock = true;
ProtectKernelLogs = true;
ProtectKernelModules = true;
# PrivateMounts = true;
RestrictSUIDSGID = true;
ProtectHostname = true;
LockPersonality = true;
ProtectKernelTunables = true;
ProtectSystem = "strict";
ProtectProc = "invisible";
ProtectHome = true;
# PrivateNetwork = true;
PrivateUsers = true;
PrivateTmp = true;
UMask = "0077";
# RestrictAddressFamilies = [ "AF_UNIX AF_INET AF_INET6" ];
SystemCallArchitectures = "native";
};
};
2023-02-25 19:06:06 +01:00
environment.systemPackages = [ config.services.postgresql.package ];
}