stockholm/krebs/1systems/wolf/config.nix

108 lines
2.9 KiB
Nix
Raw Normal View History

2017-04-17 13:45:32 +00:00
{ config, pkgs, ... }:
2015-11-17 21:15:07 +00:00
let
shack-ip = config.krebs.build.host.nets.shack.ip4.addr;
2015-11-17 21:15:07 +00:00
in
2015-10-25 13:07:51 +00:00
{
imports = [
2017-07-13 22:17:58 +00:00
<stockholm/krebs>
<stockholm/krebs/2configs>
2015-10-25 13:07:51 +00:00
<nixpkgs/nixos/modules/profiles/qemu-guest.nix>
2017-07-13 22:17:58 +00:00
<stockholm/krebs/2configs/collectd-base.nix>
2017-07-23 08:46:46 +00:00
<stockholm/krebs/2configs/stats/wolf-client.nix>
2017-07-13 22:17:58 +00:00
<stockholm/krebs/2configs/save-diskspace.nix>
2017-06-01 07:21:20 +00:00
2017-07-13 22:17:58 +00:00
<stockholm/krebs/2configs/graphite.nix>
<stockholm/krebs/2configs/buildbot-krebs.nix>
2017-06-01 07:21:20 +00:00
2017-07-13 22:17:58 +00:00
<stockholm/krebs/2configs/shack/worlddomination.nix>
<stockholm/krebs/2configs/shack/drivedroid.nix>
# <stockholm/krebs/2configs/shack/nix-cacher.nix>
<stockholm/krebs/2configs/shack/mqtt_sub.nix>
<stockholm/krebs/2configs/shack/muell_caller.nix>
<stockholm/krebs/2configs/shack/radioactive.nix>
<stockholm/krebs/2configs/shack/share.nix>
2017-06-01 07:21:20 +00:00
2015-10-25 13:07:51 +00:00
];
2015-11-17 22:13:09 +00:00
# use your own binary cache, fallback use cache.nixos.org (which is used by
# apt-cacher-ng in first place)
2016-01-22 23:27:33 +00:00
2017-05-24 08:51:58 +00:00
services.influxdb.enable = true;
# local discovery in shackspace
nixpkgs.config.packageOverrides = pkgs: { tinc = pkgs.tinc_pre; };
krebs.tinc.retiolum.extraConfig = "TCPOnly = yes";
2016-01-22 23:27:33 +00:00
services.grafana = {
enable = true;
addr = "0.0.0.0";
users.allowSignUp = true;
users.allowOrgCreate = true;
users.autoAssignOrg = true;
auth.anonymous.enable = true;
2016-01-22 23:27:33 +00:00
security = import <secrets/grafana_security.nix>;
};
2017-03-08 16:12:26 +00:00
nix = {
# use the up to date prism cache
2017-03-08 16:12:26 +00:00
binaryCaches = [
"http://cache.prism.r"
"https://cache.nixos.org/"
];
binaryCachePublicKeys = [
"cache.prism-1:+S+6Lo/n27XEtvdlQKuJIcb1yO5NUqUCE2lolmTgNJU="
"hydra.nixos.org-1:CNHJZBh9K4tP3EKF6FkkgeVYsS3ohTl+oS0Qa8bezVs="
];
};
2015-10-25 13:07:51 +00:00
2015-11-17 21:15:07 +00:00
networking = {
2015-11-17 22:13:09 +00:00
firewall.enable = false;
2017-05-24 08:51:58 +00:00
firewall.allowedTCPPorts = [ 8088 8086 8083 ];
2016-06-13 19:00:15 +00:00
interfaces.enp0s3.ip4 = [{
2015-11-17 21:15:07 +00:00
address = shack-ip;
prefixLength = 20;
}];
defaultGateway = "10.42.0.1";
nameservers = [ "10.42.0.100" "10.42.0.200" ];
2015-11-17 21:15:07 +00:00
};
#####################
# uninteresting stuff
#####################
2015-10-25 13:07:51 +00:00
krebs.build.host = config.krebs.hosts.wolf;
boot.kernel.sysctl = {
# Enable IPv6 Privacy Extensions
"net.ipv6.conf.all.use_tempaddr" = 2;
"net.ipv6.conf.default.use_tempaddr" = 2;
};
boot.initrd.availableKernelModules = [
"ata_piix" "uhci_hcd" "ehci_pci" "virtio_pci" "virtio_blk"
];
boot.kernelModules = [ ];
boot.extraModulePackages = [ ];
boot.loader.grub.enable = true;
boot.loader.grub.version = 2;
boot.loader.grub.device = "/dev/vda";
fileSystems."/" = { device = "/dev/disk/by-label/nixos"; fsType = "ext4"; };
swapDevices = [
2015-11-17 21:15:07 +00:00
{ device = "/dev/disk/by-label/swap"; }
2015-10-25 13:07:51 +00:00
];
2017-06-18 12:09:02 +00:00
# fallout of ipv6calypse
networking.extraHosts = ''
hass.shack 10.42.2.191
heidi.shack 10.42.2.135
'';
users.extraUsers.root.openssh.authorizedKeys.keys = [
config.krebs.users.ulrich.pubkey
config.krebs.users.makefu-omo.pubkey
2017-06-18 12:09:02 +00:00
];
2015-10-25 13:07:51 +00:00
time.timeZone = "Europe/Berlin";
2017-05-25 21:21:20 +00:00
sound.enable = false;
2015-10-25 13:07:51 +00:00
}