Merge remote-tracking branch 'prism/master'
This commit is contained in:
commit
3dedfb8de4
@ -11,8 +11,22 @@
|
|||||||
<stockholm/jeschli/2configs/xserver>
|
<stockholm/jeschli/2configs/xserver>
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.loader.systemd-boot.enable = true;
|
# boot.loader.systemd-boot.enable = true;
|
||||||
boot.loader.efi.canTouchEfiVariables = true;
|
boot.loader.efi.canTouchEfiVariables = true;
|
||||||
|
boot.loader.efi.efiSysMountPoint = "/boot";
|
||||||
|
boot.loader.grub = {
|
||||||
|
devices = [ "nodev" ];
|
||||||
|
efiSupport = true;
|
||||||
|
enable = true;
|
||||||
|
extraEntries = ''
|
||||||
|
menuentry "Debian" {
|
||||||
|
insmod ext2
|
||||||
|
insmod chain
|
||||||
|
chainloader /EFI/debian/grubx64.efi
|
||||||
|
}
|
||||||
|
'';
|
||||||
|
version = 2;
|
||||||
|
};
|
||||||
|
|
||||||
jeschliFontSize = 20;
|
jeschliFontSize = 20;
|
||||||
|
|
||||||
@ -56,7 +70,6 @@
|
|||||||
sqlite
|
sqlite
|
||||||
# internet
|
# internet
|
||||||
thunderbird
|
thunderbird
|
||||||
hipchat
|
|
||||||
chromium
|
chromium
|
||||||
google-chrome
|
google-chrome
|
||||||
# programming languages
|
# programming languages
|
||||||
@ -78,6 +91,7 @@
|
|||||||
texlive.combined.scheme-full
|
texlive.combined.scheme-full
|
||||||
pandoc
|
pandoc
|
||||||
redis
|
redis
|
||||||
|
vagrant
|
||||||
# document viewer
|
# document viewer
|
||||||
zathura
|
zathura
|
||||||
];
|
];
|
||||||
@ -92,14 +106,25 @@
|
|||||||
services.printing.enable = true;
|
services.printing.enable = true;
|
||||||
services.printing.drivers = [ pkgs.postscript-lexmark ];
|
services.printing.drivers = [ pkgs.postscript-lexmark ];
|
||||||
|
|
||||||
# Enable the X11 windowing system.
|
services.redis.enable = true;
|
||||||
services.xserver.videoDrivers = [ "nvidia" ];
|
|
||||||
|
services.xserver = {
|
||||||
|
|
||||||
|
desktopManager.session = lib.mkForce [];
|
||||||
|
|
||||||
|
enable = true;
|
||||||
|
display = 11;
|
||||||
|
tty = 11;
|
||||||
|
|
||||||
|
dpi = 200;
|
||||||
|
|
||||||
|
videoDrivers = [ "nvidia" ];
|
||||||
|
synaptics = {
|
||||||
|
enable = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
# services.xserver.windowManager.xmonad.enable = true;
|
|
||||||
# services.xserver.windowManager.xmonad.enableContribAndExtras = true;
|
|
||||||
# services.xserver.displayManager.sddm.enable = true;
|
|
||||||
# services.xserver.dpi = 100;
|
|
||||||
# fonts.fontconfig.dpi = 100;
|
|
||||||
|
|
||||||
users.extraUsers.jeschli = {
|
users.extraUsers.jeschli = {
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
|
44
jeschli/1systems/bln/dcso-vpn.nix
Normal file
44
jeschli/1systems/bln/dcso-vpn.nix
Normal file
@ -0,0 +1,44 @@
|
|||||||
|
with import <stockholm/lib>;
|
||||||
|
{ ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
|
||||||
|
users.extraUsers = {
|
||||||
|
dcsovpn = rec {
|
||||||
|
name = "dcsovpn";
|
||||||
|
uid = genid "dcsovpn";
|
||||||
|
description = "user for running dcso openvpn";
|
||||||
|
home = "/home/${name}";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
users.extraGroups.dcsovpn.gid = genid "dcsovpn";
|
||||||
|
|
||||||
|
services.openvpn.servers = {
|
||||||
|
dcso = {
|
||||||
|
config = ''
|
||||||
|
client
|
||||||
|
dev tun
|
||||||
|
tun-mtu 1356
|
||||||
|
mssfix
|
||||||
|
proto udp
|
||||||
|
float
|
||||||
|
remote 217.111.55.41 1194
|
||||||
|
nobind
|
||||||
|
user dcsovpn
|
||||||
|
group dcsovpn
|
||||||
|
persist-key
|
||||||
|
persist-tun
|
||||||
|
ca ${toString <secrets/dcsovpn/ca.pem>}
|
||||||
|
cert ${toString <secrets/dcsovpn/cert.pem>}
|
||||||
|
key ${toString <secrets/dcsovpn/cert.key>}
|
||||||
|
verb 3
|
||||||
|
mute 20
|
||||||
|
auth-user-pass ${toString <secrets/dcsovpn/login.txt>}
|
||||||
|
route-method exe
|
||||||
|
route-delay 2
|
||||||
|
'';
|
||||||
|
updateResolvConf = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
@ -1,5 +1,5 @@
|
|||||||
# Edit this configuration file to define what should be installed on # your system. Help is available in the configuration.nix(5) man page # and in the NixOS manual (accessible by running ‘nixos-help’).
|
# Edit this configuration file to define what should be installed on # your system. Help is available in the configuration.nix(5) man page # and in the NixOS manual (accessible by running ‘nixos-help’).
|
||||||
{ config, pkgs, ... }:
|
{ config, pkgs, lib, ... }:
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
<stockholm/jeschli>
|
<stockholm/jeschli>
|
||||||
@ -8,6 +8,7 @@
|
|||||||
<stockholm/jeschli/2configs/emacs.nix>
|
<stockholm/jeschli/2configs/emacs.nix>
|
||||||
<stockholm/jeschli/2configs/xdg.nix>
|
<stockholm/jeschli/2configs/xdg.nix>
|
||||||
<stockholm/jeschli/2configs/xserver>
|
<stockholm/jeschli/2configs/xserver>
|
||||||
|
<stockholm/jeschli/2configs/virtualbox.nix>
|
||||||
];
|
];
|
||||||
|
|
||||||
krebs.build.host = config.krebs.hosts.brauerei;
|
krebs.build.host = config.krebs.hosts.brauerei;
|
||||||
@ -24,9 +25,10 @@
|
|||||||
preLVM = true;
|
preLVM = true;
|
||||||
allowDiscards = true;
|
allowDiscards = true;
|
||||||
} ];
|
} ];
|
||||||
# networking.hostName = "nixos";
|
# networking.hostName = "brauerei";
|
||||||
# Define your hostname.
|
# Define your hostname.
|
||||||
networking.wireless.enable = true;
|
# networking.wireless.enable = true;
|
||||||
|
networking.networkmanager.enable = true;
|
||||||
# Enables wireless support via wpa_supplicant.
|
# Enables wireless support via wpa_supplicant.
|
||||||
# Select internationalisation properties.
|
# Select internationalisation properties.
|
||||||
# i18n = {
|
# i18n = {
|
||||||
@ -66,12 +68,25 @@
|
|||||||
chromium
|
chromium
|
||||||
google-chrome
|
google-chrome
|
||||||
# programming languages
|
# programming languages
|
||||||
|
elixir
|
||||||
|
elmPackages.elm
|
||||||
exercism
|
exercism
|
||||||
go
|
go
|
||||||
gcc
|
gcc
|
||||||
ghc
|
ghc
|
||||||
python35
|
python35
|
||||||
python35Packages.pip
|
python35Packages.pip
|
||||||
|
(vagrant.override {
|
||||||
|
bundlerEnv = bundlerEnv.override {
|
||||||
|
bundler = bundler.overrideAttrs (old: {
|
||||||
|
name = "bundler-1.16.1";
|
||||||
|
src = fetchurl {
|
||||||
|
url = "https://rubygems.org/gems/bundler-1.16.1.gem";
|
||||||
|
sha256 = "1s2nq4qnffxg3kwrk7cnwxcvfihlhxm9absl2l6d3qckf3sy1f22";
|
||||||
|
};
|
||||||
|
});
|
||||||
|
};
|
||||||
|
})
|
||||||
# go tools
|
# go tools
|
||||||
golint
|
golint
|
||||||
gotools
|
gotools
|
||||||
@ -84,6 +99,7 @@
|
|||||||
jetbrains.webstorm
|
jetbrains.webstorm
|
||||||
jetbrains.goland
|
jetbrains.goland
|
||||||
# document viewer
|
# document viewer
|
||||||
|
evince
|
||||||
zathura
|
zathura
|
||||||
# xorg
|
# xorg
|
||||||
xorg.xbacklight
|
xorg.xbacklight
|
||||||
@ -100,33 +116,29 @@
|
|||||||
# Enable the OpenSSH daemon.
|
# Enable the OpenSSH daemon.
|
||||||
services.openssh.enable = true;
|
services.openssh.enable = true;
|
||||||
|
|
||||||
# Open ports in the firewall.
|
services.xserver = {
|
||||||
# networking.firewall.allowedTCPPorts = [ ... ];
|
|
||||||
# networking.firewall.allowedUDPPorts = [ ... ];
|
|
||||||
# Or disable the firewall altogether.
|
|
||||||
# networking.firewall.enable = false;
|
|
||||||
|
|
||||||
# Enable CUPS to print documents.
|
# Don't install feh into systemPackages
|
||||||
# services.printing.enable = true;
|
# refs <nixpkgs/nixos/modules/services/x11/desktop-managers>
|
||||||
|
desktopManager.session = lib.mkForce [];
|
||||||
|
|
||||||
# Enable the X11 windowing system.
|
enable = true;
|
||||||
# services.xserver.enable = true;
|
display = 11;
|
||||||
# services.xserver.layout = "us";
|
tty = 11;
|
||||||
# services.xserver.xkbOptions = "eurosign:e";
|
|
||||||
|
|
||||||
# Enable touchpad support.
|
dpi = 96;
|
||||||
# services.xserver.libinput.enable = true;
|
|
||||||
|
# videoDrivers = [ "nvidia" ];
|
||||||
|
synaptics = {
|
||||||
|
enable = true;
|
||||||
|
twoFingerScroll = true;
|
||||||
|
accelFactor = "0.035";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
# Enable the KDE Desktop Environment.
|
|
||||||
# services.xserver.displayManager.sddm.enable = true;
|
|
||||||
# services.xserver.desktopManager.plasma5.enable = true;
|
|
||||||
# services.xserver.displayManager.sddm.enable = true;
|
|
||||||
# services.xserver.windowManager.xmonad.enable = true;
|
|
||||||
# services.xserver.windowManager.xmonad.enableContribAndExtras = true;
|
|
||||||
#
|
|
||||||
# Define a user account. Don't forget to set a password with ‘passwd’.
|
|
||||||
users.extraUsers.jeschli = { # TODO: define as krebs.users
|
users.extraUsers.jeschli = { # TODO: define as krebs.users
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
|
extraGroups = ["docker" "vboxusers"];
|
||||||
uid = 1000;
|
uid = 1000;
|
||||||
};
|
};
|
||||||
users.extraUsers.jamie = {
|
users.extraUsers.jamie = {
|
||||||
|
@ -20,7 +20,15 @@ let
|
|||||||
sha256 = "1z3yhhbmbzfw68qjzyvpbmlyv2a1p814sy5q2knn04kcl30vx94a";
|
sha256 = "1z3yhhbmbzfw68qjzyvpbmlyv2a1p814sy5q2knn04kcl30vx94a";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
customPlugins.vim-fileline = pkgs.vimUtils.buildVimPlugin {
|
||||||
|
name = "file-line-1.0";
|
||||||
|
src = pkgs.fetchFromGitHub {
|
||||||
|
owner = "bogado";
|
||||||
|
repo = "file-line";
|
||||||
|
rev = "1.0";
|
||||||
|
sha256 = "0z47zq9rqh06ny0q8lpcdsraf3lyzn9xvb59nywnarf3nxrk6hx0";
|
||||||
|
};
|
||||||
|
};
|
||||||
in {
|
in {
|
||||||
environment.systemPackages = [
|
environment.systemPackages = [
|
||||||
(pkgs.vim_configurable.customize {
|
(pkgs.vim_configurable.customize {
|
||||||
@ -33,6 +41,8 @@ in {
|
|||||||
setStatements = ''
|
setStatements = ''
|
||||||
set autowrite
|
set autowrite
|
||||||
set clipboard=unnamedplus
|
set clipboard=unnamedplus
|
||||||
|
set listchars=trail:¶
|
||||||
|
set mouse=a
|
||||||
set nocompatible
|
set nocompatible
|
||||||
set path+=**
|
set path+=**
|
||||||
set ruler
|
set ruler
|
||||||
@ -40,7 +50,6 @@ in {
|
|||||||
set undofile "turn on the feature
|
set undofile "turn on the feature
|
||||||
set wildignore+=*.o,*.class,*.hi,*.dyn_hi,*.dyn_o
|
set wildignore+=*.o,*.class,*.hi,*.dyn_hi,*.dyn_o
|
||||||
set wildmenu
|
set wildmenu
|
||||||
set listchars=trail:¶
|
|
||||||
'';
|
'';
|
||||||
remapStatements = ''
|
remapStatements = ''
|
||||||
imap jk <Esc>
|
imap jk <Esc>
|
||||||
@ -91,13 +100,14 @@ in {
|
|||||||
{ names = [
|
{ names = [
|
||||||
"ctrlp"
|
"ctrlp"
|
||||||
"easymotion"
|
"easymotion"
|
||||||
|
"elm-vim"
|
||||||
|
"vim-fileline"
|
||||||
"molokai"
|
"molokai"
|
||||||
"nerdtree"
|
"nerdtree"
|
||||||
"snipmate"
|
"snipmate"
|
||||||
"surround"
|
"surround"
|
||||||
"Syntastic"
|
"Syntastic"
|
||||||
"undotree"
|
"undotree"
|
||||||
"elm-vim"
|
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
{ names = [ "vim-addon-nix" ]; ft_regex = "^nix\$"; }
|
{ names = [ "vim-addon-nix" ]; ft_regex = "^nix\$"; }
|
||||||
|
@ -34,26 +34,6 @@ in {
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.xserver = {
|
|
||||||
|
|
||||||
# Don't install feh into systemPackages
|
|
||||||
# refs <nixpkgs/nixos/modules/services/x11/desktop-managers>
|
|
||||||
desktopManager.session = mkForce [];
|
|
||||||
|
|
||||||
enable = true;
|
|
||||||
display = 11;
|
|
||||||
tty = 11;
|
|
||||||
|
|
||||||
dpi = 200;
|
|
||||||
|
|
||||||
videoDrivers = [ "nvidia" ];
|
|
||||||
synaptics = {
|
|
||||||
enable = true;
|
|
||||||
twoFingerScroll = true;
|
|
||||||
accelFactor = "0.035";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
systemd.services.display-manager.enable = false;
|
systemd.services.display-manager.enable = false;
|
||||||
|
|
||||||
systemd.services.xmonad = {
|
systemd.services.xmonad = {
|
||||||
|
@ -90,7 +90,7 @@ mainNoArgs = do
|
|||||||
, startupHook = do
|
, startupHook = do
|
||||||
setWMName "LG3D"
|
setWMName "LG3D"
|
||||||
whenJustM (liftIO (lookupEnv "XMONAD_STARTUP_HOOK"))
|
whenJustM (liftIO (lookupEnv "XMONAD_STARTUP_HOOK"))
|
||||||
(\path -> forkFile path [] Nothing)
|
(\path -> forkFile path [] Nothing) <+> setWMName "LG3D"
|
||||||
, normalBorderColor = "#1c1c1c"
|
, normalBorderColor = "#1c1c1c"
|
||||||
, focusedBorderColor = "#f000b0"
|
, focusedBorderColor = "#f000b0"
|
||||||
, handleEventHook = handleShutdownEvent
|
, handleEventHook = handleShutdownEvent
|
||||||
@ -130,13 +130,16 @@ spawnTermAt ws = do
|
|||||||
let env' = ("XMONAD_SPAWN_WORKSPACE", ws) : env
|
let env' = ("XMONAD_SPAWN_WORKSPACE", ws) : env
|
||||||
forkFile urxvtcPath [] (Just env')
|
forkFile urxvtcPath [] (Just env')
|
||||||
|
|
||||||
|
|
||||||
myKeys :: XConfig Layout -> Map (KeyMask, KeySym) (X ())
|
myKeys :: XConfig Layout -> Map (KeyMask, KeySym) (X ())
|
||||||
myKeys conf = Map.fromList $
|
myKeys conf = Map.fromList $
|
||||||
[ ((_4 , xK_Escape ), forkFile "/run/wrappers/bin/slock" [] Nothing)
|
[ ((_4 , xK_Escape ), forkFile "/run/wrappers/bin/slock" [] Nothing)
|
||||||
, ((_4S , xK_c ), kill)
|
, ((_4S , xK_c ), kill)
|
||||||
|
|
||||||
, ((_4 , xK_p ), forkFile "${pkgs.pass}/bin/passmenu" ["--type"] Nothing)
|
, ((_4 , xK_p ), spawn "${pkgs.writeDash "my-dmenu" ''
|
||||||
|
export PATH=$PATH:${pkgs.dmenu}/bin
|
||||||
|
exec dmenu_run "$@"
|
||||||
|
''}")
|
||||||
, ((_4 , xK_x ), chooseAction spawnTermAt)
|
, ((_4 , xK_x ), chooseAction spawnTermAt)
|
||||||
, ((_4C , xK_x ), spawnRootTerm)
|
, ((_4C , xK_x ), spawnRootTerm)
|
||||||
|
|
||||||
|
@ -16,6 +16,36 @@
|
|||||||
services.nixosManual.enable = false;
|
services.nixosManual.enable = false;
|
||||||
services.journald.extraConfig = "SystemMaxUse=50M";
|
services.journald.extraConfig = "SystemMaxUse=50M";
|
||||||
}
|
}
|
||||||
|
{
|
||||||
|
systemd.services.mpc-booter = let
|
||||||
|
mpc = "${pkgs.mpc_cli}/bin/mpc -h mpd.shack -p 6600";
|
||||||
|
url = "http://lassul.us:8000/radio.ogg";
|
||||||
|
say = pkgs.writeDash "say" ''
|
||||||
|
tmpfile=$(${pkgs.coreutils}/bin/mktemp)
|
||||||
|
echo "$@" > $tmpfile
|
||||||
|
${pkgs.curl}/bin/curl -i -H "content-type: text/plain" -X POST -d "@$tmpfile" gobbelz.shack/say/
|
||||||
|
rm "$tmpfile"
|
||||||
|
'';
|
||||||
|
in {
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
after = [ "network-online.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
RemainAfterExit = "yes";
|
||||||
|
Type = "oneshot";
|
||||||
|
ExecStart = pkgs.writeDash "mpc-boot" ''
|
||||||
|
until ${mpc} stats;do
|
||||||
|
echo "waiting for mpd.shack to appear"
|
||||||
|
sleep 1
|
||||||
|
done
|
||||||
|
${say} "Willkommen im Shack wertes Mitglied"
|
||||||
|
|
||||||
|
${say} "Lassulus Super Radio wurde gestartet"
|
||||||
|
${mpc} add ${url}
|
||||||
|
${mpc} play
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
];
|
];
|
||||||
krebs.build.host = config.krebs.hosts.onebutton;
|
krebs.build.host = config.krebs.hosts.onebutton;
|
||||||
# NixOS wants to enable GRUB by default
|
# NixOS wants to enable GRUB by default
|
||||||
|
@ -4,7 +4,7 @@ let
|
|||||||
nixpkgs = pkgs.fetchFromGitHub {
|
nixpkgs = pkgs.fetchFromGitHub {
|
||||||
owner = "nixos";
|
owner = "nixos";
|
||||||
repo = "nixpkgs-channels";
|
repo = "nixpkgs-channels";
|
||||||
rev = "6c064e6b"; # only binary cache for unstable arm6
|
rev = "nixos-unstable"; # only binary cache for unstable arm6
|
||||||
sha256 = "1rqzh475xn43phagrr30lb0fd292c1s8as53irihsnd5wcksnbyd";
|
sha256 = "1rqzh475xn43phagrr30lb0fd292c1s8as53irihsnd5wcksnbyd";
|
||||||
};
|
};
|
||||||
in import <stockholm/krebs/source.nix> {
|
in import <stockholm/krebs/source.nix> {
|
||||||
|
@ -63,6 +63,7 @@ in
|
|||||||
grab_repo = steps.Git(
|
grab_repo = steps.Git(
|
||||||
repourl=stockholm_repo,
|
repourl=stockholm_repo,
|
||||||
mode='full',
|
mode='full',
|
||||||
|
submodules=True,
|
||||||
)
|
)
|
||||||
'';
|
'';
|
||||||
builder = {
|
builder = {
|
||||||
|
@ -13,6 +13,9 @@ with import <stockholm/lib>;
|
|||||||
};
|
};
|
||||||
plugins = with pkgs.ReaktorPlugins; [
|
plugins = with pkgs.ReaktorPlugins; [
|
||||||
sed-plugin
|
sed-plugin
|
||||||
|
task-add
|
||||||
|
task-delete
|
||||||
|
task-list
|
||||||
] ++
|
] ++
|
||||||
(attrValues (todo "agenda"))
|
(attrValues (todo "agenda"))
|
||||||
;
|
;
|
||||||
|
@ -174,5 +174,8 @@ in {
|
|||||||
mail = "spam@krebsco.de";
|
mail = "spam@krebsco.de";
|
||||||
pubkey = ''ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwuAZB3wtAvBJFYh+gWdyGaZU4mtqM2dFXmh2rORlbXeh02msu1uv07ck1VKkQ4LgvCBcBsAOeVa1NTz99eLqutwgcqMCytvRNUCibcoEWwHObsK53KhDJj+zotwlFhnPPeK9+EpOP4ngh/tprJikttos5BwBwe2K+lfiid3fmVPZcTTYa77nCwijimMvWEx6CEjq1wiXMUc4+qcEn8Swbwomz/EEQdNE2hgoC3iMW9RqduTFdIJWnjVi0KaxenX9CvQRGbVK5SSu2gwzN59D/okQOCP6+p1gL5r3QRHSLSSRiEHctVQTkpKOifrtLZGSr5zArEmLd/cOVyssHQPCX repo-sync@wolf'';
|
pubkey = ''ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwuAZB3wtAvBJFYh+gWdyGaZU4mtqM2dFXmh2rORlbXeh02msu1uv07ck1VKkQ4LgvCBcBsAOeVa1NTz99eLqutwgcqMCytvRNUCibcoEWwHObsK53KhDJj+zotwlFhnPPeK9+EpOP4ngh/tprJikttos5BwBwe2K+lfiid3fmVPZcTTYa77nCwijimMvWEx6CEjq1wiXMUc4+qcEn8Swbwomz/EEQdNE2hgoC3iMW9RqduTFdIJWnjVi0KaxenX9CvQRGbVK5SSu2gwzN59D/okQOCP6+p1gL5r3QRHSLSSRiEHctVQTkpKOifrtLZGSr5zArEmLd/cOVyssHQPCX repo-sync@wolf'';
|
||||||
};
|
};
|
||||||
|
buildbotSlave = {
|
||||||
|
pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP7cre2crQMI6O4XtIfIiGl1GUqIi060fJlOQJgG0/NH";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -66,6 +66,7 @@ with import <stockholm/lib>;
|
|||||||
ions 60 IN A ${config.krebs.hosts.prism.nets.internet.ip4.addr}
|
ions 60 IN A ${config.krebs.hosts.prism.nets.internet.ip4.addr}
|
||||||
paste 60 IN A ${config.krebs.hosts.prism.nets.internet.ip4.addr}
|
paste 60 IN A ${config.krebs.hosts.prism.nets.internet.ip4.addr}
|
||||||
lol 60 IN A ${config.krebs.hosts.prism.nets.internet.ip4.addr}
|
lol 60 IN A ${config.krebs.hosts.prism.nets.internet.ip4.addr}
|
||||||
|
radio 60 IN A ${config.krebs.hosts.prism.nets.internet.ip4.addr}
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
nets = rec {
|
nets = rec {
|
||||||
|
@ -520,6 +520,38 @@ with import <stockholm/lib>;
|
|||||||
ssh.privkey.path = <secrets/ssh.id_ed25519>;
|
ssh.privkey.path = <secrets/ssh.id_ed25519>;
|
||||||
ssh.pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN5ZmJSypW3LXIJ67DdbxMxCfLtORFkl5jEuD131S5Tr";
|
ssh.pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN5ZmJSypW3LXIJ67DdbxMxCfLtORFkl5jEuD131S5Tr";
|
||||||
};
|
};
|
||||||
|
nextgum = rec {
|
||||||
|
ci = true;
|
||||||
|
cores = 8;
|
||||||
|
nets = rec {
|
||||||
|
internet = {
|
||||||
|
ip4.addr = "144.76.26.247";
|
||||||
|
ip6.addr = "2a01:4f8:191:12f6::2";
|
||||||
|
aliases = [
|
||||||
|
"nextgum.i"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
retiolum = {
|
||||||
|
via = internet;
|
||||||
|
ip4.addr = "10.243.0.213";
|
||||||
|
ip6.addr = "42:f9f0:0000:0000:0000:0000:0000:70d3";
|
||||||
|
aliases = [
|
||||||
|
"nextgum.r"
|
||||||
|
];
|
||||||
|
tinc.pubkey = ''
|
||||||
|
-----BEGIN RSA PUBLIC KEY-----
|
||||||
|
MIIBCgKCAQEAucCebFmS96WorD+Br4UQudmAhMlLpacErjwA/u2argBTT2nGHTR8
|
||||||
|
aN4e0xf3IYLA+iogLIW/JuQfKLe8evEK21iZ3jleW8N7mbCulhasi/0lqWlirrpO
|
||||||
|
npJAiSNF1m7ijoylkEKxtmehze+8ojprUT2hx1ImMlHMWGxvs+TmBbZBMgxAGMJh
|
||||||
|
6cMMDJQi+4d9XrJQ3+XUVK3MkviLA91oIAXsLdFptL6b12siUaz4StQXDJUHemBF
|
||||||
|
3ZwlO+W2Es69ifEhmV6NaDDRcSRdChGbHTz1OU8wYaFNaxWla/iprQQ+jEUldpcN
|
||||||
|
VC18QGYRUAgZ0PCIpKurjWNehJFB3zXt+wIDAQAB
|
||||||
|
-----END RSA PUBLIC KEY-----
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
ssh.pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIcxWFEPzke/Sdd9qNX6rSJgXal8NmINYajpFCxXfYdj root@gum";
|
||||||
|
};
|
||||||
|
|
||||||
gum = rec {
|
gum = rec {
|
||||||
ci = true;
|
ci = true;
|
||||||
|
@ -121,26 +121,56 @@ rec {
|
|||||||
pattern = "^.*(?P<args>http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+).*$$";
|
pattern = "^.*(?P<args>http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+).*$$";
|
||||||
path = with pkgs; [ curl perl ];
|
path = with pkgs; [ curl perl ];
|
||||||
script = pkgs.writePython3 "url-title" [ "beautifulsoup4" "lxml" ] ''
|
script = pkgs.writePython3 "url-title" [ "beautifulsoup4" "lxml" ] ''
|
||||||
|
import cgi
|
||||||
import sys
|
import sys
|
||||||
import urllib.request
|
import urllib.request
|
||||||
from bs4 import BeautifulSoup
|
from bs4 import BeautifulSoup
|
||||||
|
|
||||||
try:
|
try:
|
||||||
soup = BeautifulSoup(urllib.request.urlopen(sys.argv[1]), "lxml")
|
req = urllib.request.Request(sys.argv[1])
|
||||||
|
req.add_header('user-agent', 'Reaktor-url-title')
|
||||||
|
resp = urllib.request.urlopen(req)
|
||||||
|
if resp.headers['content-type'].find('text/html') >= 0:
|
||||||
|
soup = BeautifulSoup(resp.read(16000), "lxml")
|
||||||
title = soup.find('title').string
|
title = soup.find('title').string
|
||||||
|
|
||||||
if title:
|
if len(title.split('\n')) > 5:
|
||||||
if len(title) > 512:
|
title = '\n'.join(title.split('\n')[:5])
|
||||||
print('message to long, skipped')
|
|
||||||
elif len(title.split('\n')) > 5:
|
print(title[:450])
|
||||||
print('to many lines, skipped')
|
|
||||||
else:
|
else:
|
||||||
print(title)
|
cd_header = resp.headers['content-disposition']
|
||||||
|
print(cgi.parse_header(cd_header)[1]['filename'])
|
||||||
except: # noqa: E722
|
except: # noqa: E722
|
||||||
pass
|
pass
|
||||||
'';
|
'';
|
||||||
});
|
});
|
||||||
|
|
||||||
|
taskrcFile = builtins.toFile "taskrc" ''
|
||||||
|
confirmation=no
|
||||||
|
'';
|
||||||
|
|
||||||
|
task-add = buildSimpleReaktorPlugin "task-add" {
|
||||||
|
pattern = "^task-add: (?P<args>.*)$$";
|
||||||
|
script = pkgs.writeDash "task-add" ''
|
||||||
|
${pkgs.taskwarrior}/bin/task rc:${taskrcFile} add "$*"
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
task-list = buildSimpleReaktorPlugin "task-list" {
|
||||||
|
pattern = "^task-list";
|
||||||
|
script = pkgs.writeDash "task-list" ''
|
||||||
|
${pkgs.taskwarrior}/bin/task rc:${taskrcFile} list
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
task-delete = buildSimpleReaktorPlugin "task-delete" {
|
||||||
|
pattern = "^task-remove: (?P<args>.*)$$";
|
||||||
|
script = pkgs.writeDash "task-delete" ''
|
||||||
|
${pkgs.taskwarrior}/bin/task rc:${taskrcFile} delete "$*"
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
todo = name: {
|
todo = name: {
|
||||||
add = buildSimpleReaktorPlugin "${name}-add" {
|
add = buildSimpleReaktorPlugin "${name}-add" {
|
||||||
pattern = "^${name}-add: (?P<args>.*)$$";
|
pattern = "^${name}-add: (?P<args>.*)$$";
|
||||||
|
7
krebs/5pkgs/simple/cholerab/default.nix
Normal file
7
krebs/5pkgs/simple/cholerab/default.nix
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
{ fetchgit, callPackage }: let
|
||||||
|
src = fetchgit {
|
||||||
|
url = "https://github.com/krebs/cholerab";
|
||||||
|
rev = "25d7ef051d6fc74d99b155e768b3c650296a230c";
|
||||||
|
sha256 = "1pymw7v2ql42iq825ccx98s4fp9jsz5b2hjr1qad6bamfc6i7yy9";
|
||||||
|
};
|
||||||
|
in callPackage src {}
|
@ -1,7 +1,7 @@
|
|||||||
{ stdenv, fetchurl
|
{ stdenv, fetchurl
|
||||||
, jre, libX11, libXext, libXcursor, libXrandr, libXxf86vm
|
, jre, libX11, libXext, libXcursor, libXrandr, libXxf86vm
|
||||||
, openjdk
|
, openjdk
|
||||||
, mesa, openal
|
, mesa_glu, openal
|
||||||
, useAlsa ? false, alsaOss ? null }:
|
, useAlsa ? false, alsaOss ? null }:
|
||||||
with stdenv.lib;
|
with stdenv.lib;
|
||||||
|
|
||||||
@ -26,7 +26,7 @@ stdenv.mkDerivation {
|
|||||||
#!${stdenv.shell}
|
#!${stdenv.shell}
|
||||||
|
|
||||||
export _JAVA_AWT_WM_NONREPARENTING=1
|
export _JAVA_AWT_WM_NONREPARENTING=1
|
||||||
export LD_LIBRARY_PATH=\$LD_LIBRARY_PATH:${makeLibraryPath [ libX11 libXext libXcursor libXrandr libXxf86vm mesa openal ]}
|
export LD_LIBRARY_PATH=\$LD_LIBRARY_PATH:${makeLibraryPath [ libX11 libXext libXcursor libXrandr libXxf86vm mesa_glu openal ]}
|
||||||
${if useAlsa then "${alsaOss}/bin/aoss" else "" } \
|
${if useAlsa then "${alsaOss}/bin/aoss" else "" } \
|
||||||
${jre}/bin/java -jar $out/ftb.jar
|
${jre}/bin/java -jar $out/ftb.jar
|
||||||
EOF
|
EOF
|
||||||
|
@ -1,7 +0,0 @@
|
|||||||
{ fetchgit, callPackage }: let
|
|
||||||
src = fetchgit {
|
|
||||||
url = "https://github.com/krebs/thesauron";
|
|
||||||
rev = "8ac22588cf2c20465e3c9348e7ce04885599c2a5";
|
|
||||||
"sha256"= "1ivkjl235dnm5aaqqvarnxkz7zh0gvah22b0fqwlsflrcd5wmgva";
|
|
||||||
};
|
|
||||||
in callPackage src {}
|
|
@ -12,7 +12,7 @@
|
|||||||
|
|
||||||
krebs-source = {
|
krebs-source = {
|
||||||
nixpkgs.git = {
|
nixpkgs.git = {
|
||||||
ref = "7295e175bf6c6e8aa54f1b4d99256ee95d13d385";
|
ref = "56fad146a12a6f934d1d5ef875eb729be1b19129";
|
||||||
url = https://github.com/NixOS/nixpkgs;
|
url = https://github.com/NixOS/nixpkgs;
|
||||||
};
|
};
|
||||||
stockholm.file = toString ../.;
|
stockholm.file = toString ../.;
|
||||||
|
@ -8,11 +8,6 @@
|
|||||||
<stockholm/lass/2configs/retiolum.nix>
|
<stockholm/lass/2configs/retiolum.nix>
|
||||||
<stockholm/lass/2configs/exim-retiolum.nix>
|
<stockholm/lass/2configs/exim-retiolum.nix>
|
||||||
<stockholm/lass/2configs/baseX.nix>
|
<stockholm/lass/2configs/baseX.nix>
|
||||||
<stockholm/lass/2configs/browsers.nix>
|
|
||||||
<stockholm/lass/2configs/programs.nix>
|
|
||||||
<stockholm/lass/2configs/fetchWallpaper.nix>
|
|
||||||
<stockholm/lass/2configs/games.nix>
|
|
||||||
<stockholm/lass/2configs/bitcoin.nix>
|
|
||||||
<stockholm/lass/2configs/AP.nix>
|
<stockholm/lass/2configs/AP.nix>
|
||||||
<stockholm/lass/2configs/blue-host.nix>
|
<stockholm/lass/2configs/blue-host.nix>
|
||||||
];
|
];
|
||||||
|
@ -71,6 +71,9 @@ with import <stockholm/lib>;
|
|||||||
hashPassword
|
hashPassword
|
||||||
thunderbird
|
thunderbird
|
||||||
dpass
|
dpass
|
||||||
|
|
||||||
|
# we want tensorflow! (with GPU acceleration)
|
||||||
|
python3Packages.tensorflowWithCuda
|
||||||
];
|
];
|
||||||
|
|
||||||
users.users = {
|
users.users = {
|
||||||
|
@ -29,6 +29,7 @@ with import <stockholm/lib>;
|
|||||||
<stockholm/lass/2configs/c-base.nix>
|
<stockholm/lass/2configs/c-base.nix>
|
||||||
<stockholm/lass/2configs/br.nix>
|
<stockholm/lass/2configs/br.nix>
|
||||||
<stockholm/lass/2configs/ableton.nix>
|
<stockholm/lass/2configs/ableton.nix>
|
||||||
|
<stockholm/lass/2configs/starcraft.nix>
|
||||||
<stockholm/lass/2configs/dunst.nix>
|
<stockholm/lass/2configs/dunst.nix>
|
||||||
<stockholm/lass/2configs/rtl-sdr.nix>
|
<stockholm/lass/2configs/rtl-sdr.nix>
|
||||||
<stockholm/lass/2configs/backup.nix>
|
<stockholm/lass/2configs/backup.nix>
|
||||||
@ -54,6 +55,7 @@ with import <stockholm/lib>;
|
|||||||
services.nginx = {
|
services.nginx = {
|
||||||
enable = true;
|
enable = true;
|
||||||
virtualHosts.default = {
|
virtualHosts.default = {
|
||||||
|
default = true;
|
||||||
serverAliases = [
|
serverAliases = [
|
||||||
"localhost"
|
"localhost"
|
||||||
"${config.krebs.build.host.name}"
|
"${config.krebs.build.host.name}"
|
||||||
@ -79,9 +81,6 @@ with import <stockholm/lib>;
|
|||||||
client.enable = true;
|
client.enable = true;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
{
|
|
||||||
services.mongodb.enable = true;
|
|
||||||
}
|
|
||||||
];
|
];
|
||||||
|
|
||||||
krebs.build.host = config.krebs.hosts.mors;
|
krebs.build.host = config.krebs.hosts.mors;
|
||||||
@ -179,4 +178,9 @@ with import <stockholm/lib>;
|
|||||||
};
|
};
|
||||||
});
|
});
|
||||||
virtualisation.libvirtd.enable = true;
|
virtualisation.libvirtd.enable = true;
|
||||||
|
|
||||||
|
services.earlyoom = {
|
||||||
|
enable = true;
|
||||||
|
freeMemThreshold = 5;
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
@ -188,6 +188,16 @@ with import <stockholm/lib>;
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
krebs.git.rules = [
|
krebs.git.rules = [
|
||||||
|
{
|
||||||
|
user = with config.krebs.users; [
|
||||||
|
jeschli
|
||||||
|
jeschli-bln
|
||||||
|
jeschli-bolide
|
||||||
|
jeschli-brauerei
|
||||||
|
];
|
||||||
|
repo = [ config.krebs.git.repos.xmonad-stockholm ];
|
||||||
|
perm = with git; push "refs/heads/jeschli*" [ fast-forward non-fast-forward create delete merge ];
|
||||||
|
}
|
||||||
{
|
{
|
||||||
user = with config.krebs.users; [
|
user = with config.krebs.users; [
|
||||||
jeschli
|
jeschli
|
||||||
@ -280,6 +290,18 @@ with import <stockholm/lib>;
|
|||||||
"ssh-rsa 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 lhebendanz@nixos"
|
"ssh-rsa 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 lhebendanz@nixos"
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
{
|
||||||
|
services.nginx = {
|
||||||
|
enable = true;
|
||||||
|
virtualHosts."radio.lassul.us" = {
|
||||||
|
forceSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
locations."/".extraConfig = ''
|
||||||
|
proxy_pass http://localhost:8000;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
{
|
{
|
||||||
lass.nichtparasoup.enable = true;
|
lass.nichtparasoup.enable = true;
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
@ -293,21 +315,6 @@ with import <stockholm/lib>;
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
{ #weechat port forwarding to blue
|
|
||||||
krebs.iptables.tables.filter.INPUT.rules = [
|
|
||||||
{ predicate = "-p tcp --dport 9998"; target = "ACCEPT";}
|
|
||||||
];
|
|
||||||
krebs.iptables.tables.nat.PREROUTING.rules = [
|
|
||||||
{ v6 = false; precedence = 1000; predicate = "-d ${config.krebs.hosts.prism.nets.internet.ip4.addr} -p tcp --dport 9998"; target = "DNAT --to-destination ${config.krebs.hosts.blue.nets.retiolum.ip4.addr}:9999"; }
|
|
||||||
];
|
|
||||||
krebs.iptables.tables.filter.FORWARD.rules = [
|
|
||||||
{ v6 = false; precedence = 1000; predicate = "-d ${config.krebs.hosts.blue.nets.retiolum.ip4.addr} -p tcp --dport 9999"; target = "ACCEPT"; }
|
|
||||||
{ v6 = false; precedence = 1000; predicate = "-s ${config.krebs.hosts.blue.nets.retiolum.ip4.addr}"; target = "ACCEPT"; }
|
|
||||||
];
|
|
||||||
krebs.iptables.tables.nat.POSTROUTING.rules = [
|
|
||||||
{ v6 = false; predicate = "-d ${config.krebs.hosts.blue.nets.retiolum.ip4.addr} -p tcp --dport 9999"; target = "MASQUERADE"; }
|
|
||||||
];
|
|
||||||
}
|
|
||||||
{
|
{
|
||||||
krebs.iptables.tables.filter.INPUT.rules = [
|
krebs.iptables.tables.filter.INPUT.rules = [
|
||||||
{ predicate = "-p udp --dport 51820"; target = "ACCEPT"; }
|
{ predicate = "-p udp --dport 51820"; target = "ACCEPT"; }
|
||||||
@ -341,9 +348,21 @@ with import <stockholm/lib>;
|
|||||||
{ predicate = "-p udp --dport 60000:61000"; target = "ACCEPT";}
|
{ predicate = "-p udp --dport 60000:61000"; target = "ACCEPT";}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
{
|
||||||
|
services.murmur.enable = true;
|
||||||
|
services.murmur.registerName = "lassul.us";
|
||||||
|
krebs.iptables.tables.filter.INPUT.rules = [
|
||||||
|
{ predicate = "-p tcp --dport 64738"; target = "ACCEPT";}
|
||||||
|
];
|
||||||
|
|
||||||
|
}
|
||||||
];
|
];
|
||||||
|
|
||||||
krebs.build.host = config.krebs.hosts.prism;
|
krebs.build.host = config.krebs.hosts.prism;
|
||||||
# workaround because grub store paths are broken
|
# workaround because grub store paths are broken
|
||||||
boot.copyKernels = true;
|
boot.copyKernels = true;
|
||||||
|
services.earlyoom = {
|
||||||
|
enable = true;
|
||||||
|
freeMemThreshold = 5;
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
@ -71,8 +71,10 @@ in {
|
|||||||
ag
|
ag
|
||||||
bank
|
bank
|
||||||
cabal2nix
|
cabal2nix
|
||||||
|
cholerab
|
||||||
dic
|
dic
|
||||||
dmenu
|
dmenu
|
||||||
|
font-size
|
||||||
gi
|
gi
|
||||||
gitAndTools.qgit
|
gitAndTools.qgit
|
||||||
git-preview
|
git-preview
|
||||||
@ -81,6 +83,7 @@ in {
|
|||||||
mpv-poll
|
mpv-poll
|
||||||
much
|
much
|
||||||
ncdu
|
ncdu
|
||||||
|
nix-index
|
||||||
nix-repl
|
nix-repl
|
||||||
nmap
|
nmap
|
||||||
pavucontrol
|
pavucontrol
|
||||||
@ -91,7 +94,6 @@ in {
|
|||||||
sxiv
|
sxiv
|
||||||
taskwarrior
|
taskwarrior
|
||||||
termite
|
termite
|
||||||
thesauron
|
|
||||||
timewarrior
|
timewarrior
|
||||||
xclip
|
xclip
|
||||||
xephyrify
|
xephyrify
|
||||||
|
@ -5,6 +5,7 @@ with import <stockholm/lib>;
|
|||||||
imports = [
|
imports = [
|
||||||
<stockholm/lass/2configs/container-networking.nix>
|
<stockholm/lass/2configs/container-networking.nix>
|
||||||
];
|
];
|
||||||
|
systemd.services."container@blue".reloadIfChanged = mkForce false;
|
||||||
containers.blue = {
|
containers.blue = {
|
||||||
config = { ... }: {
|
config = { ... }: {
|
||||||
environment.systemPackages = [ pkgs.git ];
|
environment.systemPackages = [ pkgs.git ];
|
||||||
|
@ -90,7 +90,7 @@ in {
|
|||||||
}
|
}
|
||||||
( createQuteUser "qb" [ "audio" ] 20 )
|
( createQuteUser "qb" [ "audio" ] 20 )
|
||||||
( createFirefoxUser "ff" [ "audio" ] 10 )
|
( createFirefoxUser "ff" [ "audio" ] 10 )
|
||||||
( createChromiumUser "cr" [ "audio" ] 9 )
|
( createChromiumUser "cr" [ "audio" "video" ] 9 )
|
||||||
( createChromiumUser "gm" [ "video" "audio" ] 8 )
|
( createChromiumUser "gm" [ "video" "audio" ] 8 )
|
||||||
( createChromiumUser "wk" [ "audio" ] 0 )
|
( createChromiumUser "wk" [ "audio" ] 0 )
|
||||||
( createChromiumUser "fb" [ "audio" ] 0 )
|
( createChromiumUser "fb" [ "audio" ] 0 )
|
||||||
|
@ -9,7 +9,7 @@ in {
|
|||||||
dev = {
|
dev = {
|
||||||
name = "dev";
|
name = "dev";
|
||||||
uid = genid "dev";
|
uid = genid "dev";
|
||||||
extraGroups = [ "docker" ];
|
extraGroups = [ "docker" "vboxusers" ];
|
||||||
description = "user for collaborative development";
|
description = "user for collaborative development";
|
||||||
home = "/home/dev";
|
home = "/home/dev";
|
||||||
useDefaultShell = true;
|
useDefaultShell = true;
|
||||||
@ -17,6 +17,7 @@ in {
|
|||||||
openssh.authorizedKeys.keys = [
|
openssh.authorizedKeys.keys = [
|
||||||
config.krebs.users.lass.pubkey
|
config.krebs.users.lass.pubkey
|
||||||
config.krebs.users.lass-android.pubkey
|
config.krebs.users.lass-android.pubkey
|
||||||
|
config.krebs.users.lass-mors.pubkey
|
||||||
config.krebs.users.jeschli-bln.pubkey
|
config.krebs.users.jeschli-bln.pubkey
|
||||||
config.krebs.users.jeschli-brauerei.pubkey
|
config.krebs.users.jeschli-brauerei.pubkey
|
||||||
"ssh-rsa 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 u0_a165@localhost"
|
"ssh-rsa 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 u0_a165@localhost"
|
||||||
@ -54,10 +55,21 @@ in {
|
|||||||
krebs.per-user.dev.packages = [
|
krebs.per-user.dev.packages = [
|
||||||
pkgs.go
|
pkgs.go
|
||||||
];
|
];
|
||||||
|
environment.variables.GOPATH = "$HOME/go";
|
||||||
|
|
||||||
security.sudo.extraConfig = ''
|
security.sudo.extraConfig = ''
|
||||||
${mainUser.name} ALL=(dev) NOPASSWD: ALL
|
${mainUser.name} ALL=(dev) NOPASSWD: ALL
|
||||||
'';
|
'';
|
||||||
|
|
||||||
services.minio.enable = true;
|
networking.interfaces.et0.ipv4.addresses = [
|
||||||
|
{ address = "10.99.23.1"; prefixLength = 24; }
|
||||||
|
];
|
||||||
|
virtualisation.docker.enable = true;
|
||||||
|
environment.etc."docker/daemon.json".source = pkgs.writeText "daemon.json" ''
|
||||||
|
{
|
||||||
|
"bip": "172.25.0.1/16"
|
||||||
|
}
|
||||||
|
'';
|
||||||
|
services.rabbitmq.enable = true;
|
||||||
|
services.postgresql.enable = true;
|
||||||
}
|
}
|
||||||
|
@ -188,21 +188,21 @@ let
|
|||||||
foreground = "#3B7C87"
|
foreground = "#3B7C87"
|
||||||
background = "#191311"
|
background = "#191311"
|
||||||
#background = "#2B313C"
|
#background = "#2B313C"
|
||||||
timeout = 0
|
timeout = 1
|
||||||
|
|
||||||
[urgency_normal]
|
[urgency_normal]
|
||||||
frame_color = "#5B8234"
|
frame_color = "#5B8234"
|
||||||
foreground = "#5B8234"
|
foreground = "#5B8234"
|
||||||
background = "#191311"
|
background = "#191311"
|
||||||
#background = "#2B313C"
|
#background = "#2B313C"
|
||||||
timeout = 0
|
timeout = 1
|
||||||
|
|
||||||
[urgency_critical]
|
[urgency_critical]
|
||||||
frame_color = "#B7472A"
|
frame_color = "#B7472A"
|
||||||
foreground = "#B7472A"
|
foreground = "#B7472A"
|
||||||
background = "#191311"
|
background = "#191311"
|
||||||
#background = "#2B313C"
|
#background = "#2B313C"
|
||||||
timeout = 0
|
timeout = 1
|
||||||
|
|
||||||
|
|
||||||
# Every section that isn't one of the above is interpreted as a rules to
|
# Every section that isn't one of the above is interpreted as a rules to
|
||||||
|
@ -83,6 +83,7 @@ with import <stockholm/lib>;
|
|||||||
{ from = "elitedangerous@lassul.us"; to = lass.mail; }
|
{ from = "elitedangerous@lassul.us"; to = lass.mail; }
|
||||||
{ from = "boardgamegeek@lassul.us"; to = lass.mail; }
|
{ from = "boardgamegeek@lassul.us"; to = lass.mail; }
|
||||||
{ from = "qwertee@lassul.us"; to = lass.mail; }
|
{ from = "qwertee@lassul.us"; to = lass.mail; }
|
||||||
|
{ from = "zazzle@lassul.us"; to = lass.mail; }
|
||||||
];
|
];
|
||||||
system-aliases = [
|
system-aliases = [
|
||||||
{ from = "mailer-daemon"; to = "postmaster"; }
|
{ from = "mailer-daemon"; to = "postmaster"; }
|
||||||
|
@ -30,6 +30,14 @@ let
|
|||||||
rules = concatMap make-rules (attrValues repos);
|
rules = concatMap make-rules (attrValues repos);
|
||||||
|
|
||||||
public-repos = mapAttrs make-public-repo {
|
public-repos = mapAttrs make-public-repo {
|
||||||
|
cholerab = {
|
||||||
|
cgit.desc = "krebs thesauron & enterprise-patterns";
|
||||||
|
cgit.section = "documentation";
|
||||||
|
};
|
||||||
|
disko = {
|
||||||
|
cgit.desc = "take a description of your disk layout and produce a format script";
|
||||||
|
cgit.section = "software";
|
||||||
|
};
|
||||||
news = {
|
news = {
|
||||||
cgit.desc = "take a rss feed and a timeout and print it to stdout";
|
cgit.desc = "take a rss feed and a timeout and print it to stdout";
|
||||||
cgit.section = "software";
|
cgit.section = "software";
|
||||||
@ -61,6 +69,10 @@ let
|
|||||||
cgit.desc = "krebs deployment";
|
cgit.desc = "krebs deployment";
|
||||||
cgit.section = "software";
|
cgit.section = "software";
|
||||||
};
|
};
|
||||||
|
xmonad-stockholm = {
|
||||||
|
cgit.desc = "krebs xmonad modules";
|
||||||
|
cgit.section = "configuration";
|
||||||
|
};
|
||||||
} // mapAttrs make-public-repo-silent {
|
} // mapAttrs make-public-repo-silent {
|
||||||
nixos-aws = {
|
nixos-aws = {
|
||||||
collaborators = [ {
|
collaborators = [ {
|
||||||
|
@ -11,7 +11,7 @@ let
|
|||||||
cloudkrebs = "119";
|
cloudkrebs = "119";
|
||||||
};
|
};
|
||||||
urgent = [
|
urgent = [
|
||||||
"\\blass@mors\\b"
|
"\\blass@blue\\b"
|
||||||
];
|
];
|
||||||
in {
|
in {
|
||||||
environment.systemPackages = [
|
environment.systemPackages = [
|
||||||
|
@ -100,6 +100,12 @@ with import <stockholm/lib>;
|
|||||||
exec echo 'DID SOMEBODY SAY BLOCKCHAIN? https://paste.krebsco.de/r99pMoQq/+inline'
|
exec echo 'DID SOMEBODY SAY BLOCKCHAIN? https://paste.krebsco.de/r99pMoQq/+inline'
|
||||||
'';
|
'';
|
||||||
})
|
})
|
||||||
|
(buildSimpleReaktorPlugin "shrug" {
|
||||||
|
pattern = "^!shrug$";
|
||||||
|
script = pkgs.writeDash "shrug" ''
|
||||||
|
exec echo '¯\_(ツ)_/¯'
|
||||||
|
'';
|
||||||
|
})
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -27,6 +27,7 @@ let
|
|||||||
user = with config.krebs.users; [
|
user = with config.krebs.users; [
|
||||||
config.krebs.users."${config.networking.hostName}-repo-sync"
|
config.krebs.users."${config.networking.hostName}-repo-sync"
|
||||||
lass
|
lass
|
||||||
|
lass-mors
|
||||||
lass-shodan
|
lass-shodan
|
||||||
];
|
];
|
||||||
repo = [ repo ];
|
repo = [ repo ];
|
||||||
@ -136,5 +137,6 @@ in {
|
|||||||
(sync-retiolum "stockholm")
|
(sync-retiolum "stockholm")
|
||||||
(sync-retiolum "wai-middleware-time")
|
(sync-retiolum "wai-middleware-time")
|
||||||
(sync-retiolum "xmonad-stockholm")
|
(sync-retiolum "xmonad-stockholm")
|
||||||
|
(sync-retiolum "nix-writers")
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
53
lass/2configs/starcraft.nix
Normal file
53
lass/2configs/starcraft.nix
Normal file
@ -0,0 +1,53 @@
|
|||||||
|
{ config, pkgs, ... }: let
|
||||||
|
mainUser = config.users.extraUsers.mainUser;
|
||||||
|
newWine = pkgs.wineStaging;
|
||||||
|
#newWine = pkgs.wineStaging.overrideAttrs (old: {
|
||||||
|
# name = "wine-3.7";
|
||||||
|
# buildInputs = old.buildInputs ++ [
|
||||||
|
# pkgs.libuuid.bin
|
||||||
|
# pkgs.autoconf.out
|
||||||
|
# ];
|
||||||
|
# src = pkgs.fetchurl {
|
||||||
|
# url = "https://dl.winehq.org/wine/source/3.x/wine-3.7.tar.xz";
|
||||||
|
# sha256 = "1drbzk3y0m14lkq3vzwwkvain5shykgcbmyzh6gcb5r4sxh3givn";
|
||||||
|
# };
|
||||||
|
# postPatch = old.postPatch or "" + ''
|
||||||
|
# patchShebangs tools
|
||||||
|
# cp -r ${pkgs.fetchFromGitHub {
|
||||||
|
# sha256 = "0kam73jqhah7bzji5csxxhhfdp6byhzpcph6xnzjqz2aic5xk7xi";
|
||||||
|
# owner = "wine-staging";
|
||||||
|
# repo = "wine-staging";
|
||||||
|
# rev = "v3.7";
|
||||||
|
# }}/patches .
|
||||||
|
# chmod +w patches
|
||||||
|
# cd patches
|
||||||
|
# patchShebangs gitapply.sh
|
||||||
|
# ./patchinstall.sh DESTDIR="$PWD/.." --all
|
||||||
|
# cd ..
|
||||||
|
# '';
|
||||||
|
|
||||||
|
#});
|
||||||
|
#newWine = (import (builtins.fetchGit {
|
||||||
|
# url = "https://github.com/NixOS/nixpkgs";
|
||||||
|
# rev = "696c6bed4e8e2d9fd9b956dea7e5d49531e9d13f";
|
||||||
|
#}) {}).wineStaging;
|
||||||
|
in {
|
||||||
|
users.users= {
|
||||||
|
starcraft = {
|
||||||
|
isNormalUser = true;
|
||||||
|
extraGroups = [
|
||||||
|
"audio"
|
||||||
|
"video"
|
||||||
|
];
|
||||||
|
packages = [
|
||||||
|
newWine
|
||||||
|
pkgs.winetricks
|
||||||
|
pkgs.mpg123
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
security.sudo.extraConfig = ''
|
||||||
|
${mainUser.name} ALL=(starcraft) NOPASSWD: ALL
|
||||||
|
'';
|
||||||
|
}
|
||||||
|
|
@ -5,7 +5,7 @@ with import <stockholm/lib>;
|
|||||||
services.urxvtd.enable = true;
|
services.urxvtd.enable = true;
|
||||||
|
|
||||||
krebs.xresources.resources.urxvt = ''
|
krebs.xresources.resources.urxvt = ''
|
||||||
URxvt*SaveLines: 4096
|
URxvt*SaveLines: 1000000
|
||||||
URxvt*scrollBar: false
|
URxvt*scrollBar: false
|
||||||
URxvt*urgentOnBell: true
|
URxvt*urgentOnBell: true
|
||||||
URxvt.perl-ext-common: default,clipboard,url-select,keyboard-select
|
URxvt.perl-ext-common: default,clipboard,url-select,keyboard-select
|
||||||
@ -19,6 +19,12 @@ with import <stockholm/lib>;
|
|||||||
URxvt.keysym.M-Escape: perl:keyboard-select:activate
|
URxvt.keysym.M-Escape: perl:keyboard-select:activate
|
||||||
URxvt.keysym.M-s: perl:keyboard-select:search
|
URxvt.keysym.M-s: perl:keyboard-select:search
|
||||||
|
|
||||||
|
URxvt.keysym.M-F1: command:\033]710;-*-clean-*-*-*-*-*-*-*-*-*-*-iso10646-1\007\033]711;-*-clean-*-*-*-*-*-*-*-*-*-*-iso10646-1\007
|
||||||
|
URxvt.keysym.M-F2: command:\033]710;xft:Monospace:size=15\007\033]711;xft:Monospace:size=15:bold\007
|
||||||
|
URxvt.keysym.M-F3: command:\033]710;xft:Monospace:size=20\007\033]711;xft:Monospace:size=20:bold\007
|
||||||
|
URxvt.keysym.M-F4: command:\033]710;xft:Monospace:size=25\007\033]711;xft:Monospace:size=25:bold\007
|
||||||
|
URxvt.keysym.M-F5: command:\033]710;xft:Monospace:size=30\007\033]711;xft:Monospace:size=30:bold\007
|
||||||
|
|
||||||
URxvt.intensityStyles: false
|
URxvt.intensityStyles: false
|
||||||
|
|
||||||
URxvt*background: #000000
|
URxvt*background: #000000
|
||||||
|
@ -2,6 +2,12 @@
|
|||||||
|
|
||||||
with import <stockholm/lib>;
|
with import <stockholm/lib>;
|
||||||
let
|
let
|
||||||
|
unstable_nixpkgs = import (pkgs.fetchFromGitHub {
|
||||||
|
owner = "NixOS";
|
||||||
|
repo = "nixpkgs";
|
||||||
|
rev = "a8c71037e041725d40fbf2f3047347b6833b1703";
|
||||||
|
sha256 = "1z4cchcw7qgjhy0x6mnz7iqvpswc2nfjpdynxc54zpm66khfrjqw";
|
||||||
|
}) {};
|
||||||
out = {
|
out = {
|
||||||
environment.systemPackages = [
|
environment.systemPackages = [
|
||||||
(hiPrio vim)
|
(hiPrio vim)
|
||||||
@ -9,6 +15,10 @@ let
|
|||||||
(pkgs.writeDashBin "govet" ''
|
(pkgs.writeDashBin "govet" ''
|
||||||
go vet "$@"
|
go vet "$@"
|
||||||
'')
|
'')
|
||||||
|
(hiPrio (unstable_nixpkgs.python3.withPackages (ps: [
|
||||||
|
ps.python-language-server
|
||||||
|
ps.pyls-isort
|
||||||
|
])))
|
||||||
];
|
];
|
||||||
|
|
||||||
environment.etc.vimrc.source = vimrc;
|
environment.etc.vimrc.source = vimrc;
|
||||||
@ -68,11 +78,17 @@ let
|
|||||||
au BufRead,BufNewFile /dev/shm/* set nobackup nowritebackup noswapfile
|
au BufRead,BufNewFile /dev/shm/* set nobackup nowritebackup noswapfile
|
||||||
|
|
||||||
"Syntastic config
|
"Syntastic config
|
||||||
let g:syntastic_python_checkers=['flake8']
|
"let g:syntastic_python_checkers=['flake8']
|
||||||
let g:syntastic_python_flake8_post_args='--ignore=E501'
|
"let g:syntastic_python_flake8_post_args='--ignore=E501'
|
||||||
|
|
||||||
let g:go_metalinter_autosave = 1
|
nnoremap <F5> :call LanguageClient_contextMenu()<CR>
|
||||||
let g:go_metalinter_deadline = "10s"
|
set hidden
|
||||||
|
let g:LanguageClient_serverCommands = {
|
||||||
|
\ 'python': ['pyls'],
|
||||||
|
\ 'go': ['~/go/bin/go-langserver']
|
||||||
|
\ }
|
||||||
|
|
||||||
|
let g:LanguageClient_diagnosticsDisplay = { 2: { "signText": "W" } }
|
||||||
|
|
||||||
nmap <esc>q :buffer
|
nmap <esc>q :buffer
|
||||||
nmap <M-q> :buffer
|
nmap <M-q> :buffer
|
||||||
@ -115,9 +131,11 @@ let
|
|||||||
extra-runtimepath = concatMapStringsSep "," (pkg: "${pkg.rtp}") [
|
extra-runtimepath = concatMapStringsSep "," (pkg: "${pkg.rtp}") [
|
||||||
pkgs.vimPlugins.ack-vim
|
pkgs.vimPlugins.ack-vim
|
||||||
pkgs.vimPlugins.Gundo
|
pkgs.vimPlugins.Gundo
|
||||||
pkgs.vimPlugins.Syntastic
|
#pkgs.vimPlugins.Syntastic
|
||||||
pkgs.vimPlugins.undotree
|
pkgs.vimPlugins.undotree
|
||||||
pkgs.vimPlugins.vim-go
|
pkgs.vimPlugins.vim-go
|
||||||
|
pkgs.vimPlugins.fzf-vim
|
||||||
|
unstable_nixpkgs.vimPlugins.LanguageClient-neovim
|
||||||
(pkgs.vimUtils.buildVimPlugin {
|
(pkgs.vimUtils.buildVimPlugin {
|
||||||
name = "file-line-1.0";
|
name = "file-line-1.0";
|
||||||
src = pkgs.fetchFromGitHub {
|
src = pkgs.fetchFromGitHub {
|
||||||
|
@ -15,7 +15,7 @@ in {
|
|||||||
description = "user for running VirtualBox";
|
description = "user for running VirtualBox";
|
||||||
home = "/home/virtual";
|
home = "/home/virtual";
|
||||||
useDefaultShell = true;
|
useDefaultShell = true;
|
||||||
extraGroups = [ "vboxusers" "audio" ];
|
extraGroups = [ "vboxusers" "audio" "video" ];
|
||||||
createHome = true;
|
createHome = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -119,6 +119,7 @@ in {
|
|||||||
{ from = "ms@ubikmedia.eu"; to = "ms"; }
|
{ from = "ms@ubikmedia.eu"; to = "ms"; }
|
||||||
{ from = "ubik@ubikmedia.eu"; to = "domsen, jms, ms"; }
|
{ from = "ubik@ubikmedia.eu"; to = "domsen, jms, ms"; }
|
||||||
{ from = "akayguen@freemonkey.art"; to ="akayguen"; }
|
{ from = "akayguen@freemonkey.art"; to ="akayguen"; }
|
||||||
|
{ from = "bui@freemonkey.art"; to ="bui"; }
|
||||||
|
|
||||||
{ from = "testuser@lassul.us"; to = "testuser"; }
|
{ from = "testuser@lassul.us"; to = "testuser"; }
|
||||||
{ from = "testuser@ubikmedia.eu"; to = "testuser"; }
|
{ from = "testuser@ubikmedia.eu"; to = "testuser"; }
|
||||||
@ -183,5 +184,12 @@ in {
|
|||||||
createHome = true;
|
createHome = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
users.users.bui = {
|
||||||
|
uid = genid_signed "bui";
|
||||||
|
home = "/home/bui";
|
||||||
|
useDefaultShell = true;
|
||||||
|
createHome = true;
|
||||||
|
};
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -66,6 +66,22 @@ in {
|
|||||||
locations."/tinc".extraConfig = ''
|
locations."/tinc".extraConfig = ''
|
||||||
alias ${config.krebs.tinc_graphs.workingDir}/external;
|
alias ${config.krebs.tinc_graphs.workingDir}/external;
|
||||||
'';
|
'';
|
||||||
|
locations."/urlaubyay2018".extraConfig = ''
|
||||||
|
autoindex on;
|
||||||
|
alias /srv/http/lassul.us-media/india2018;
|
||||||
|
auth_basic "Restricted Content";
|
||||||
|
auth_basic_user_file ${pkgs.writeText "pics-user-pass" ''
|
||||||
|
paolo:$apr1$aQ6mYNR3$ho.aJ7icqSO.y.xKo3GQf0
|
||||||
|
''};
|
||||||
|
'';
|
||||||
|
locations."/heilstadt".extraConfig = ''
|
||||||
|
autoindex on;
|
||||||
|
alias /srv/http/lassul.us-media/grabowsee2018;
|
||||||
|
auth_basic "Restricted Content";
|
||||||
|
auth_basic_user_file ${pkgs.writeText "pics-user-pass" ''
|
||||||
|
c-base:$apr1$aQ6mYNR3$ho.aJ7icqSO.y.xKo3GQf0
|
||||||
|
''};
|
||||||
|
'';
|
||||||
# TODO make this work!
|
# TODO make this work!
|
||||||
locations."= /ddate".extraConfig = let
|
locations."= /ddate".extraConfig = let
|
||||||
script = pkgs.writeBash "test" ''
|
script = pkgs.writeBash "test" ''
|
||||||
|
@ -194,7 +194,7 @@ rec {
|
|||||||
in {
|
in {
|
||||||
services.nginx.virtualHosts."${domain}" = {
|
services.nginx.virtualHosts."${domain}" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
addSSL = true;
|
forceSSL = true;
|
||||||
serverAliases = domains;
|
serverAliases = domains;
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
root /srv/http/${domain}/;
|
root /srv/http/${domain}/;
|
||||||
|
@ -17,6 +17,7 @@ in {
|
|||||||
createHome = true;
|
createHome = true;
|
||||||
packages = [
|
packages = [
|
||||||
pkgs.wine
|
pkgs.wine
|
||||||
|
pkgs.winetricks
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -41,6 +41,10 @@ with import <stockholm/lib>;
|
|||||||
type = types.path;
|
type = types.path;
|
||||||
default = pkgs.writeScript "echo_lol" "echo lol";
|
default = pkgs.writeScript "echo_lol" "echo lol";
|
||||||
};
|
};
|
||||||
|
vglrun = mkOption {
|
||||||
|
type = types.bool;
|
||||||
|
default = false;
|
||||||
|
};
|
||||||
wm = mkOption {
|
wm = mkOption {
|
||||||
#TODO find type
|
#TODO find type
|
||||||
type = types.string;
|
type = types.string;
|
||||||
@ -116,9 +120,11 @@ with import <stockholm/lib>;
|
|||||||
${pkgs.coreutils}/bin/kill $WM_PID
|
${pkgs.coreutils}/bin/kill $WM_PID
|
||||||
${pkgs.coreutils}/bin/kill $XEPHYR_PID
|
${pkgs.coreutils}/bin/kill $XEPHYR_PID
|
||||||
'';
|
'';
|
||||||
sudo_ = pkgs.writeDash "${cfg.name}-sudo" ''
|
sudo_ = pkgs.writeDash "${cfg.name}-sudo" (if cfg.vglrun then ''
|
||||||
/var/run/wrappers/bin/sudo -u ${cfg.name} -i ${vglrun_} "$@"
|
/var/run/wrappers/bin/sudo -u ${cfg.name} -i ${vglrun_} "$@"
|
||||||
'';
|
'' else ''
|
||||||
|
/var/run/wrappers/bin/sudo -u ${cfg.name} -i env DISPLAY=:${cfg.display} ${cfg.script} "$@"
|
||||||
|
'');
|
||||||
vglrun_ = pkgs.writeDash "${cfg.name}-vglrun" ''
|
vglrun_ = pkgs.writeDash "${cfg.name}-vglrun" ''
|
||||||
DISPLAY=:${cfg.display} ${pkgs.virtualgl}/bin/vglrun ${cfg.extraVglrunArgs} ${cfg.script} "$@"
|
DISPLAY=:${cfg.display} ${pkgs.virtualgl}/bin/vglrun ${cfg.extraVglrunArgs} ${cfg.script} "$@"
|
||||||
'';
|
'';
|
||||||
|
@ -48,7 +48,8 @@ import XMonad.Util.EZConfig (additionalKeysP)
|
|||||||
import XMonad.Util.NamedWindows (getName)
|
import XMonad.Util.NamedWindows (getName)
|
||||||
import XMonad.Util.Run (safeSpawn)
|
import XMonad.Util.Run (safeSpawn)
|
||||||
|
|
||||||
import XMonad.Stockholm.Shutdown
|
import XMonad.Stockholm.Shutdown (handleShutdownEvent, sendShutdownEvent)
|
||||||
|
import XMonad.Stockholm.Pager (defaultWindowColors, pager, MatchMethod(MatchPrefix), PagerConfig(..))
|
||||||
|
|
||||||
data LibNotifyUrgencyHook = LibNotifyUrgencyHook deriving (Read, Show)
|
data LibNotifyUrgencyHook = LibNotifyUrgencyHook deriving (Read, Show)
|
||||||
|
|
||||||
@ -129,8 +130,8 @@ myKeyMap =
|
|||||||
, ("M4-f", floatNext True)
|
, ("M4-f", floatNext True)
|
||||||
, ("M4-b", sendMessage ToggleStruts)
|
, ("M4-b", sendMessage ToggleStruts)
|
||||||
|
|
||||||
, ("M4-v", withWorkspace autoXPConfig (windows . W.greedyView))
|
, ("M4-v", gets windowset >>= allWorkspaceNames >>= pager pagerConfig (windows . W.view) )
|
||||||
, ("M4-S-v", withWorkspace autoXPConfig (windows . W.shift))
|
, ("M4-S-v", gets windowset >>= allWorkspaceNames >>= pager pagerConfig (windows . W.shift) )
|
||||||
, ("M4-C-v", withWorkspace autoXPConfig (windows . copy))
|
, ("M4-C-v", withWorkspace autoXPConfig (windows . copy))
|
||||||
|
|
||||||
, ("M4-m", withFocused minimizeWindow)
|
, ("M4-m", withFocused minimizeWindow)
|
||||||
@ -183,6 +184,21 @@ infixAutoXPConfig = autoXPConfig
|
|||||||
{ searchPredicate = isInfixOf
|
{ searchPredicate = isInfixOf
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pagerConfig :: PagerConfig
|
||||||
|
pagerConfig = def
|
||||||
|
{ pc_font = myFont
|
||||||
|
, pc_cellwidth = 64
|
||||||
|
, pc_matchmethod = MatchPrefix
|
||||||
|
, pc_windowColors = windowColors
|
||||||
|
}
|
||||||
|
where
|
||||||
|
windowColors _ _ _ True _ = ("#ef4242","#ff2323")
|
||||||
|
windowColors wsf m c u wf = do
|
||||||
|
let y = defaultWindowColors wsf m c u wf
|
||||||
|
if m == False && wf == True
|
||||||
|
then ("#402020", snd y)
|
||||||
|
else y
|
||||||
|
|
||||||
gridConfig :: GSConfig WorkspaceId
|
gridConfig :: GSConfig WorkspaceId
|
||||||
gridConfig = def
|
gridConfig = def
|
||||||
{ gs_cellwidth = 100
|
{ gs_cellwidth = 100
|
||||||
@ -191,6 +207,10 @@ gridConfig = def
|
|||||||
, gs_navigate = navNSearch
|
, gs_navigate = navNSearch
|
||||||
, gs_font = myFont
|
, gs_font = myFont
|
||||||
}
|
}
|
||||||
|
|
||||||
|
allWorkspaceNames :: W.StackSet i l a sid sd -> X [i]
|
||||||
|
allWorkspaceNames ws =
|
||||||
|
return $ map W.tag (W.hidden ws) ++ [W.tag $ W.workspace $ W.current ws]
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
1
makefu/0tests/data/secrets/nsupdate-hub.nix
Normal file
1
makefu/0tests/data/secrets/nsupdate-hub.nix
Normal file
@ -0,0 +1 @@
|
|||||||
|
{ "lol" = "wut"; }
|
0
makefu/0tests/data/secrets/uhub.sql
Normal file
0
makefu/0tests/data/secrets/uhub.sql
Normal file
@ -2,28 +2,13 @@
|
|||||||
|
|
||||||
with import <stockholm/lib>;
|
with import <stockholm/lib>;
|
||||||
let
|
let
|
||||||
# hw-specific
|
|
||||||
external-mac = "2a:c5:6e:d2:fc:7f";
|
|
||||||
main-disk = "/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-0-0-0";
|
|
||||||
external-gw = "185.194.140.1";
|
|
||||||
# single partition, label "nixos"
|
|
||||||
# cd /var/src; curl https://github.com/nixos/nixpkgs/tarball/809cf38 -L | tar zx ; mv * nixpkgs && touch .populate
|
|
||||||
|
|
||||||
|
|
||||||
# static
|
|
||||||
external-ip = config.krebs.build.host.nets.internet.ip4.addr;
|
external-ip = config.krebs.build.host.nets.internet.ip4.addr;
|
||||||
external-ip6 = config.krebs.build.host.nets.internet.ip6.addr;
|
ext-if = config.makefu.server.primary-itf;
|
||||||
external-gw6 = "fe80::1";
|
|
||||||
external-netmask = 22;
|
|
||||||
external-netmask6 = 64;
|
|
||||||
internal-ip = config.krebs.build.host.nets.retiolum.ip4.addr;
|
|
||||||
ext-if = "et0"; # gets renamed on the fly
|
|
||||||
in {
|
in {
|
||||||
imports = [
|
imports = [
|
||||||
<stockholm/makefu>
|
<stockholm/makefu>
|
||||||
<nixpkgs/nixos/modules/profiles/qemu-guest.nix>
|
./hardware-config.nix
|
||||||
<stockholm/makefu/2configs/headless.nix>
|
<stockholm/makefu/2configs/headless.nix>
|
||||||
<stockholm/makefu/2configs/fs/single-partition-ext4.nix>
|
|
||||||
# <stockholm/makefu/2configs/smart-monitor.nix>
|
# <stockholm/makefu/2configs/smart-monitor.nix>
|
||||||
|
|
||||||
<stockholm/makefu/2configs/git/cgit-retiolum.nix>
|
<stockholm/makefu/2configs/git/cgit-retiolum.nix>
|
||||||
@ -49,6 +34,7 @@ in {
|
|||||||
# <stockholm/makefu/2configs/sabnzbd.nix>
|
# <stockholm/makefu/2configs/sabnzbd.nix>
|
||||||
<stockholm/makefu/2configs/torrent.nix>
|
<stockholm/makefu/2configs/torrent.nix>
|
||||||
<stockholm/makefu/2configs/mosh.nix>
|
<stockholm/makefu/2configs/mosh.nix>
|
||||||
|
# <stockholm/makefu/2configs/retroshare.nix>
|
||||||
|
|
||||||
# network
|
# network
|
||||||
<stockholm/makefu/2configs/vpn/openvpn-server.nix>
|
<stockholm/makefu/2configs/vpn/openvpn-server.nix>
|
||||||
@ -90,6 +76,15 @@ in {
|
|||||||
<stockholm/makefu/2configs/syncthing.nix>
|
<stockholm/makefu/2configs/syncthing.nix>
|
||||||
|
|
||||||
# <stockholm/makefu/2configs/opentracker.nix>
|
# <stockholm/makefu/2configs/opentracker.nix>
|
||||||
|
<stockholm/makefu/2configs/hub.nix>
|
||||||
|
{ # ncdc
|
||||||
|
environment.systemPackages = [ pkgs.ncdc ];
|
||||||
|
networking.firewall = {
|
||||||
|
allowedUDPPorts = [ 51411 ];
|
||||||
|
allowedTCPPorts = [ 51411 ];
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
<stockholm/makefu/2configs/stats/client.nix>
|
<stockholm/makefu/2configs/stats/client.nix>
|
||||||
# <stockholm/makefu/2configs/logging/client.nix>
|
# <stockholm/makefu/2configs/logging/client.nix>
|
||||||
|
|
||||||
@ -187,7 +182,6 @@ in {
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
makefu.server.primary-itf = ext-if;
|
|
||||||
|
|
||||||
# access
|
# access
|
||||||
users.users = {
|
users.users = {
|
||||||
@ -200,6 +194,7 @@ in {
|
|||||||
weechat
|
weechat
|
||||||
bepasty-client-cli
|
bepasty-client-cli
|
||||||
get
|
get
|
||||||
|
tmux
|
||||||
];
|
];
|
||||||
services.bitlbee = {
|
services.bitlbee = {
|
||||||
enable = true;
|
enable = true;
|
||||||
@ -207,15 +202,8 @@ in {
|
|||||||
};
|
};
|
||||||
|
|
||||||
# Hardware
|
# Hardware
|
||||||
boot.loader.grub.device = main-disk;
|
|
||||||
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "sd_mod" "sr_mod" ];
|
|
||||||
boot.kernelModules = [ "kvm-intel" ];
|
|
||||||
|
|
||||||
# Network
|
# Network
|
||||||
services.udev.extraRules = ''
|
|
||||||
SUBSYSTEM=="net", ATTR{address}=="${external-mac}", NAME="${ext-if}"
|
|
||||||
'';
|
|
||||||
boot.kernelParams = [ ];
|
|
||||||
networking = {
|
networking = {
|
||||||
firewall = {
|
firewall = {
|
||||||
allowPing = true;
|
allowPing = true;
|
||||||
@ -249,19 +237,8 @@ in {
|
|||||||
21032
|
21032
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
interfaces."${ext-if}" = {
|
|
||||||
ip4 = [{
|
|
||||||
address = external-ip;
|
|
||||||
prefixLength = external-netmask;
|
|
||||||
}];
|
|
||||||
ip6 = [{
|
|
||||||
address = external-ip6;
|
|
||||||
prefixLength = external-netmask6;
|
|
||||||
}];
|
|
||||||
};
|
|
||||||
defaultGateway6 = external-gw6;
|
|
||||||
defaultGateway = external-gw;
|
|
||||||
nameservers = [ "8.8.8.8" ];
|
nameservers = [ "8.8.8.8" ];
|
||||||
};
|
};
|
||||||
|
users.users.makefu.extraGroups = [ "download" "nginx" ];
|
||||||
|
boot.tmpOnTmpfs = true;
|
||||||
}
|
}
|
||||||
|
46
makefu/1systems/gum/hardware-config.nix
Normal file
46
makefu/1systems/gum/hardware-config.nix
Normal file
@ -0,0 +1,46 @@
|
|||||||
|
{ config, ... }:
|
||||||
|
let
|
||||||
|
external-mac = "2a:c5:6e:d2:fc:7f";
|
||||||
|
main-disk = "/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive-scsi0-0-0-0";
|
||||||
|
external-gw = "185.194.140.1";
|
||||||
|
# single partition, label "nixos"
|
||||||
|
# cd /var/src; curl https://github.com/nixos/nixpkgs/tarball/809cf38 -L | tar zx ; mv * nixpkgs && touch .populate
|
||||||
|
|
||||||
|
|
||||||
|
# static
|
||||||
|
external-ip = config.krebs.build.host.nets.internet.ip4.addr;
|
||||||
|
external-ip6 = config.krebs.build.host.nets.internet.ip6.addr;
|
||||||
|
external-gw6 = "fe80::1";
|
||||||
|
external-netmask = 22;
|
||||||
|
external-netmask6 = 64;
|
||||||
|
internal-ip = config.krebs.build.host.nets.retiolum.ip4.addr;
|
||||||
|
ext-if = "et0"; # gets renamed on the fly
|
||||||
|
in {
|
||||||
|
imports = [
|
||||||
|
<nixpkgs/nixos/modules/profiles/qemu-guest.nix>
|
||||||
|
<stockholm/makefu/2configs/fs/single-partition-ext4.nix>
|
||||||
|
];
|
||||||
|
|
||||||
|
makefu.server.primary-itf = ext-if;
|
||||||
|
services.udev.extraRules = ''
|
||||||
|
SUBSYSTEM=="net", ATTR{address}=="${external-mac}", NAME="${ext-if}"
|
||||||
|
'';
|
||||||
|
networking = {
|
||||||
|
interfaces."${ext-if}" = {
|
||||||
|
ipv4.addresses = [{
|
||||||
|
address = external-ip;
|
||||||
|
prefixLength = external-netmask;
|
||||||
|
}];
|
||||||
|
ipv6.addresses = [{
|
||||||
|
address = external-ip6;
|
||||||
|
prefixLength = external-netmask6;
|
||||||
|
}];
|
||||||
|
};
|
||||||
|
defaultGateway6 = external-gw6;
|
||||||
|
defaultGateway = external-gw;
|
||||||
|
};
|
||||||
|
boot.kernelParams = [ ];
|
||||||
|
boot.loader.grub.device = main-disk;
|
||||||
|
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "sd_mod" "sr_mod" ];
|
||||||
|
boot.kernelModules = [ "kvm-intel" ];
|
||||||
|
}
|
25
makefu/1systems/kexec/config.nix
Normal file
25
makefu/1systems/kexec/config.nix
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{ config, pkgs, lib, ... }:
|
||||||
|
|
||||||
|
with import <stockholm/lib>;
|
||||||
|
{
|
||||||
|
imports = [
|
||||||
|
<stockholm/makefu>
|
||||||
|
# <stockholm/makefu/2configs/tools/core.nix>
|
||||||
|
<nixpkgs/nixos/modules/installer/netboot/netboot-minimal.nix>
|
||||||
|
<clever_kexec/kexec/kexec.nix>
|
||||||
|
];
|
||||||
|
# cd ~/stockholm ; nix-build '<nixpkgs/nixos>' -A config.system.build.kexec_tarball -j 4 -I nixos-config=makefu/1systems/iso.nix -I secrets=/home/makefu/secrets/iso
|
||||||
|
|
||||||
|
krebs.build.host = config.krebs.hosts.iso;
|
||||||
|
krebs.hidden-ssh.enable = true;
|
||||||
|
environment.extraInit = ''
|
||||||
|
EDITOR=vim
|
||||||
|
'';
|
||||||
|
services.openssh = {
|
||||||
|
enable = true;
|
||||||
|
hostKeys = [
|
||||||
|
{ bits = 8192; type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; }
|
||||||
|
];
|
||||||
|
};
|
||||||
|
systemd.services.sshd.wantedBy = lib.mkForce [ "multi-user.target" ];
|
||||||
|
}
|
3
makefu/1systems/kexec/source.nix
Normal file
3
makefu/1systems/kexec/source.nix
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
import <stockholm/makefu/source.nix> {
|
||||||
|
name="iso";
|
||||||
|
}
|
248
makefu/1systems/nextgum/config.nix
Normal file
248
makefu/1systems/nextgum/config.nix
Normal file
@ -0,0 +1,248 @@
|
|||||||
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
|
with import <stockholm/lib>;
|
||||||
|
let
|
||||||
|
external-ip = config.krebs.build.host.nets.internet.ip4.addr;
|
||||||
|
ext-if = config.makefu.server.primary-itf;
|
||||||
|
in {
|
||||||
|
imports = [
|
||||||
|
<stockholm/makefu>
|
||||||
|
./hardware-config.nix
|
||||||
|
./transfer-config.nix
|
||||||
|
<stockholm/makefu/2configs/headless.nix>
|
||||||
|
# <stockholm/makefu/2configs/smart-monitor.nix>
|
||||||
|
|
||||||
|
# Security
|
||||||
|
<stockholm/makefu/2configs/sshd-totp.nix>
|
||||||
|
|
||||||
|
# Tools
|
||||||
|
<stockholm/makefu/2configs/tools/core.nix>
|
||||||
|
<stockholm/makefu/2configs/tools/dev.nix>
|
||||||
|
<stockholm/makefu/2configs/tools/sec.nix>
|
||||||
|
<stockholm/makefu/2configs/vim.nix>
|
||||||
|
<stockholm/makefu/2configs/zsh-user.nix>
|
||||||
|
<stockholm/makefu/2configs/mosh.nix>
|
||||||
|
|
||||||
|
<stockholm/makefu/2configs/git/cgit-retiolum.nix>
|
||||||
|
<stockholm/makefu/2configs/backup.nix>
|
||||||
|
<stockholm/makefu/2configs/exim-retiolum.nix>
|
||||||
|
<stockholm/makefu/2configs/tinc/retiolum.nix>
|
||||||
|
# services
|
||||||
|
<stockholm/makefu/2configs/sabnzbd.nix>
|
||||||
|
|
||||||
|
# sharing
|
||||||
|
<stockholm/makefu/2configs/share/gum.nix>
|
||||||
|
<stockholm/makefu/2configs/torrent.nix>
|
||||||
|
#<stockholm/makefu/2configs/retroshare.nix>
|
||||||
|
## <stockholm/makefu/2configs/ipfs.nix>
|
||||||
|
#<stockholm/makefu/2configs/syncthing.nix>
|
||||||
|
{ # ncdc
|
||||||
|
environment.systemPackages = [ pkgs.ncdc ];
|
||||||
|
networking.firewall = {
|
||||||
|
allowedUDPPorts = [ 51411 ];
|
||||||
|
allowedTCPPorts = [ 51411 ];
|
||||||
|
};
|
||||||
|
}
|
||||||
|
# <stockholm/makefu/2configs/opentracker.nix>
|
||||||
|
|
||||||
|
## network
|
||||||
|
<stockholm/makefu/2configs/vpn/openvpn-server.nix>
|
||||||
|
# <stockholm/makefu/2configs/vpn/vpnws/server.nix>
|
||||||
|
<stockholm/makefu/2configs/dnscrypt/server.nix>
|
||||||
|
<stockholm/makefu/2configs/iodined.nix>
|
||||||
|
|
||||||
|
## buildbot
|
||||||
|
<stockholm/makefu/2configs/remote-build/slave.nix>
|
||||||
|
|
||||||
|
# Removed until move: no extra mails
|
||||||
|
# <stockholm/makefu/2configs/urlwatch>
|
||||||
|
# Removed until move: avoid double-update of domain
|
||||||
|
# <stockholm/makefu/2configs/hub.nix>
|
||||||
|
# Removed until move: avoid letsencrypt ban
|
||||||
|
### Web
|
||||||
|
#<stockholm/makefu/2configs/nginx/share-download.nix>
|
||||||
|
#<stockholm/makefu/2configs/nginx/euer.test.nix>
|
||||||
|
#<stockholm/makefu/2configs/nginx/euer.mon.nix>
|
||||||
|
#<stockholm/makefu/2configs/nginx/euer.wiki.nix>
|
||||||
|
#<stockholm/makefu/2configs/nginx/euer.blog.nix>
|
||||||
|
## <stockholm/makefu/2configs/nginx/gum.krebsco.de.nix>
|
||||||
|
#<stockholm/makefu/2configs/nginx/public_html.nix>
|
||||||
|
#<stockholm/makefu/2configs/nginx/update.connector.one.nix>
|
||||||
|
#<stockholm/makefu/2configs/nginx/misa-felix-hochzeit.ml.nix>
|
||||||
|
|
||||||
|
#<stockholm/makefu/2configs/deployment/photostore.krebsco.de.nix>
|
||||||
|
#<stockholm/makefu/2configs/deployment/graphs.nix>
|
||||||
|
#<stockholm/makefu/2configs/deployment/owncloud.nix>
|
||||||
|
#<stockholm/makefu/2configs/deployment/boot-euer.nix>
|
||||||
|
#<stockholm/makefu/2configs/deployment/bgt/hidden_service.nix>
|
||||||
|
|
||||||
|
{
|
||||||
|
services.taskserver.enable = true;
|
||||||
|
services.taskserver.fqdn = config.krebs.build.host.name;
|
||||||
|
services.taskserver.listenHost = "::";
|
||||||
|
services.taskserver.organisations.home.users = [ "makefu" ];
|
||||||
|
networking.firewall.extraCommands = ''
|
||||||
|
iptables -A INPUT -i retiolum -p tcp --dport 53589 -j ACCEPT
|
||||||
|
ip6tables -A INPUT -i retiolum -p tcp --dport 53589 -j ACCEPT
|
||||||
|
'';
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
<stockholm/makefu/2configs/stats/client.nix>
|
||||||
|
# <stockholm/makefu/2configs/logging/client.nix>
|
||||||
|
|
||||||
|
## Temporary:
|
||||||
|
# <stockholm/makefu/2configs/temp/rst-issue.nix>
|
||||||
|
<stockholm/makefu/2configs/virtualisation/docker.nix>
|
||||||
|
<stockholm/makefu/2configs/virtualisation/libvirt.nix>
|
||||||
|
|
||||||
|
#{
|
||||||
|
# services.dockerRegistry.enable = true;
|
||||||
|
# networking.firewall.allowedTCPPorts = [ 8443 ];
|
||||||
|
|
||||||
|
# services.nginx.virtualHosts."euer.krebsco.de" = {
|
||||||
|
# forceSSL = true;
|
||||||
|
# enableACME = true;
|
||||||
|
# extraConfig = ''
|
||||||
|
# client_max_body_size 1000M;
|
||||||
|
# '';
|
||||||
|
# locations."/".proxyPass = "http://localhost:5000";
|
||||||
|
# };
|
||||||
|
#}
|
||||||
|
{ # wireguard server
|
||||||
|
|
||||||
|
# opkg install wireguard luci-proto-wireguard
|
||||||
|
|
||||||
|
# TODO: networking.nat
|
||||||
|
|
||||||
|
# boot.kernel.sysctl."net.ipv4.ip_forward" = 1;
|
||||||
|
# conf.all.proxy_arp =1
|
||||||
|
networking.firewall = {
|
||||||
|
allowedUDPPorts = [ 51820 ];
|
||||||
|
extraCommands = ''
|
||||||
|
iptables -t nat -A POSTROUTING -s 10.244.0.0/24 -o ${ext-if} -j MASQUERADE
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.wireguard.interfaces.wg0 = {
|
||||||
|
ips = [ "10.244.0.1/24" ];
|
||||||
|
listenPort = 51820;
|
||||||
|
privateKeyFile = (toString <secrets>) + "/wireguard.key";
|
||||||
|
allowedIPsAsRoutes = true;
|
||||||
|
peers = [
|
||||||
|
{
|
||||||
|
# x
|
||||||
|
allowedIPs = [ "10.244.0.2/32" ];
|
||||||
|
publicKey = "fe5smvKVy5GAn7EV4w4tav6mqIAKhGWQotm7dRuRt1g=";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
# vbob
|
||||||
|
allowedIPs = [ "10.244.0.3/32" ];
|
||||||
|
publicKey = "Lju7EsCu1OWXhkhdNR7c/uiN60nr0TUPHQ+s8ULPQTw=";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
# x-test
|
||||||
|
allowedIPs = [ "10.244.0.4/32" ];
|
||||||
|
publicKey = "vZ/AJpfDLJyU3DzvYeW70l4FNziVgSTumA89wGHG7XY=";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
# work-router
|
||||||
|
allowedIPs = [ "10.244.0.5/32" ];
|
||||||
|
publicKey = "QJMwwYu/92koCASbHnR/vqe/rN00EV6/o7BGwLockDw=";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
# workr
|
||||||
|
allowedIPs = [ "10.244.0.6/32" ];
|
||||||
|
publicKey = "OFhCF56BrV9tjqW1sxqXEKH/GdqamUT1SqZYSADl5GA=";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
}
|
||||||
|
{ # iperf3
|
||||||
|
networking.firewall.allowedUDPPorts = [ 5201 ];
|
||||||
|
networking.firewall.allowedTCPPorts = [ 5201 ];
|
||||||
|
}
|
||||||
|
|
||||||
|
];
|
||||||
|
makefu.dl-dir = "/var/download";
|
||||||
|
|
||||||
|
services.openssh.hostKeys = [
|
||||||
|
{ bits = 4096; path = (toString <secrets/ssh_host_rsa_key>); type = "rsa"; }
|
||||||
|
{ path = (toString <secrets/ssh_host_ed25519_key>); type = "ed25519"; } ];
|
||||||
|
###### stable
|
||||||
|
services.nginx.virtualHosts.cgit.serverAliases = [ "cgit.euer.krebsco.de" ];
|
||||||
|
krebs.build.host = config.krebs.hosts.gum;
|
||||||
|
|
||||||
|
krebs.tinc.retiolum = {
|
||||||
|
extraConfig = ''
|
||||||
|
ListenAddress = ${external-ip} 53
|
||||||
|
ListenAddress = ${external-ip} 655
|
||||||
|
ListenAddress = ${external-ip} 21031
|
||||||
|
'';
|
||||||
|
connectTo = [
|
||||||
|
"muhbaasu" "tahoe" "flap" "wry"
|
||||||
|
"ni"
|
||||||
|
"fastpoke" "prism" "dishfire" "echelon" "cloudkrebs"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
|
# access
|
||||||
|
users.users = {
|
||||||
|
root.openssh.authorizedKeys.keys = [ config.krebs.users.makefu-omo.pubkey ];
|
||||||
|
makefu.openssh.authorizedKeys.keys = [ config.krebs.users.makefu-vbob.pubkey config.krebs.users.makefu-bob.pubkey ];
|
||||||
|
};
|
||||||
|
|
||||||
|
# Chat
|
||||||
|
environment.systemPackages = with pkgs;[
|
||||||
|
weechat
|
||||||
|
bepasty-client-cli
|
||||||
|
get
|
||||||
|
tmux
|
||||||
|
];
|
||||||
|
services.bitlbee = {
|
||||||
|
enable = true;
|
||||||
|
libpurple_plugins = [ pkgs.telegram-purple ];
|
||||||
|
};
|
||||||
|
|
||||||
|
# Hardware
|
||||||
|
|
||||||
|
# Network
|
||||||
|
networking = {
|
||||||
|
firewall = {
|
||||||
|
allowPing = true;
|
||||||
|
logRefusedConnections = false;
|
||||||
|
allowedTCPPorts = [
|
||||||
|
# smtp
|
||||||
|
25
|
||||||
|
# http
|
||||||
|
80 443
|
||||||
|
# httptunnel
|
||||||
|
8080 8443
|
||||||
|
# tinc
|
||||||
|
655
|
||||||
|
# tinc-shack
|
||||||
|
21032
|
||||||
|
# tinc-retiolum
|
||||||
|
21031
|
||||||
|
# taskserver
|
||||||
|
53589
|
||||||
|
# temp vnc
|
||||||
|
18001
|
||||||
|
# temp reverseshell
|
||||||
|
31337
|
||||||
|
];
|
||||||
|
allowedUDPPorts = [
|
||||||
|
# tinc
|
||||||
|
655 53
|
||||||
|
# tinc-retiolum
|
||||||
|
21031
|
||||||
|
# tinc-shack
|
||||||
|
21032
|
||||||
|
];
|
||||||
|
};
|
||||||
|
nameservers = [ "8.8.8.8" ];
|
||||||
|
};
|
||||||
|
users.users.makefu.extraGroups = [ "download" "nginx" ];
|
||||||
|
boot.tmpOnTmpfs = true;
|
||||||
|
}
|
80
makefu/1systems/nextgum/hardware-config.nix
Normal file
80
makefu/1systems/nextgum/hardware-config.nix
Normal file
@ -0,0 +1,80 @@
|
|||||||
|
{ config, ... }:
|
||||||
|
let
|
||||||
|
external-mac = "50:46:5d:9f:63:6b";
|
||||||
|
main-disk = "/dev/disk/by-id/ata-TOSHIBA_DT01ACA300_13H8863AS";
|
||||||
|
sec-disk = "/dev/disk/by-id/ata-TOSHIBA_DT01ACA300_23OJ2GJAS";
|
||||||
|
external-gw = "144.76.26.225";
|
||||||
|
# single partition, label "nixos"
|
||||||
|
# cd /var/src; curl https://github.com/nixos/nixpkgs/tarball/809cf38 -L | tar zx ; mv * nixpkgs && touch .populate
|
||||||
|
|
||||||
|
|
||||||
|
# static
|
||||||
|
external-ip = "144.76.26.247";
|
||||||
|
external-ip6 = "2a01:4f8:191:12f6::2";
|
||||||
|
external-gw6 = "fe80::1";
|
||||||
|
external-netmask = 27;
|
||||||
|
external-netmask6 = 64;
|
||||||
|
internal-ip = config.krebs.build.host.nets.retiolum.ip4.addr;
|
||||||
|
ext-if = "et0"; # gets renamed on the fly
|
||||||
|
in {
|
||||||
|
imports = [
|
||||||
|
];
|
||||||
|
makefu.server.primary-itf = ext-if;
|
||||||
|
services.udev.extraRules = ''
|
||||||
|
SUBSYSTEM=="net", ATTR{address}=="${external-mac}", NAME="${ext-if}"
|
||||||
|
'';
|
||||||
|
networking = {
|
||||||
|
interfaces."${ext-if}" = {
|
||||||
|
ipv4.addresses = [{
|
||||||
|
address = external-ip;
|
||||||
|
prefixLength = external-netmask;
|
||||||
|
}];
|
||||||
|
ipv6.addresses = [{
|
||||||
|
address = external-ip6;
|
||||||
|
prefixLength = external-netmask6;
|
||||||
|
}];
|
||||||
|
};
|
||||||
|
defaultGateway6 = external-gw6;
|
||||||
|
defaultGateway = external-gw;
|
||||||
|
};
|
||||||
|
boot.kernelParams = [ ];
|
||||||
|
boot.loader.grub.enable = true;
|
||||||
|
boot.loader.grub.version = 2;
|
||||||
|
boot.loader.grub.devices = [ main-disk ];
|
||||||
|
boot.initrd.availableKernelModules = [
|
||||||
|
"ata_piix" "vmw_pvscsi" "virtio_pci" "sd_mod" "ahci"
|
||||||
|
"xhci_pci" "ehci_pci" "ahci" "sd_mod"
|
||||||
|
];
|
||||||
|
boot.kernelModules = [ "kvm-intel" ];
|
||||||
|
hardware.enableRedistributableFirmware = true;
|
||||||
|
fileSystems."/" = {
|
||||||
|
device = "/dev/mapper/nixos-root";
|
||||||
|
fsType = "ext4";
|
||||||
|
};
|
||||||
|
fileSystems."/boot" = {
|
||||||
|
device = "/dev/sda2";
|
||||||
|
fsType = "vfat";
|
||||||
|
};
|
||||||
|
# parted -s -a optimal "$disk" \
|
||||||
|
# mklabel gpt \
|
||||||
|
# mkpart no-fs 0 1024KiB \
|
||||||
|
# set 1 bios_grub on \
|
||||||
|
# mkpart ESP fat32 1025KiB 1024MiB set 2 boot on \
|
||||||
|
# mkpart primary 1025MiB 100%
|
||||||
|
# parted -s -a optimal "/dev/sdb" \
|
||||||
|
# mklabel gpt \
|
||||||
|
# mkpart primary 1M 100%
|
||||||
|
|
||||||
|
#mkfs.vfat /dev/sda2
|
||||||
|
#pvcreate /dev/sda3
|
||||||
|
#pvcreate /dev/sdb1
|
||||||
|
#vgcreate nixos /dev/sda3 /dev/sdb1
|
||||||
|
#lvcreate -L 120G -n root nixos
|
||||||
|
#mkfs.ext4 /dev/mapper/nixos-root
|
||||||
|
#mount /dev/mapper/nixos-root /mnt
|
||||||
|
#mkdir /mnt/boot
|
||||||
|
#mount /dev/sda2 /mnt/boot
|
||||||
|
#mkdir -p /mnt/var/src
|
||||||
|
#touch /mnt/var/src/.populate
|
||||||
|
|
||||||
|
}
|
5
makefu/1systems/nextgum/source.nix
Normal file
5
makefu/1systems/nextgum/source.nix
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
import <stockholm/makefu/source.nix> {
|
||||||
|
name="nextgum";
|
||||||
|
torrent = true;
|
||||||
|
clever_kexec = true;
|
||||||
|
}
|
7
makefu/1systems/nextgum/transfer-config.nix
Normal file
7
makefu/1systems/nextgum/transfer-config.nix
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
{ config, lib, ... }:
|
||||||
|
# configuration which is only required for the time of the transfer
|
||||||
|
{
|
||||||
|
krebs.tinc.retiolum.connectTo = [ "gum" ];
|
||||||
|
krebs.build.host = lib.mkForce config.krebs.hosts.nextgum;
|
||||||
|
}
|
||||||
|
|
@ -38,6 +38,7 @@ let
|
|||||||
|
|
||||||
priv-repos = mapAttrs make-priv-repo {
|
priv-repos = mapAttrs make-priv-repo {
|
||||||
autosync = { };
|
autosync = { };
|
||||||
|
fenkins = { };
|
||||||
pass = { };
|
pass = { };
|
||||||
};
|
};
|
||||||
|
|
||||||
|
102
makefu/2configs/hub.nix
Normal file
102
makefu/2configs/hub.nix
Normal file
@ -0,0 +1,102 @@
|
|||||||
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
|
# search also generates ddclient entries for all other logs
|
||||||
|
|
||||||
|
with import <stockholm/lib>;
|
||||||
|
let
|
||||||
|
ddclientUser = "ddclient";
|
||||||
|
sec = toString <secrets>;
|
||||||
|
nsupdate = import "${sec}/nsupdate-hub.nix";
|
||||||
|
stateDir = "/var/spool/ddclient";
|
||||||
|
cfg = "${stateDir}/cfg";
|
||||||
|
ext-if = config.makefu.server.primary-itf;
|
||||||
|
ddclientPIDFile = "${stateDir}/ddclient.pid";
|
||||||
|
|
||||||
|
# TODO: correct cert generation requires a `real` internet ip address
|
||||||
|
|
||||||
|
gen-cfg = dict: ''
|
||||||
|
ssl=yes
|
||||||
|
cache=${stateDir}/ddclient.cache
|
||||||
|
pid=${ddclientPIDFile}
|
||||||
|
${concatStringsSep "\n" (mapAttrsToList (user: pass: ''
|
||||||
|
|
||||||
|
protocol=dyndns2
|
||||||
|
use=web, web=http://ipv4.nsupdate.info/myip
|
||||||
|
ssl=yes
|
||||||
|
server=ipv4.nsupdate.info
|
||||||
|
login=${user}
|
||||||
|
password='${pass}'
|
||||||
|
${user}
|
||||||
|
|
||||||
|
'') dict)}
|
||||||
|
'';
|
||||||
|
|
||||||
|
in {
|
||||||
|
users.extraUsers = singleton {
|
||||||
|
name = ddclientUser;
|
||||||
|
uid = genid "ddclient";
|
||||||
|
description = "ddclient daemon user";
|
||||||
|
home = stateDir;
|
||||||
|
createHome = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services = {
|
||||||
|
redis.serviceConfig.LimitNOFILE=10032;
|
||||||
|
ddclient-nsupdate-uhub = {
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
after = [ "ip-up.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "forking";
|
||||||
|
User = ddclientUser;
|
||||||
|
PIDFile = ddclientPIDFile;
|
||||||
|
ExecStartPre = pkgs.writeDash "init-nsupdate" ''
|
||||||
|
cp -vf ${pkgs.writeText "ddclient-config" (gen-cfg nsupdate)} ${cfg}
|
||||||
|
chmod 700 ${cfg}
|
||||||
|
'';
|
||||||
|
ExecStart = "${pkgs.ddclient}/bin/ddclient -verbose -daemon 1 -noquiet -file ${cfg}";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.firewall.extraCommands = ''
|
||||||
|
iptables -A PREROUTING -t nat -i ${ext-if} -p tcp --dport 411 -j REDIRECT --to-port 1511
|
||||||
|
'';
|
||||||
|
systemd.services.uhub.serviceConfig = {
|
||||||
|
PrivateTmp = true;
|
||||||
|
PermissionsStartOnly = true;
|
||||||
|
ExecStartPre = pkgs.writeDash "uhub-pre" ''
|
||||||
|
cp ${toString <secrets/wildcard.krebsco.de.crt>} /tmp/uhub.crt
|
||||||
|
cp ${toString <secrets/wildcard.krebsco.de.key>} /tmp/uhub.key
|
||||||
|
cp ${toString <secrets/uhub.sql>} /tmp/uhub.sql
|
||||||
|
chown uhub /tmp/*
|
||||||
|
'';
|
||||||
|
|
||||||
|
};
|
||||||
|
services.uhub = {
|
||||||
|
enable = true;
|
||||||
|
port = 1511;
|
||||||
|
enableTLS = true;
|
||||||
|
hubConfig = ''
|
||||||
|
hub_name = "krebshub"
|
||||||
|
tls_certificate = /tmp/uhub.crt
|
||||||
|
tls_private_key = /tmp/uhub.key
|
||||||
|
registered_users_only = true
|
||||||
|
'';
|
||||||
|
plugins = {
|
||||||
|
welcome = {
|
||||||
|
enable = true;
|
||||||
|
motd = "shareit";
|
||||||
|
rules = "1. Don't be an asshole";
|
||||||
|
};
|
||||||
|
history = {
|
||||||
|
enable = true;
|
||||||
|
};
|
||||||
|
authSqlite = {
|
||||||
|
enable = true;
|
||||||
|
file = "/tmp/uhub.sql";
|
||||||
|
};
|
||||||
|
|
||||||
|
};
|
||||||
|
};
|
||||||
|
networking.firewall.allowedTCPPorts = [ 411 1511 ];
|
||||||
|
}
|
@ -24,9 +24,11 @@ let
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
# TODO: automate updating of this ref + cherry-picks
|
# TODO: automate updating of this ref + cherry-picks
|
||||||
ref = "60b6ab055ad"; # nixos-18.03 @ 2018-05-31
|
ref = "14946ec63a1"; # nixos-18.03 @ 2018-05-31
|
||||||
# + do_sqlite3 ruby: 55a952be5b5
|
# + do_sqlite3 ruby: 55a952be5b5
|
||||||
# + exfat-nofuse bump: ee6a5296a35
|
# + exfat-nofuse bump: ee6a5296a35
|
||||||
|
# + uhub/sqlite: 5dd7610401747
|
||||||
|
# + forecastio: f27584df02337
|
||||||
|
|
||||||
in
|
in
|
||||||
evalSource (toString _file) [
|
evalSource (toString _file) [
|
||||||
|
Loading…
Reference in New Issue
Block a user