Merge remote-tracking branch 'prism/master'
This commit is contained in:
commit
9bcce729ef
@ -27,9 +27,6 @@ with import <stockholm/lib>;
|
|||||||
];
|
];
|
||||||
|
|
||||||
console.keyMap = "us";
|
console.keyMap = "us";
|
||||||
i18n = {
|
|
||||||
defaultLocale = lib.mkForce "C";
|
|
||||||
};
|
|
||||||
|
|
||||||
programs.ssh.startAgent = false;
|
programs.ssh.startAgent = false;
|
||||||
|
|
||||||
@ -60,4 +57,7 @@ with import <stockholm/lib>;
|
|||||||
|
|
||||||
# The NixOS release to be compatible with for stateful data such as databases.
|
# The NixOS release to be compatible with for stateful data such as databases.
|
||||||
system.stateVersion = "17.03";
|
system.stateVersion = "17.03";
|
||||||
|
|
||||||
|
# maybe fix Error: unsupported locales detected:
|
||||||
|
i18n.defaultLocale = mkDefault "C.UTF-8";
|
||||||
}
|
}
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
configureNginx = true;
|
configureNginx = true;
|
||||||
trustedProxy = config.krebs.hosts.prism.nets.retiolum.ip6.addr;
|
trustedProxy = config.krebs.hosts.prism.nets.retiolum.ip6.addr;
|
||||||
smtp.createLocally = false;
|
smtp.createLocally = false;
|
||||||
smtp.fromAddress = "mastodon@social.krebsco.de";
|
smtp.fromAddress = "derp";
|
||||||
};
|
};
|
||||||
|
|
||||||
services.nginx.virtualHosts.${config.services.mastodon.localDomain} = {
|
services.nginx.virtualHosts.${config.services.mastodon.localDomain} = {
|
||||||
@ -36,5 +36,11 @@
|
|||||||
(pkgs.writers.writeDashBin "tootctl" ''
|
(pkgs.writers.writeDashBin "tootctl" ''
|
||||||
sudo -u mastodon /etc/profiles/per-user/mastodon/bin/mastodon-env /etc/profiles/per-user/mastodon/bin/tootctl "$@"
|
sudo -u mastodon /etc/profiles/per-user/mastodon/bin/mastodon-env /etc/profiles/per-user/mastodon/bin/tootctl "$@"
|
||||||
'')
|
'')
|
||||||
|
(pkgs.writers.writeDashBin "create-mastodon-user" ''
|
||||||
|
set -efu
|
||||||
|
nick=$1
|
||||||
|
/run/current-system/sw/bin/tootctl accounts create "$nick" --email "$nick"@krebsco.de --confirmed
|
||||||
|
/run/current-system/sw/bin/tootctl accounts approve "$nick"
|
||||||
|
'')
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
@ -126,9 +126,8 @@ let
|
|||||||
domainlist sender_domains = ${concatStringsSep ":" cfg.sender_domains}
|
domainlist sender_domains = ${concatStringsSep ":" cfg.sender_domains}
|
||||||
hostlist relay_from_hosts = <;${concatStringsSep ";" cfg.relay_from_hosts}
|
hostlist relay_from_hosts = <;${concatStringsSep ";" cfg.relay_from_hosts}
|
||||||
|
|
||||||
acl_smtp_data = acl_check_data
|
|
||||||
acl_smtp_mail = acl_check_mail
|
|
||||||
acl_smtp_rcpt = acl_check_rcpt
|
acl_smtp_rcpt = acl_check_rcpt
|
||||||
|
acl_smtp_data = acl_check_data
|
||||||
|
|
||||||
never_users = root
|
never_users = root
|
||||||
|
|
||||||
@ -180,36 +179,6 @@ let
|
|||||||
|
|
||||||
accept
|
accept
|
||||||
|
|
||||||
acl_check_mail:
|
|
||||||
accept
|
|
||||||
sender_domains = +sender_domains
|
|
||||||
hosts = +relay_from_hosts
|
|
||||||
deny
|
|
||||||
spf = fail : softfail
|
|
||||||
log_message = spf=$spf_result
|
|
||||||
message = SPF validation failed: \
|
|
||||||
$sender_host_address is not allowed to send mail from \
|
|
||||||
''${if def:sender_address_domain\
|
|
||||||
{$sender_address_domain}\
|
|
||||||
{$sender_helo_name}}
|
|
||||||
deny
|
|
||||||
spf = permerror
|
|
||||||
log_message = spf=$spf_result
|
|
||||||
message = SPF validation failed: \
|
|
||||||
syntax error in SPF record(s) for \
|
|
||||||
''${if def:sender_address_domain\
|
|
||||||
{$sender_address_domain}\
|
|
||||||
{$sender_helo_name}}
|
|
||||||
defer
|
|
||||||
spf = temperror
|
|
||||||
log_message = spf=$spf_result; deferred
|
|
||||||
message = temporary error during SPF validation; \
|
|
||||||
please try again later
|
|
||||||
warn
|
|
||||||
spf = none : neutral
|
|
||||||
log_message = spf=$spf_result
|
|
||||||
accept
|
|
||||||
add_header = $spf_received
|
|
||||||
|
|
||||||
begin routers
|
begin routers
|
||||||
|
|
||||||
|
@ -5,26 +5,7 @@ in {
|
|||||||
rootCA = lib.mkOption {
|
rootCA = lib.mkOption {
|
||||||
type = lib.types.str;
|
type = lib.types.str;
|
||||||
readOnly = true;
|
readOnly = true;
|
||||||
default = ''
|
default = builtins.readFile ../6assets/krebsRootCA.crt;
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIC0jCCAjugAwIBAgIJAKeARo6lDD0YMA0GCSqGSIb3DQEBBQUAMIGBMQswCQYD
|
|
||||||
VQQGEwJaWjESMBAGA1UECAwJc3RhdGVsZXNzMRAwDgYDVQQKDAdLcmVic2NvMQsw
|
|
||||||
CQYDVQQLDAJLTTEWMBQGA1UEAwwNS3JlYnMgUm9vdCBDQTEnMCUGCSqGSIb3DQEJ
|
|
||||||
ARYYcm9vdC1jYUBzeW50YXgtZmVobGVyLmRlMB4XDTE0MDYxMTA4NTMwNloXDTM5
|
|
||||||
MDIwMTA4NTMwNlowgYExCzAJBgNVBAYTAlpaMRIwEAYDVQQIDAlzdGF0ZWxlc3Mx
|
|
||||||
EDAOBgNVBAoMB0tyZWJzY28xCzAJBgNVBAsMAktNMRYwFAYDVQQDDA1LcmVicyBS
|
|
||||||
b290IENBMScwJQYJKoZIhvcNAQkBFhhyb290LWNhQHN5bnRheC1mZWhsZXIuZGUw
|
|
||||||
gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMs/WNyeQziccllLqom7bfCjlh6/
|
|
||||||
/qx9p6UOqpw96YOOT3sh/mNSBLyNxIUJbWsU7dN5hT7HkR7GwzpfKDtudd9qiZeU
|
|
||||||
QNYQ+OL0HdOnApjdPqdspZfKxKTXyC1T1vJlaODsM1RBrjLK9RUcQZeNhgg3iM9B
|
|
||||||
HptOCrMI2fjCdZuVAgMBAAGjUDBOMB0GA1UdDgQWBBSKeq01+rAwp7yAXwzlwZBo
|
|
||||||
3EGVLzAfBgNVHSMEGDAWgBSKeq01+rAwp7yAXwzlwZBo3EGVLzAMBgNVHRMEBTAD
|
|
||||||
AQH/MA0GCSqGSIb3DQEBBQUAA4GBAIWIffZuQ43ddY2/ZnjAxPCRpM3AjoKIwEj9
|
|
||||||
GZuLJJ1sB9+/PAPmRrpmUniRkPLD4gtmolDVuoLDNAT9os7/v90yg5dOuga33Ese
|
|
||||||
725musUbhEoQE1A1oVHrexBs2sQOplxHKsVXoYJp2/trQdqvaNaEKc3EeVnzFC63
|
|
||||||
80WiO952
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
'';
|
|
||||||
};
|
};
|
||||||
intermediateCA = lib.mkOption {
|
intermediateCA = lib.mkOption {
|
||||||
type = lib.types.str;
|
type = lib.types.str;
|
||||||
|
@ -1,15 +1,15 @@
|
|||||||
-----BEGIN CERTIFICATE-----
|
-----BEGIN CERTIFICATE-----
|
||||||
MIICWTCCAcKgAwIBAgIQbAfVX2J0VIzhEYSPVAB4SzANBgkqhkiG9w0BAQsFADCB
|
MIICWTCCAcKgAwIBAgIQIpBt0MsRpYd8LWNdb9MfITANBgkqhkiG9w0BAQsFADCB
|
||||||
gTELMAkGA1UEBhMCWloxEjAQBgNVBAgMCXN0YXRlbGVzczEQMA4GA1UECgwHS3Jl
|
gTELMAkGA1UEBhMCWloxEjAQBgNVBAgMCXN0YXRlbGVzczEQMA4GA1UECgwHS3Jl
|
||||||
YnNjbzELMAkGA1UECwwCS00xFjAUBgNVBAMMDUtyZWJzIFJvb3QgQ0ExJzAlBgkq
|
YnNjbzELMAkGA1UECwwCS00xFjAUBgNVBAMMDUtyZWJzIFJvb3QgQ0ExJzAlBgkq
|
||||||
hkiG9w0BCQEWGHJvb3QtY2FAc3ludGF4LWZlaGxlci5kZTAeFw0yMTEyMTAwODQ5
|
hkiG9w0BCQEWGHJvb3QtY2FAc3ludGF4LWZlaGxlci5kZTAeFw0yMjEyMDYxODI2
|
||||||
MDZaFw0yMjEyMTAwODQ5MDZaMBgxFjAUBgNVBAMTDUtyZWJzIEFDTUUgQ0EwWTAT
|
MDhaFw0yMzEyMDYxODI2MDhaMBgxFjAUBgNVBAMTDUtyZWJzIEFDTUUgQ0EwWTAT
|
||||||
BgcqhkjOPQIBBggqhkjOPQMBBwNCAATL8dNO7ajNe60Km7wHrG06tCUj5kQKWsrQ
|
BgcqhkjOPQIBBggqhkjOPQMBBwNCAAT4KuemY4BowAbFjzCvi+PthBTWCtewnAbr
|
||||||
Ay7KX8zO+RwQpYhd/i4bqpeGkGWh8uHLZ+164FlZaLgHO10DRja5o4GAMH4wDgYD
|
qDSlA602QcuQVmqa1/3TaYag7KNDgeg5eshMRI9GN/boKTpgcLeZo4GAMH4wDgYD
|
||||||
VR0PAQH/BAQDAgEGMBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFMt9yJED
|
VR0PAQH/BAQDAgEGMBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFJYxArnj
|
||||||
mPRhXsrNZ0x+GtzjdnTLMB8GA1UdIwQYMBaAFIp6rTX6sDCnvIBfDOXBkGjcQZUv
|
SEArwloaM5blBymFmcL2MB8GA1UdIwQYMBaAFIp6rTX6sDCnvIBfDOXBkGjcQZUv
|
||||||
MBgGA1UdHgEB/wQOMAygCjADggFyMAOCAXcwDQYJKoZIhvcNAQELBQADgYEANo/2
|
MBgGA1UdHgEB/wQOMAygCjADggFyMAOCAXcwDQYJKoZIhvcNAQELBQADgYEAekCt
|
||||||
teIuEsniwxVdqu+ukjqOXHIkBK7F91+G7BuDjBlx2U96v1MwsmT4D9upajERnOOD
|
XrKwanrcy6+k3YfXWGiMJ47Ys7Mfa5UfIs7QiXv74MgtklLsX63D27hKn5rd7wk4
|
||||||
tLx990Sj4t3avRTpytt+qLeIMIxt62YksUXVjDWndqaDcEUat5ZVEQsZ0ZmjOHrA
|
20wXLMhb8ofrKnO4mt0VFRSGm9/cq9N/c/uuf4hMzhAJmusgkn02GG+cafqZ9ab9
|
||||||
BaB65eU0xhJWKAZdk55GqHEFz3Ym4rx7WUaomzk=
|
MjLmveT9WHphmgQTnJPEeYP2U2faHKIp6Gwv5qc=
|
||||||
-----END CERTIFICATE-----
|
-----END CERTIFICATE-----
|
||||||
|
18
krebs/6assets/krebsRootCA.crt
Normal file
18
krebs/6assets/krebsRootCA.crt
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIC0jCCAjugAwIBAgIJAKeARo6lDD0YMA0GCSqGSIb3DQEBBQUAMIGBMQswCQYD
|
||||||
|
VQQGEwJaWjESMBAGA1UECAwJc3RhdGVsZXNzMRAwDgYDVQQKDAdLcmVic2NvMQsw
|
||||||
|
CQYDVQQLDAJLTTEWMBQGA1UEAwwNS3JlYnMgUm9vdCBDQTEnMCUGCSqGSIb3DQEJ
|
||||||
|
ARYYcm9vdC1jYUBzeW50YXgtZmVobGVyLmRlMB4XDTE0MDYxMTA4NTMwNloXDTM5
|
||||||
|
MDIwMTA4NTMwNlowgYExCzAJBgNVBAYTAlpaMRIwEAYDVQQIDAlzdGF0ZWxlc3Mx
|
||||||
|
EDAOBgNVBAoMB0tyZWJzY28xCzAJBgNVBAsMAktNMRYwFAYDVQQDDA1LcmVicyBS
|
||||||
|
b290IENBMScwJQYJKoZIhvcNAQkBFhhyb290LWNhQHN5bnRheC1mZWhsZXIuZGUw
|
||||||
|
gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMs/WNyeQziccllLqom7bfCjlh6/
|
||||||
|
/qx9p6UOqpw96YOOT3sh/mNSBLyNxIUJbWsU7dN5hT7HkR7GwzpfKDtudd9qiZeU
|
||||||
|
QNYQ+OL0HdOnApjdPqdspZfKxKTXyC1T1vJlaODsM1RBrjLK9RUcQZeNhgg3iM9B
|
||||||
|
HptOCrMI2fjCdZuVAgMBAAGjUDBOMB0GA1UdDgQWBBSKeq01+rAwp7yAXwzlwZBo
|
||||||
|
3EGVLzAfBgNVHSMEGDAWgBSKeq01+rAwp7yAXwzlwZBo3EGVLzAMBgNVHRMEBTAD
|
||||||
|
AQH/MA0GCSqGSIb3DQEBBQUAA4GBAIWIffZuQ43ddY2/ZnjAxPCRpM3AjoKIwEj9
|
||||||
|
GZuLJJ1sB9+/PAPmRrpmUniRkPLD4gtmolDVuoLDNAT9os7/v90yg5dOuga33Ese
|
||||||
|
725musUbhEoQE1A1oVHrexBs2sQOplxHKsVXoYJp2/trQdqvaNaEKc3EeVnzFC63
|
||||||
|
80WiO952
|
||||||
|
-----END CERTIFICATE-----
|
@ -1,9 +1,9 @@
|
|||||||
{
|
{
|
||||||
"url": "https://github.com/NixOS/nixpkgs",
|
"url": "https://github.com/NixOS/nixpkgs",
|
||||||
"rev": "b457130e8a21608675ddf12c7d85227b22a27112",
|
"rev": "14ddeaebcbe9a25748221d1d7ecdf98e20e2325e",
|
||||||
"date": "2022-11-16T11:03:19+00:00",
|
"date": "2022-12-04T12:18:32+01:00",
|
||||||
"path": "/nix/store/jr123qfmrl53imi48naxh6zs486fqmz2-nixpkgs",
|
"path": "/nix/store/xnxll37bfls7a3g969avyvb2cic0g0f3-nixpkgs",
|
||||||
"sha256": "16cjrr3np3f428lxw8yk6n2dqi7mg08zf6h6gv75zpw865jz44df",
|
"sha256": "0bix6746zmifas85mkb49g0szkdza4ajzdfbix4cdan9ig06v6rc",
|
||||||
"fetchLFS": false,
|
"fetchLFS": false,
|
||||||
"fetchSubmodules": false,
|
"fetchSubmodules": false,
|
||||||
"deepClone": false,
|
"deepClone": false,
|
||||||
|
@ -1,9 +1,9 @@
|
|||||||
{
|
{
|
||||||
"url": "https://github.com/NixOS/nixpkgs",
|
"url": "https://github.com/NixOS/nixpkgs",
|
||||||
"rev": "6474d93e007e4d165bcf48e7f87de2175c93d10b",
|
"rev": "596a8e828c5dfa504f91918d0fa4152db3ab5502",
|
||||||
"date": "2022-11-16T11:41:31+01:00",
|
"date": "2022-11-30T14:03:12-05:00",
|
||||||
"path": "/nix/store/z86f31carhz3sf78kn3lkyq748drgp63-nixpkgs",
|
"path": "/nix/store/vax0irdsk8gvczikw219vj079mck6j6r-nixpkgs",
|
||||||
"sha256": "00swm7hz3fjyzps75bjyqviw6dqg2cc126wc7lcc1rjkpdyk5iwg",
|
"sha256": "1n524a44p2kprk65zx2v6793kmxjpz1qm1ilxk82vq0vg0c5jy32",
|
||||||
"fetchLFS": false,
|
"fetchLFS": false,
|
||||||
"fetchSubmodules": false,
|
"fetchSubmodules": false,
|
||||||
"deepClone": false,
|
"deepClone": false,
|
||||||
|
@ -3,7 +3,7 @@ dir=$(dirname $0)
|
|||||||
oldrev=$(cat $dir/nixpkgs.json | jq -r .rev | sed 's/\(.\{7\}\).*/\1/')
|
oldrev=$(cat $dir/nixpkgs.json | jq -r .rev | sed 's/\(.\{7\}\).*/\1/')
|
||||||
nix-shell -p nix-prefetch-git --run 'nix-prefetch-git \
|
nix-shell -p nix-prefetch-git --run 'nix-prefetch-git \
|
||||||
--url https://github.com/NixOS/nixpkgs \
|
--url https://github.com/NixOS/nixpkgs \
|
||||||
--rev refs/heads/nixos-22.05' \
|
--rev refs/heads/nixos-22.11' \
|
||||||
> $dir/nixpkgs.json
|
> $dir/nixpkgs.json
|
||||||
newrev=$(cat $dir/nixpkgs.json | jq -r .rev | sed 's/\(.\{7\}\).*/\1/')
|
newrev=$(cat $dir/nixpkgs.json | jq -r .rev | sed 's/\(.\{7\}\).*/\1/')
|
||||||
git commit $dir/nixpkgs.json -m "nixpkgs: $oldrev -> $newrev"
|
git commit $dir/nixpkgs.json -m "nixpkgs: $oldrev -> $newrev"
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
users.users.mainUser.extraGroups = [ "libvirtd" ];
|
|
||||||
virtualisation.libvirtd.enable = true;
|
virtualisation.libvirtd.enable = true;
|
||||||
|
security.polkit.enable = true;
|
||||||
|
|
||||||
krebs.iptables.tables.filter.INPUT.rules = [
|
krebs.iptables.tables.filter.INPUT.rules = [
|
||||||
{ v6 = false; predicate = "-i virbr0 -p udp -m udp --dport 53"; target = "ACCEPT"; }
|
{ v6 = false; predicate = "-i virbr0 -p udp -m udp --dport 53"; target = "ACCEPT"; }
|
||||||
|
@ -174,7 +174,6 @@ rec {
|
|||||||
services.phpfpm.pools."${domain}" = {
|
services.phpfpm.pools."${domain}" = {
|
||||||
user = "nginx";
|
user = "nginx";
|
||||||
group = "nginx";
|
group = "nginx";
|
||||||
phpPackage = pkgs.php74;
|
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
listen = /srv/http/${domain}/phpfpm.pool
|
listen = /srv/http/${domain}/phpfpm.pool
|
||||||
pm = dynamic
|
pm = dynamic
|
||||||
@ -228,7 +227,6 @@ rec {
|
|||||||
services.phpfpm.pools."${domain}" = {
|
services.phpfpm.pools."${domain}" = {
|
||||||
user = "nginx";
|
user = "nginx";
|
||||||
group = "nginx";
|
group = "nginx";
|
||||||
phpPackage = pkgs.php74;
|
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
listen = /srv/http/${domain}/phpfpm.pool
|
listen = /srv/http/${domain}/phpfpm.pool
|
||||||
pm = dynamic
|
pm = dynamic
|
||||||
|
Loading…
Reference in New Issue
Block a user