Merge branch 'master' of gum:stockholm

This commit is contained in:
makefu 2016-01-23 00:29:55 +01:00
commit e91ee61326
17 changed files with 87 additions and 27 deletions

View File

@ -297,6 +297,30 @@ with lib;
ssh.privkey.path = <secrets/ssh_host_ed25519_key>; ssh.privkey.path = <secrets/ssh_host_ed25519_key>;
ssh.pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIujMZ3ZFxKpWeB/cjfKfYRr77+VRZk0Eik+92t03NoA root@servarch"; ssh.pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIujMZ3ZFxKpWeB/cjfKfYRr77+VRZk0Eik+92t03NoA root@servarch";
}; };
wbob = rec {
cores = 1;
dc = "none";
nets = {
retiolm = {
addrs4 = ["10.243.214.15/32"];
addrs6 = ["42:5a02:2c30:c1b1:3f2e:7c19:2496:a732/128"];
aliases = [
"wbob.retiolum"
];
tinc.pubkey = ''
-----BEGIN RSA PUBLIC KEY-----
MIIBCgKCAQEAqLTJx91OdR0FlJAc2JGh+AJde95oMzzh8o36JBFpsaN7styNfD3e
QGM/bDXFjk4ieIe5At0Z63P2KWxRp3cz8LWKJsn5cGsX2074YWMAGmKX+ZZJNlal
cJ994xX+8MJ6L2tVKpY7Ace7gqDN+l650PrEzV2SLisIqOdxoBlbAupdwHieUBt8
khm4NLNUCxPYUx2RtHn4iGdgSgUD/SnyHEFdyDA17lWAGfEi4yFFjFMYQce/TFrs
rQV9t5hGaofu483Epo6mEfcBcsR4GIHI4a4WKYANsIyvFvzyGFEHOMusG6nRRqE9
TNs2RYfwDy/r6H/hDeB/BSngPouedEVcPwIDAQAB
-----END RSA PUBLIC KEY-----
'';
};
};
};
gum = rec { gum = rec {
cores = 1; cores = 1;
dc = "online.net"; #root-server dc = "online.net"; #root-server

View File

@ -2,11 +2,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "apt-cacher-ng-${version}"; name = "apt-cacher-ng-${version}";
version = "0.8.6"; version = "0.8.8";
src = fetchurl { src = fetchurl {
url = "http://ftp.debian.org/debian/pool/main/a/apt-cacher-ng/apt-cacher-ng_${version}.orig.tar.xz"; url = "http://ftp.debian.org/debian/pool/main/a/apt-cacher-ng/apt-cacher-ng_${version}.orig.tar.xz";
sha256 = "0044dfks8djl11fs28jj8894i4rq424xix3d3fkvzz2i6lnp8nr5"; sha256 = "0n7yy4h8g7j0g94xngbywmfhrkg9xl3j2c4wzrjknfwvxmqgjivq";
}; };
NIX_LDFLAGS = "-lpthread"; NIX_LDFLAGS = "-lpthread";

View File

@ -81,7 +81,7 @@ stdenv.mkDerivation rec {
meta = { meta = {
homepage = http://www.fortinet.com; homepage = http://www.fortinet.com;
description = "Forticlient SSL-VPN client"; description = "Forticlient SSL-VPN client";
license = lib.licenses.nonfree; license = lib.licenses.unfree;
maintainers = [ lib.maintainers.makefu ]; maintainers = [ lib.maintainers.makefu ];
}; };
} }

View File

@ -1,5 +1,10 @@
{ lib, pkgs,python3Packages,fetchurl, ... }: { lib, pkgs,python3Packages,fetchurl, ... }:
# TODO: Prepare a diff of future and current
## ovh-zone export krebsco.de --config ~/secrets/krebs/cfg.json |sed 's/[ ]\+/ /g' | sort current
## sed 's/[ ]\+/ /g'/etc/zones/krebsco.de | sort > future
## diff future.sorted current.sorted
python3Packages.buildPythonPackage rec { python3Packages.buildPythonPackage rec {
name = "krebszones-${version}"; name = "krebszones-${version}";
version = "0.4.4"; version = "0.4.4";

10
krebs/Zhosts/wbob Normal file
View File

@ -0,0 +1,10 @@
Subnet = 10.243.214.15/32
Subnet = 42:5a02:2c30:c1b1:3f2e:7c19:2496:a732/128
-----BEGIN RSA PUBLIC KEY-----
MIIBCgKCAQEAqLTJx91OdR0FlJAc2JGh+AJde95oMzzh8o36JBFpsaN7styNfD3e
QGM/bDXFjk4ieIe5At0Z63P2KWxRp3cz8LWKJsn5cGsX2074YWMAGmKX+ZZJNlal
cJ994xX+8MJ6L2tVKpY7Ace7gqDN+l650PrEzV2SLisIqOdxoBlbAupdwHieUBt8
khm4NLNUCxPYUx2RtHn4iGdgSgUD/SnyHEFdyDA17lWAGfEi4yFFjFMYQce/TFrs
rQV9t5hGaofu483Epo6mEfcBcsR4GIHI4a4WKYANsIyvFvzyGFEHOMusG6nRRqE9
TNs2RYfwDy/r6H/hDeB/BSngPouedEVcPwIDAQAB
-----END RSA PUBLIC KEY-----

View File

@ -21,7 +21,7 @@ in {
]; ];
services.smartd.devices = [ { device = "/dev/sda";} ];
nixpkgs.config.packageOverrides = pkgs: { tinc = pkgs.tinc_pre; }; nixpkgs.config.packageOverrides = pkgs: { tinc = pkgs.tinc_pre; };
###### stable ###### stable
@ -32,6 +32,9 @@ in {
ListenAddress = ${external-ip} 655 ListenAddress = ${external-ip} 655
ListenAddress = ${external-ip} 21031 ListenAddress = ${external-ip} 21031
''; '';
krebs.nginx.servers.cgit.server-names = [
"cgit.euer.krebsco.de"
];
# Chat # Chat
environment.systemPackages = with pkgs;[ environment.systemPackages = with pkgs;[

View File

@ -33,6 +33,7 @@ in {
]; ];
# services.openssh.allowSFTP = false; # services.openssh.allowSFTP = false;
krebs.build.host = config.krebs.hosts.omo; krebs.build.host = config.krebs.hosts.omo;
krebs.build.source.git.nixpkgs.rev = "d0e3cca04edd5d1b3d61f188b4a5f61f35cdf1ce";
# copy config from <secrets/sabnzbd.ini> to /var/lib/sabnzbd/ # copy config from <secrets/sabnzbd.ini> to /var/lib/sabnzbd/
services.sabnzbd.enable = true; services.sabnzbd.enable = true;

View File

@ -2,9 +2,7 @@
# #
# #
{ lib, config, pkgs, ... }: { lib, config, pkgs, ... }:
let {
pkgs-unst = import (fetchTarball https://github.com/NixOS/nixpkgs-channels/archive/nixos-unstable.tar.gz) {};
in {
krebs.build.host = config.krebs.hosts.vbob; krebs.build.host = config.krebs.hosts.vbob;
krebs.build.target = "root@10.10.10.220"; krebs.build.target = "root@10.10.10.220";
imports = imports =
@ -15,14 +13,13 @@ in {
# environment # environment
]; ];
nixpkgs.config.allowUnfree = true;
nixpkgs.config.packageOverrides = pkgs: { nixpkgs.config.packageOverrides = pkgs: {
tinc = pkgs.tinc_pre; tinc = pkgs.tinc_pre;
buildbot = pkgs-unst.buildbot;
buildbot-slave = pkgs-unst.buildbot-slave;
}; };
makefu.buildbot.master = { makefu.buildbot.master = {
enable = true; enable = false;
irc = { irc = {
enable = true; enable = true;
server = "cd.retiolum"; server = "cd.retiolum";
@ -30,8 +27,9 @@ in {
allowForce = true; allowForce = true;
}; };
}; };
# services.logstash.enable = true;
makefu.buildbot.slave = { makefu.buildbot.slave = {
enable = true; enable = false;
masterhost = "localhost"; masterhost = "localhost";
username = "testslave"; username = "testslave";
password = "krebspass"; password = "krebspass";
@ -41,8 +39,8 @@ in {
krebs.build.source.git.nixpkgs = { krebs.build.source.git.nixpkgs = {
#url = https://github.com/nixos/nixpkgs; #url = https://github.com/nixos/nixpkgs;
# HTTP Everywhere # HTTP Everywhere + libredir
rev = "a3974e"; rev = "8239ac6";
}; };
fileSystems."/nix" = { fileSystems."/nix" = {
device ="/dev/disk/by-label/nixstore"; device ="/dev/disk/by-label/nixstore";
@ -56,9 +54,12 @@ in {
}; };
}; };
environment.systemPackages = with pkgs;[ environment.systemPackages = with pkgs;[
fortclientsslvpn
buildbot buildbot
buildbot-slave buildbot-slave
get get
genid
logstash
]; ];
networking.firewall.allowedTCPPorts = [ networking.firewall.allowedTCPPorts = [

19
makefu/1systems/wbob.nix Normal file
View File

@ -0,0 +1,19 @@
{ config, pkgs, ... }:
{
imports =
[ # Include the results of the hardware scan.
../2configs/main-laptop.nix
];
krebs = {
enable = true;
retiolum.enable = true;
build.host = config.krebs.hosts.wbob;
};
boot.loader.grub.device = "/dev/sda";
boot.initrd.availableKernelModules = [ "xhci_pci" "ehci_pci" "ahci" "usbhid" "usb_storage" ];
boot.kernelModules = [ "kvm-intel" ];
fileSystems."/" = {
device = "/dev/sda1";
fsType = "ext4";
};
}

View File

@ -13,7 +13,7 @@ with lib;
./vim.nix ./vim.nix
]; ];
nixpkgs.config.allowUnfreePredicate = (pkg: pkgs.lib.hasPrefix "unrar-" pkg.name);
krebs = { krebs = {
enable = true; enable = true;
search-domain = "retiolum"; search-domain = "retiolum";

View File

@ -16,6 +16,9 @@ let
desc = "Tinc Advanced Graph Generation"; desc = "Tinc Advanced Graph Generation";
}; };
cac = { }; cac = { };
init-stockholm = {
desc = "Init stuff for stockholm";
};
}; };
priv-repos = mapAttrs make-priv-repo { priv-repos = mapAttrs make-priv-repo {

View File

@ -3,6 +3,7 @@
krebs.exim-retiolum.enable = lib.mkDefault true; krebs.exim-retiolum.enable = lib.mkDefault true;
services.smartd = { services.smartd = {
enable = true; enable = true;
autodetect = false;
notifications = { notifications = {
mail = { mail = {
enable = true; enable = true;

View File

@ -4,7 +4,6 @@ with lib;
{ {
krebs.retiolum = { krebs.retiolum = {
enable = true; enable = true;
hosts = ../../krebs/Zhosts;
connectTo = [ connectTo = [
"gum" "gum"
"pigstarter" "pigstarter"

View File

@ -122,7 +122,7 @@ in {
vimrcConfig.vam.knownPlugins = pkgs.vimPlugins // customPlugins; vimrcConfig.vam.knownPlugins = pkgs.vimPlugins // customPlugins;
vimrcConfig.vam.pluginDictionaries = [ vimrcConfig.vam.pluginDictionaries = [
{ names = [ "undotree" { names = [ "undotree"
"YouCompleteMe" # "YouCompleteMe"
"vim-better-whitespace" ]; } "vim-better-whitespace" ]; }
{ names = [ "vim-addon-nix" ]; ft_regex = "^nix\$"; } { names = [ "vim-addon-nix" ]; ft_regex = "^nix\$"; }
]; ];

View File

@ -38,8 +38,6 @@ do
end) end)
end end
-- }}} -- }}}
volwidget = wibox.widget.textbox()
vicious.register(volwidget, vicious.widgets.volume, " $1% ", 2, "Master")
-- {{{ Mails widget type -- {{{ Mails widget type
local function worker(format,warg) local function worker(format,warg)
@ -258,7 +256,6 @@ for s = 1, screen.count() do
local right_layout = wibox.layout.fixed.horizontal() local right_layout = wibox.layout.fixed.horizontal()
right_layout:add(mailwidget) right_layout:add(mailwidget)
if s == 1 then right_layout:add(wibox.widget.systray()) end if s == 1 then right_layout:add(wibox.widget.systray()) end
right_layout:add(volwidget)
right_layout:add(cpuwidget) right_layout:add(cpuwidget)
right_layout:add(batwidget) right_layout:add(batwidget)
right_layout:add(mytextclock) right_layout:add(mytextclock)

View File

@ -18,7 +18,7 @@ with lib;
krebs.build.source = { krebs.build.source = {
git.nixpkgs = { git.nixpkgs = {
url = https://github.com/NixOS/nixpkgs; url = https://github.com/NixOS/nixpkgs;
rev = "6d31e9b81dcd4ab927bb3dc91b612dd5abfa2f80"; rev = "d0e3cca";
target-path = "/var/src/nixpkgs"; target-path = "/var/src/nixpkgs";
}; };
dir.secrets = { dir.secrets = {

View File

@ -1,11 +1,6 @@
{ lib, config, pkgs, ... }: { lib, config, pkgs, ... }:
let
pkgs-unst = import (fetchTarball https://github.com/NixOS/nixpkgs-channels/archive/nixos-unstable.tar.gz) {}; {
in {
nixpkgs.config.packageOverrides = pkgs: {
buildbot = pkgs-unst.buildbot;
buildbot-slave = pkgs-unst.buildbot-slave;
};
networking.firewall.allowedTCPPorts = [ 8010 9989 ]; networking.firewall.allowedTCPPorts = [ 8010 9989 ];
krebs.buildbot.master = { krebs.buildbot.master = {
secrets = [ "retiolum-ci.rsa_key.priv" "cac.json" ]; secrets = [ "retiolum-ci.rsa_key.priv" "cac.json" ];
@ -89,6 +84,7 @@ in {
nix-instantiate --eval -A \ nix-instantiate --eval -A \
users.shared.test-all-krebs-modules.system \ users.shared.test-all-krebs-modules.system \
-I stockholm=. \ -I stockholm=. \
--show-trace \
-I secrets=. '<stockholm>' \ -I secrets=. '<stockholm>' \
--argstr current-date lol \ --argstr current-date lol \
--argstr current-user-name shared \ --argstr current-user-name shared \
@ -101,6 +97,7 @@ in {
users.shared.test-minimal-deploy.system \ users.shared.test-minimal-deploy.system \
-I stockholm=. \ -I stockholm=. \
-I secrets=. '<stockholm>' \ -I secrets=. '<stockholm>' \
--show-trace \
--argstr current-date lol \ --argstr current-date lol \
--argstr current-user-name shared \ --argstr current-user-name shared \
--argstr current-host-name lol \ --argstr current-host-name lol \