treewide: replace stockholm/lib with stockholm.lib
This commit is contained in:
parent
ecfa596670
commit
777a2fe734
|
@ -10,7 +10,7 @@
|
|||
# wildcard.krebsco.de.key
|
||||
# bepasty-secret.nix <- contains single string
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
sec = toString <secrets>;
|
||||
# secKey is nothing worth protecting on a local machine
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
ident = (builtins.readFile ./auphonic.pub);
|
||||
bgtaccess = "/var/spool/nginx/logs/binaergewitter.access.log";
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
# graphite-web on port 8080
|
||||
# carbon cache on port 2003 (tcp/udp)
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
connect-time-cfg = with pkgs; writeText "collectd-connect-time.cfg" ''
|
||||
LoadPlugin python
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
# search also generates ddclient entries for all other logs
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
ddclientUser = "ddclient";
|
||||
sec = toString <secrets>;
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
# more than just nginx config but not enough to become a module
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
hostname = config.krebs.build.host.name;
|
||||
bootscript = pkgs.writeTextDir "runit" ''
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
external-ip = config.krebs.build.host.nets.internet.ip4.addr;
|
||||
internal-ip = config.krebs.build.host.nets.retiolum.ip4.addr;
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
# more than just nginx config but not enough to become a module
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
wsgi-sock = "${workdir}/uwsgi-photostore.sock";
|
||||
workdir = config.services.uwsgi.runDir;
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
{pkgs, ...}:
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
secret = (import <secrets/elchos-token.nix>);
|
||||
in {
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
# search also generates ddclient entries for all other logs
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
#primary-itf = "eth0";
|
||||
#primary-itf = "wlp2s0";
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
# graphite-web on port 8080
|
||||
# carbon cache on port 2003 (tcp/udp)
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
{
|
||||
|
||||
networking.firewall = {
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
{
|
||||
networking.firewall.allowedTCPPorts = [ 25 ];
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
hostname = config.krebs.build.host.name;
|
||||
in {
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
# vda1 ext4 (label nixos) -> only root partition
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
{
|
||||
imports = [
|
||||
./single-partition-ext4.nix
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
# TODO: remove tv lib :)
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
|
||||
repos = pub-repos // priv-repos // krebs-repos // connector-repos // krebsroot-repos;
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
# graphite-web on port 8080
|
||||
# carbon cache on port 2003 (tcp/udp)
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
{
|
||||
imports = [ ];
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ pkgs, lib, ...}:
|
||||
# docker run -d -p 8081:8081 -v /path/to/downloads:/downloads --user 1001:1001 alexta69/metube
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
port = "2348";
|
||||
dl-dir = "/media/cryptX/youtube/music";
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ pkgs, lib, ...}:
|
||||
{ pkgs, config, lib, ...}:
|
||||
# Start | docker-compose up -d
|
||||
# Stop | docker-compose stop
|
||||
# Update | docker-compose pull
|
||||
|
@ -19,9 +19,9 @@ let
|
|||
statedir = "/media/cryptX/lib/photoprism/appsrv";
|
||||
db-dir = "/media/cryptX/lib/photoprism/mysql";
|
||||
internal-ip = "192.168.111.11";
|
||||
sec = import <secrets/photoprism.nix>;
|
||||
in
|
||||
{
|
||||
sops.secrets."photoprism/envfile" = {};
|
||||
virtualisation.oci-containers.backend = "docker";
|
||||
|
||||
services.nginx.virtualHosts."photos" = {
|
||||
|
@ -80,8 +80,6 @@ in
|
|||
PHOTOPRISM_DETECT_NSFW = "false"; # Flag photos as private that MAY be offensive (requires TensorFlow)
|
||||
PHOTOPRISM_UPLOAD_NSFW = "true"; # Allow uploads that MAY be offensive
|
||||
PHOTOPRISM_AUTH_MODE = "password";
|
||||
PHOTOPRISM_ADMIN_USER = "admin";
|
||||
PHOTOPRISM_ADMIN_PASSWORD = "admin";
|
||||
|
||||
#PHOTOPRISM_DATABASE_DRIVER = "postgres";
|
||||
#PHOTOPRISM_DATABASE_SERVER = "postgres-prism:5432";
|
||||
|
@ -92,8 +90,6 @@ in
|
|||
PHOTOPRISM_DATABASE_DRIVER= "mysql"; # Use MariaDB (or MySQL) instead of SQLite for improved performance
|
||||
PHOTOPRISM_DATABASE_SERVER= "mysql-photoprism:3306" ; # MariaDB database server (hostname:port)
|
||||
PHOTOPRISM_DATABASE_NAME= "photoprism"; # MariaDB database schema name
|
||||
PHOTOPRISM_DATABASE_USER= sec.db.username; # MariaDB database user name
|
||||
PHOTOPRISM_DATABASE_PASSWORD= sec.db.password; # MariaDB database user password
|
||||
|
||||
PHOTOPRISM_SITE_URL = "http://localhost:2342/"; # Public PhotoPrism URL
|
||||
PHOTOPRISM_SITE_TITLE = "PhotoPrism";
|
||||
|
@ -122,11 +118,11 @@ in
|
|||
# "--innodb-lock-wait-timeout=50"
|
||||
#];
|
||||
volumes= [ "${db-dir}:/var/lib/mysql" ];
|
||||
environmentFiles = [
|
||||
config.sops.secrets."photoprism/envfile".path
|
||||
];
|
||||
environment = {
|
||||
MYSQL_ROOT_PASSWORD = "dickidibutt";
|
||||
MYSQL_DATABASE= "photoprism";
|
||||
MYSQL_USER = sec.db.username;
|
||||
MYSQL_PASSWORD = sec.db.password;
|
||||
};
|
||||
};
|
||||
#virtualisation.oci-containers.containers.postgres-prism = {
|
||||
|
|
|
@ -2,11 +2,14 @@
|
|||
|
||||
let
|
||||
dataDir = "/var/lib/zigbee2mqtt";
|
||||
sec = import <secrets/zigbee2mqtt.nix>;
|
||||
internal-ip = "192.168.111.11";
|
||||
webport = 8521;
|
||||
in
|
||||
{
|
||||
{
|
||||
sops.secrets."zigbee2mqtt" = {
|
||||
owner = "zigbee2mqtt";
|
||||
path = "/var/lib/zigbee2mqtt/configuration.yaml";
|
||||
};
|
||||
# symlink the zigbee controller
|
||||
#services.udev.extraRules = ''
|
||||
# SUBSYSTEM=="tty", ATTRS{idVendor}=="0451", ATTRS{idProduct}=="16a8", SYMLINK+="cc2531", MODE="0660", GROUP="dialout"
|
||||
|
@ -20,50 +23,6 @@ in
|
|||
services.zigbee2mqtt = {
|
||||
enable = true;
|
||||
inherit dataDir;
|
||||
settings = {
|
||||
permit_join = true;
|
||||
serial.port = "/dev/cc2531";
|
||||
homeassistant = true;
|
||||
mqtt = {
|
||||
server = "mqtt://omo.lan:1883";
|
||||
base_topic = "/ham/zigbee";
|
||||
user = sec.mqtt.username;
|
||||
password = sec.mqtt.password;
|
||||
include_device_information = true;
|
||||
client_id = "zigbee2mqtt";
|
||||
};
|
||||
availability = {
|
||||
active.timeout = 10;
|
||||
passive.timeout = 1500;
|
||||
};
|
||||
frontend = {
|
||||
port = webport;
|
||||
};
|
||||
advanced = {
|
||||
log_level = "debug";
|
||||
log_output = [ "console" ];
|
||||
last_seen = "ISO_8601";
|
||||
elapsed = true;
|
||||
pan_id = 6755;
|
||||
inherit (sec.zigbee) network_key;
|
||||
};
|
||||
map_options.graphviz.colors = {
|
||||
fill = {
|
||||
enddevice = "#fff8ce" ;
|
||||
coordinator = "#e04e5d";
|
||||
router = "#4ea3e0";
|
||||
};
|
||||
font = {
|
||||
coordinator= "#ffffff";
|
||||
router = "#ffffff";
|
||||
enddevice = "#000000";
|
||||
};
|
||||
line = {
|
||||
active = "#009900";
|
||||
inactive = "#994444";
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
services.nginx.recommendedProxySettings = true;
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
{
|
||||
|
||||
imports = [ ./tp-x2x0.nix ];
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
{ pkgs, lib, config, ... }:
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
upstream-server = "8.8.8.8";
|
||||
# make sure the router pins the ip address to the deployed host
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
{ pkgs, lib, config, ... }:
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
# see https://github.com/zeropingheroes/lancache for full docs
|
||||
lancache= pkgs.stdenv.mkDerivation rec {
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
{
|
||||
environment.systemPackages = with pkgs; [
|
||||
abook
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{config, lib, ...}:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
sec = toString <secrets>;
|
||||
ssl_cert = "${sec}/wildcard.krebsco.de.crt";
|
||||
|
|
|
@ -7,7 +7,7 @@
|
|||
# the only true timezone (even after the the removal of DST)
|
||||
time.timeZone = "Europe/Berlin";
|
||||
|
||||
# networking.hostName = lib.mkIf (lib.hasAttr "host" config.krebs.build) config.krebs.build.host.name;
|
||||
networking.hostName = lib.mkIf (lib.hasAttr "host" config.krebs.build) config.krebs.build.host.name;
|
||||
|
||||
# we use gpg if necessary (or nothing at all)
|
||||
programs.ssh.startAgent = false;
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
sec = toString <secrets>;
|
||||
hostname = config.krebs.build.host.name;
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
hostname = config.krebs.build.host.name;
|
||||
user = config.services.nginx.user;
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
hostname = config.krebs.build.host.name;
|
||||
user = config.services.nginx.user;
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
sec = toString <secrets>;
|
||||
ext-dom = "wiki.euer.krebsco.de";
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
gold = pkgs.fetchFromGitHub {
|
||||
owner = "krebs";
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
in {
|
||||
services.nginx = {
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, pkgs, lib, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
|
||||
let
|
||||
icecult = pkgs.fetchFromGitHub {
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
|
||||
{
|
||||
services.nginx = {
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
user = config.services.nginx.user;
|
||||
group = config.services.nginx.group;
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
{
|
||||
services.nginx = {
|
||||
enable = mkDefault true;
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
# search also generates ddclient entries for all other logs
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
#primary-itf = "eth0";
|
||||
#primary-itf = "wlp2s0";
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ pkgs, config, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
web-port = 8080;
|
||||
in {
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
{ pkgs, ... }:
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
shack-announce = pkgs.callPackage (builtins.fetchTarball {
|
||||
url = "https://github.com/makefu/events-publisher/archive/419afdfe16ebf7f2360d2ba64b67ca88948832bd.tar.gz";
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
{
|
||||
services.openssh = {
|
||||
allowSFTP = true;
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
hostname = config.krebs.build.host.name;
|
||||
# TODO local-ip from the nets config
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
# graphite-web on port 8080
|
||||
# carbon cache on port 2003 (tcp/udp)
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
solrHome = "/var/db/solr";
|
||||
in {
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ pkgs, ... }:
|
||||
{ pkgs, config, ... }:
|
||||
# Enables second factor for ssh password login
|
||||
|
||||
## Usage:
|
||||
|
@ -6,12 +6,12 @@
|
|||
## scan the qrcode with google authenticator (or FreeOTP)
|
||||
## copy last line into secrets/<host>/users.oath (chmod 700)
|
||||
{
|
||||
sops.secrets."users.oath" = {};
|
||||
security.pam.oath = {
|
||||
# enabling it will make it a requisite of `all` services
|
||||
# enable = true;
|
||||
digits = 6;
|
||||
# TODO assert existing
|
||||
usersFile = (toString <secrets>) + "/users.oath";
|
||||
usersFile = config.sops.secrets."users.oath".path;
|
||||
};
|
||||
# I want TFA only active for sshd with password-auth
|
||||
security.pam.services.sshd.oathAuth = true;
|
||||
|
|
2
2configs/stats/external/weather2stats.nix
vendored
2
2configs/stats/external/weather2stats.nix
vendored
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
pkg = pkgs.stdenv.mkDerivation {
|
||||
name = "aralast-master";
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{pkgs, config, ...}:
|
||||
|
||||
with import <stockholm/lib>;
|
||||
with pkgs.stockholm.lib;
|
||||
let
|
||||
irc-server = "irc.r";
|
||||
irc-nick = "m-alarm";
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
{ pkgs, lib, ...}:
|
||||
{ pkgs, config, lib, ...}:
|
||||
|
||||
let
|
||||
genTopic_zigbee = name: tags: {
|
||||
servers = [ "tcp://localhost:1883" ];
|
||||
username = "stats";
|
||||
password = lib.removeSuffix "\n" (builtins.readFile <secrets/mqtt/stats>);
|
||||
passwordFile = config.sops.secrets."mqtt/stats".path;
|
||||
qos = 0;
|
||||
connection_timeout = "30s";
|
||||
topics = [ "/ham/zigbee/${name}" ];
|
||||
|
@ -19,7 +19,7 @@ let
|
|||
genTopic_plain = name: topic: tags: {
|
||||
servers = [ "tcp://localhost:1883" ];
|
||||
username = "stats";
|
||||
password = lib.removeSuffix "\n" (builtins.readFile <secrets/mqtt/stats>);
|
||||
passwordFile = config.sops.secrets."mqtt/stats".path;
|
||||
qos = 0;
|
||||
connection_timeout = "30s";
|
||||
topics = [ topic ];
|
||||
|
@ -56,6 +56,7 @@ let
|
|||
(esensor room name ''${room}_${name}_pressure'')
|
||||
];
|
||||
in {
|
||||
sops.secrets."mqtt/stats" = {};
|
||||
services.telegraf.extraConfig.inputs.mqtt_consumer =
|
||||
(zigbee_temphum "Wohnzimmer" "temp1")
|
||||
++ (zigbee_temphum "Badezimmer" "temp2")
|
||||
|
|
|
@ -1,16 +1,18 @@
|
|||
{ config, pkgs, ... }: with import <stockholm/lib>; let
|
||||
{ config, pkgs, ... }: with pkgs.stockholm.lib; let
|
||||
mk_peers = mapAttrs (n: v: { id = v.syncthing.id; });
|
||||
|
||||
all_peers = filterAttrs (n: v: v.syncthing.id != null) config.krebs.hosts;
|
||||
used_peer_names = unique (flatten (mapAttrsToList (n: v: v.devices) config.services.syncthing.folders));
|
||||
used_peers = filterAttrs (n: v: elem n used_peer_names) all_peers;
|
||||
in {
|
||||
sops.secrets."syncthing.key" = {};
|
||||
sops.secrets."syncthing.cert" = {};
|
||||
services.syncthing = {
|
||||
enable = true;
|
||||
configDir = "/var/lib/syncthing";
|
||||
devices = mk_peers used_peers;
|
||||
key = toString <secrets/syncthing.key>;
|
||||
cert = toString <secrets/syncthing.cert>;
|
||||
key = config.sops.secrets."syncthing.key".path;
|
||||
cert = config.sops.secrets."syncthing.cert".path;
|
||||
};
|
||||
services.syncthing.folders.the_playlist = {
|
||||
path = "/home/lass/tmp/the_playlist";
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, ... }:
|
||||
|
||||
with import <stockholm/lib>; {
|
||||
with pkgs.stockholm.lib; {
|
||||
services.syncthing = {
|
||||
enable = true;
|
||||
openDefaultPorts = true;
|
||||
|
|
|
@ -3,13 +3,19 @@
|
|||
imports = [
|
||||
../binary-cache/lass.nix
|
||||
];
|
||||
krebs.tinc.retiolum.enable = true;
|
||||
krebs.tinc.retiolum.extraConfig = ''
|
||||
sops.secrets."retiolum.rsa_key.priv" = {};
|
||||
sops.secrets."retiolum.ed25519_key.priv" = {};
|
||||
krebs.tinc.retiolum = {
|
||||
enable = true;
|
||||
extraConfig = ''
|
||||
StrictSubnets = yes
|
||||
${lib.optionalString (config.krebs.build.host.nets.retiolum.via != null) ''
|
||||
LocalDiscovery = no
|
||||
''}
|
||||
'';
|
||||
privkey = config.sops.secrets."retiolum.rsa_key.priv".path;
|
||||
privkey_ed25519 = config.sops.secrets."retiolum.ed25519_key.priv".path;
|
||||
};
|
||||
environment.systemPackages = [ pkgs.tinc ];
|
||||
networking.firewall.allowedTCPPorts = [ config.krebs.build.host.nets.retiolum.tinc.port ];
|
||||
networking.firewall.allowedUDPPorts = [ config.krebs.build.host.nets.retiolum.tinc.port ];
|
||||
|
|
Loading…
Reference in a new issue