diff --git a/2configs/deployment/buildbot/master.nix b/2configs/deployment/buildbot/master.nix index 1dee36a..f5fe3b1 100644 --- a/2configs/deployment/buildbot/master.nix +++ b/2configs/deployment/buildbot/master.nix @@ -1,6 +1,6 @@ -{...}@inputs: +{inputs,config, ...}: let - domain = "buildbot.euer.krebsco.de"; + domain = "build.euer.krebsco.de"; in { imports = [ diff --git a/machines/crapi/README b/machines/crapi/README deleted file mode 100644 index 9278c76..0000000 --- a/machines/crapi/README +++ /dev/null @@ -1,4 +0,0 @@ -1. flash arm6 image from https://www.cs.helsinki.fi/u/tmtynkky/nixos-arm/installer/ to sdcard -2. passwd; systemctl start sshd; mkdir /var/src ; touch /var/src/.populate -3. "environment.systemPackages = [ pkgs.rsync pkgs.git ];" in /etc/nixos/configuration.nix -5. nixos-rebuild switch --fast --option binary-caches http://nixos-arm.dezgeg.me/channel --option binary-cache-public-keys nixos-arm.dezgeg.me-1:xBaUKS3n17BZPKeyxL4JfbTqECsT+ysbDJz29kLFRW0=% diff --git a/machines/crapi/config.nix b/machines/crapi/config.nix deleted file mode 100644 index e7c6c36..0000000 --- a/machines/crapi/config.nix +++ /dev/null @@ -1,15 +0,0 @@ -{ config, pkgs, lib, ... }: -{ - imports = [ - <stockholm/makefu> - ./hardware-config.nix - <stockholm/makefu/2configs> - <stockholm/makefu/2configs/tinc/retiolum.nix> - <stockholm/makefu/2configs/save-diskspace.nix> - - ]; - krebs.build.host = config.krebs.hosts.crapi; - - services.openssh.enable = true; - -} diff --git a/machines/crapi/hardware-config.nix b/machines/crapi/hardware-config.nix deleted file mode 100644 index bba31da..0000000 --- a/machines/crapi/hardware-config.nix +++ /dev/null @@ -1,39 +0,0 @@ -{ pkgs, lib, ... }: -{ - #raspi1 - boot.kernelParams = ["cma=32M" "console=ttyS0,115200n8" "console=tty0" "console=ttyS1,115200n8" ]; - - boot.loader.grub.enable = false; - boot.loader.raspberryPi.enable = true; - boot.loader.raspberryPi.version = 1; - boot.loader.raspberryPi.uboot.enable = true; - boot.loader.raspberryPi.uboot.configurationLimit = 1; - boot.loader.generationsDir.enable = lib.mkDefault false; - hardware.enableRedistributableFirmware = true; - boot.cleanTmpDir = true; - environment.systemPackages = [ pkgs.raspberrypi-tools ]; - boot.kernelPackages = pkgs.linuxPackages_rpi; - - nix.binaryCaches = [ "http://nixos-arm.dezgeg.me/channel" ]; - nix.binaryCachePublicKeys = [ "nixos-arm.dezgeg.me-1:xBaUKS3n17BZPKeyxL4JfbTqECsT+ysbDJz29kLFRW0=%" ]; - - fileSystems = { - "/boot" = { - device = "/dev/disk/by-label/NIXOS_BOOT"; - fsType = "vfat"; - }; - "/" = { - device = "/dev/disk/by-label/NIXOS_SD"; - fsType = "ext4"; - }; - }; - - system.activationScripts.create-swap = '' - if [ ! -e /swapfile ]; then - fallocate -l 2G /swapfile - mkswap /swapfile - chmod 600 /swapfile - fi - ''; - swapDevices = [ { device = "/swapfile"; size = 4096; } ]; -} diff --git a/machines/crapi/source.nix b/machines/crapi/source.nix deleted file mode 100644 index 4a4359e..0000000 --- a/machines/crapi/source.nix +++ /dev/null @@ -1,3 +0,0 @@ -{ - arm6 = true; -} diff --git a/machines/darth/config.nix b/machines/darth/config.nix deleted file mode 100644 index 52df9b5..0000000 --- a/machines/darth/config.nix +++ /dev/null @@ -1,76 +0,0 @@ -{ config, pkgs, lib, ... }: - -with pkgs.stockholm.lib; -let - # all the good stuff resides in /data - - byid = dev: "/dev/disk/by-id/" + dev; - rootDisk = byid "ata-INTEL_SSDSC2BW480H6_CVTR53120385480EGN"; - bootPart = rootDisk + "-part1"; - rootPart = rootDisk + "-part2"; - - allDisks = [ rootDisk ]; # auxDisk -in { - imports = [ - <stockholm/makefu> - <stockholm/makefu/2configs/fs/sda-crypto-root.nix> - <stockholm/makefu/2configs/sshd-totp.nix> - <stockholm/makefu/2configs/zsh-user.nix> - <stockholm/makefu/2configs/smart-monitor.nix> - <stockholm/makefu/2configs/exim-retiolum.nix> - # <stockholm/makefu/2configs/virtualisation/libvirt.nix> - - <stockholm/makefu/2configs/tinc/retiolum.nix> - <stockholm/makefu/2configs/tools/core.nix> - <stockholm/makefu/2configs/stats/client.nix> - # <stockholm/makefu/2configs/nsupdate-data.nix> - - <stockholm/makefu/2configs/share/anon-ftp.nix> - - # lan party - <stockholm/makefu/2configs/lanparty/lancache.nix> - <stockholm/makefu/2configs/lanparty/lancache-dns.nix> - <stockholm/makefu/2configs/lanparty/samba.nix> - <stockholm/makefu/2configs/lanparty/mumble-server.nix> - <stockholm/makefu/2configs/virtualisation/libvirt.nix> - ]; - - - - #networking.firewall.enable = false; - makefu.server.primary-itf = "enp0s25"; - # krebs.hidden-ssh.enable = true; - boot.kernelModules = [ "coretemp" "f71882fg" ]; - hardware.enableRedistributableFirmware = true; - nixpkgs.config.allowUnfree = true; - networking = { - wireless.enable = true; - firewall = { - allowPing = true; - logRefusedConnections = false; - # trustedInterfaces = [ "eno1" ]; - allowedUDPPorts = [ 80 655 1655 67 ]; - allowedTCPPorts = [ 80 655 1655 ]; - }; - # fallback connection to the internal virtual network - # interfaces.virbr3.ip4 = [{ - # address = "10.8.8.2"; - # prefixLength = 24; - # }]; - }; - - # TODO smartd omo darth gum all-in-one - services.smartd.devices = builtins.map (x: { device = x; }) allDisks; - - boot.loader.grub.device = rootDisk; - boot.initrd.luks.devices = [ - { name = "luksroot"; - device = rootPart; - allowDiscards = true; - keyFileSize = 4096; - keyFile = "/dev/sdb"; - } - ]; - - krebs.build.host = config.krebs.hosts.darth; -} diff --git a/machines/darth/source.nix b/machines/darth/source.nix deleted file mode 100644 index a8d7368..0000000 --- a/machines/darth/source.nix +++ /dev/null @@ -1,3 +0,0 @@ -{ - name="darth"; -} diff --git a/machines/drop/config.nix b/machines/drop/config.nix deleted file mode 100644 index 2757db8..0000000 --- a/machines/drop/config.nix +++ /dev/null @@ -1,40 +0,0 @@ -{ config, pkgs, ... }: -let - external-ip = "45.55.145.62"; - default-gw = "45.55.128.1"; - prefixLength = 18; -in { - imports = [ - <stockholm/makefu> - <stockholm/makefu/2configs/hw/CAC.nix> - <stockholm/makefu/2configs/save-diskspace.nix> - <stockholm/makefu/2configs/torrent.nix> - ]; - krebs = { - enable = true; - tinc.retiolum.enable = true; - build.host = config.krebs.hosts.drop; - }; - - boot.loader.grub.device = "/dev/vda"; - boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "ehci_pci" "virtio_pci" "virtio_blk" "virtio_net" "virtio_scsi" ]; - fileSystems."/" = { - device = "/dev/vda1"; - fsType = "ext4"; - }; - - networking = { - firewall = { - allowPing = true; - logRefusedConnections = false; - allowedTCPPorts = [ ]; - allowedUDPPorts = [ 655 ]; - }; - interfaces.enp0s3.ipv4.addresses = [{ - address = external-ip; - inherit prefixLength; - }]; - defaultGateway = default-gw; - nameservers = [ "8.8.8.8" ]; - }; -} diff --git a/machines/drop/source.nix b/machines/drop/source.nix deleted file mode 100644 index a6bc834..0000000 --- a/machines/drop/source.nix +++ /dev/null @@ -1,4 +0,0 @@ -{ - name="drop"; - torrent = true; -} diff --git a/machines/fileleech/config.nix b/machines/fileleech/config.nix deleted file mode 100644 index 7e9dea9..0000000 --- a/machines/fileleech/config.nix +++ /dev/null @@ -1,174 +0,0 @@ -{ config, pkgs, lib, ... }: -let - toMapper = id: "/media/crypt${builtins.toString id}"; - byid = dev: "/dev/disk/by-id/" + dev; - keyFile = byid "usb-Intuix_DiskOnKey_09A07360336198F8-0:0"; - rootDisk = byid "ata-INTEL_SSDSA2M080G2GC_CVPO003402PB080BGN"; - rootPartition = rootDisk + "-part3"; - - dataDisks = let - idpart = dev: byid dev + "-part1"; - in [ - { name = "crypt0"; device = idpart "scsi-1ATA_HUA722020ALA330_B9GDLJEF";} - { name = "crypt1"; device = idpart "scsi-1ATA_HUA722020ALA330_B9GGWG8F";} - { name = "crypt2"; device = idpart "scsi-1ATA_HUA722020ALA330_B9GH5NAF";} - { name = "crypt3"; device = idpart "scsi-1ATA_HUA722020ALA330_B9GJWGDF";} - { name = "crypt4"; device = idpart "scsi-1ATA_HUA722020ALA330_B9GKKXHF";} - { name = "crypt5"; device = idpart "scsi-1ATA_HUA722020ALA330_B9GKKXVF";} - { name = "crypt6"; device = idpart "scsi-1ATA_HUA722020ALA330_YAJJ8WRV";} - { name = "crypt7"; device = idpart "scsi-1ATA_HUA722020ALA330_YBKTUS4F";} # parity - ]; - - disks = [ { name = "luksroot"; device = rootPartition; } ] ++ dataDisks; -in { - imports = [ - <stockholm/makefu> - <stockholm/makefu/2configs/tinc/retiolum.nix> - <stockholm/makefu/2configs/disable_v6.nix> - <stockholm/makefu/2configs/torrent.nix> - <stockholm/makefu/2configs/fs/sda-crypto-root.nix> - - #<stockholm/makefu/2configs/elchos/irc-token.nix> - # <stockholm/makefu/2configs/elchos/log.nix> - # <stockholm/makefu/2configs/elchos/search.nix> - # <stockholm/makefu/2configs/elchos/stats.nix> - - ]; - systemd.services.grafana.serviceConfig.LimitNOFILE=10032; - systemd.services.graphiteApi.serviceConfig.LimitNOFILE=10032; - systemd.services.carbonCache.serviceConfig.LimitNOFILE=10032; - makefu.server.primary-itf = "enp8s0f0"; - krebs = { - enable = true; - build.host = config.krebs.hosts.fileleech; - }; - # git clone https://github.com/makefu/docker-pyload - # docker build . - # docker run -d -v /var/lib/pyload:/opt/pyload/pyload-config -v /media/crypt0/pyload:/opt/pyload/Downloads --name pyload --restart=always -p 8112:8000 -P docker-pyload - - virtualisation.docker.enable = true; # for pyload - networking.firewall.allowPing = true; - networking.firewall.logRefusedConnections = false; - networking.firewall.allowedTCPPorts = [ - 51412 # torrent - 8112 # rutorrent-web - 8113 # pyload - 8080 # sabnzbd - 9090 # sabnzbd-ssl - 655 # tinc - 21 # ftp - ]; - services.nginx.virtualHosts._download = { - default = true; - root = config.makefu.dl-dir; - extraConfig = '' - autoindex on; - ''; - basicAuth = import <secrets/kibana-auth.nix>; - }; - networking.firewall.allowedUDPPorts = [ - 655 # tinc - 51412 # torrent - ]; - - services.vsftpd.enable = true; - services.vsftpd.localUsers = true; - services.vsftpd.userlist = [ "download" ]; - services.vsftpd.userlistEnable = true; - # services.vsftpd.chrootlocalUser = true; - - services.sabnzbd.enable = true; - systemd.services.sabnzbd.environment.SSL_CERT_FILE = "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"; - - # TODO use users.motd and pam.services.sshd.showMotd - services.openssh.extraConfig = let banner = pkgs.writeText "openssh-banner" '' - Services: - ssh://download@fileleech - ssh via filebitch - ftp://download@fileleech - access to ${config.makefu.dl-dir} - http://fileleech:8112 - rutorrent - http://fileleech:8113 - pyload - https://fileleech:9090 - sabnzb - ''; in "Banner ${banner}"; - - boot.initrd.luks = { - devices = let - usbkey = name: device: { - inherit name device keyFile; - keyFileSize = 4096; - allowDiscards = true; - }; - in builtins.map (x: usbkey x.name x.device) disks; - }; - environment.systemPackages = with pkgs;[ mergerfs ]; - - fileSystems = let - cryptMount = name: - { "/media/${name}" = { device = "/dev/mapper/${name}"; fsType = "xfs"; };}; - in cryptMount "crypt0" - // cryptMount "crypt1" - // cryptMount "crypt2" - // cryptMount "crypt3" - // cryptMount "crypt4" - // cryptMount "crypt5" - // cryptMount "crypt6" - // cryptMount "crypt7" - - # this entry sometimes creates issues - // { "/media/cryptX" = { - device = (lib.concatMapStringsSep ":" (d: (toMapper d)) [ 0 1 2 3 4 5 6 ]); - fsType = "mergerfs"; - noCheck = true; - options = [ "defaults" "nofail" "allow_other" "nonempty" ]; }; - } - - ; - makefu.dl-dir = "/media/cryptX"; - users.users.download = { - useDefaultShell = true; - # name = "download"; - # createHome = true; - openssh.authorizedKeys.keys = [ - config.krebs.users.makefu.pubkey - config.krebs.users.lass.pubkey - "ssh-rsa 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 jules@kvasir-2015-02-13" - "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDINUD+p2yrc9KoTbCiuYhdfLlRu/eNX6BftToSMLs8O9qWQORjgXbDn8M9iUWXCHzdUZ9sm6Rz8TMdEV0jZq/nB01zYnW4NhMrt+NGtrmGqDa+eYrRZ4G7Rx8AYzM/ZSwERKX10txAVugV44xswRxWvFbCedujjXyWsxelf1ngb+Hiy9/CPuWNYEhTZs/YuvNkupCui2BuKuoSivJAkLhGk5YqwwcllCr39YXa/tFJWsgoQNcB9hwpzfhFm6Cc7m5DhmTWSVhQHEWyaas8Lukmd4v+mRY+KZpuhbomCHWzkxqzdBun8SXiiAKlgem9rtBIgeTEfz9OtOfF3/6VfqE7 toerb@mittagspause ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIB0IP143FAHBHWjEEKGOnM8SSTIgNF1MJxGCMKaJvTHf momo@k2.local" - "ssh-rsa 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 me@andreaskist.de" - "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCo2z8zsI+YF3ho0hvYzzCZi05mNyjk4iFK08+nNFCdXSG07jmRROWzTcC2ysTKZ56XD2al2abLxy4FZfmDcu9b2zJoPnIiXv/Jw0TKeZ71OyN3bILtv+6Xj1FTJ+kAUMXBfEew7UCgZZ8u8RQsFmlhqB9XqCBXmzP7I2EM1wWSzwEAgG/k6C+Ir054JjAj+fLr/wBduD1GAe8bXXF3Ojiky8OMs2oJaoGV96mrVAtVN+ftfWSvHCK31Y/KgCoPDE4LdoTir1IRfx2pZUMPkyzRW/etXT0PKD96I+/3d1xNPzNNjFpd6GqADC3xnfY3WslNgjL7gqwsC9SlEyuT1Xkd lotho@mercurius" - "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQClaVl9Fwp4wdGLeTZdfy5MpJf+hM6fpL1k6UmtYXWgVYU7tgmStdlpLlbyMQspoFRtT7/76n4kPwCmM0c82xNXaJJMuWa98pwMp+bAwSSdOGAP/vjfzL/TUAX+Xtrw6ehF7r1O+zqw/E/bWt6UezKj08wDLWjByzdDQwslJV6lrGek4mmYRdgmHHeZ1oG89ePEZJZOM6jcZqv0AfIj0NID3ir9Z0kz9uSSXb1279Qt4953mfjs5xwhtc1B7vrxJ3qtTZUsBoAkUkLeulUEIjkfn60wvDGu/66GP5ZClXyk2gck/ZNmtFYrQoqx9EtF1KK02cC17A0nfRySQy5BnfWn root@filebitch" - ]; - }; - makefu.snapraid = { - enable = true; - disks = map toMapper [ 0 1 2 3 4 5 6 ]; - parity = toMapper 7; - }; - networking.nameservers = [ "8.8.8.8" ]; - # SPF - networking.defaultGateway = "151.217.176.1"; - networking.interfaces.enp6s0f0.ipv4.addresses = [{ - address = "151.217.178.63"; - prefixLength = 22; - }]; - - # Gigabit - networking.interfaces.enp8s0f1.ipv4.addresses = [{ - address = "192.168.126.1"; - prefixLength = 24; - }]; - - #interfaces.enp6s0f1.ip4 = [{ - # address = external-ip; - # prefixLength = 22; - #}]; - - boot.loader.grub.device = rootDisk; - - boot.initrd.availableKernelModules = [ "uhci_hcd" "ehci_pci" "ahci" "aacraid" "usb_storage" "usbhid" ]; - boot.kernelModules = [ "kvm-intel" ]; - boot.extraModulePackages = [ ]; - - # http://blog.hackathon.de/using-unsupported-sfp-modules-with-linux.html - boot.extraModprobeConfig = '' - options ixgbe allow_unsupported_sfp=1 - ''; -} diff --git a/machines/fileleech/source.nix b/machines/fileleech/source.nix deleted file mode 100644 index b6951a2..0000000 --- a/machines/fileleech/source.nix +++ /dev/null @@ -1,4 +0,0 @@ -{ - name = "fileleech"; - torrent = true; -} diff --git a/machines/firecracker/config.nix b/machines/firecracker/config.nix deleted file mode 100644 index 87f5002..0000000 --- a/machines/firecracker/config.nix +++ /dev/null @@ -1,25 +0,0 @@ -{ config, lib, pkgs, ... }: -let - primaryInterface = "eth0"; -in { - imports = [ - <stockholm/makefu> - ./hardware-config.nix - # <stockholm/makefu/2configs/tools/core.nix> - { environment.systemPackages = with pkgs;[ rsync screen curl git ];} - <stockholm/makefu/2configs/binary-cache/nixos.nix> - #<stockholm/makefu/2configs/support-nixos.nix> -# configure your hw: -# <stockholm/makefu/2configs/save-diskspace.nix> - ]; - krebs = { - enable = true; - tinc.retiolum.enable = true; - build.host = config.krebs.hosts.firecracker; - }; - networking.firewall.trustedInterfaces = [ primaryInterface ]; - documentation.info.enable = false; - documentation.man.enable = false; - services.nixosManual.enable = false; - sound.enable = false; -} diff --git a/machines/firecracker/hardware-config.nix b/machines/firecracker/hardware-config.nix deleted file mode 100644 index acd5664..0000000 --- a/machines/firecracker/hardware-config.nix +++ /dev/null @@ -1,30 +0,0 @@ -{ pkgs, lib, ... }: -{ - boot.kernelParams = lib.mkForce ["console=ttyS2,1500000n8" "earlycon=uart8250,mmio32,0xff1a0000" "earlyprintk"]; - boot.loader.grub.enable = false; - boot.loader.generic-extlinux-compatible.enable = true; - boot.loader.generic-extlinux-compatible.configurationLimit = 1; - boot.loader.generationsDir.enable = lib.mkDefault false; - boot.supportedFilesystems = lib.mkForce [ "vfat" ]; - - boot.tmp.useTmpfs = lib.mkForce false; - boot.cleanTmpDir = true; - hardware.enableRedistributableFirmware = true; - - ## wifi not working, will be fixed with https://github.com/NixOS/nixpkgs/pull/53747 - boot.kernelPackages = pkgs.linuxPackages_latest; - networking.wireless.enable = true; - # File systems configuration for using the installer's partition layout - swapDevices = [ { device = "/var/swap"; size = 4096; } ]; - fileSystems = { - "/boot" = { - device = "/dev/disk/by-label/NIXOS_BOOT"; - fsType = "vfat"; - }; - "/" = { - device = "/dev/disk/by-label/NIXOS_SD"; - fsType = "ext4"; - }; - }; - -} diff --git a/machines/firecracker/source.nix b/machines/firecracker/source.nix deleted file mode 100644 index 22c4003..0000000 --- a/machines/firecracker/source.nix +++ /dev/null @@ -1,4 +0,0 @@ -{ - name="cake"; - full = true; -} diff --git a/machines/hardware/tsp-disk.json b/machines/hardware/tsp-disk.json deleted file mode 100644 index 5a4bd26..0000000 --- a/machines/hardware/tsp-disk.json +++ /dev/null @@ -1,23 +0,0 @@ -{ - "type": "devices", - "content": { - "sda": { - "type": "table", - "format": "msdos", - "partitions": [ - { "type": "partition", - "part-type": "primary", - "start": "1M", - "end": "100%", - "bootable": true, - "content": { - "type": "filesystem", - "format": "ext4", - "mountpoint": "/" - } - } - ] - } - } -} - diff --git a/machines/iso/config.nix b/machines/iso/config.nix deleted file mode 100644 index 57b536f..0000000 --- a/machines/iso/config.nix +++ /dev/null @@ -1,72 +0,0 @@ -{ config, pkgs, lib, ... }: - -with pkgs.stockholm.lib; -{ - imports = [ - #<stockholm/makefu> - <nixpkgs/nixos/modules/installer/cd-dvd/installation-cd-minimal.nix> - <nixpkgs/nixos/modules/installer/cd-dvd/channel.nix> - # <stockholm/makefu/2configs/tools/core.nix> - ./justdoit.nix - { - environment.systemPackages = [ (pkgs.writeScriptBin "network-setup" '' - #!/bin/sh - ip addr add 178.254.30.202/255.255.252.0 dev ens3 - ip route add default via 178.254.28.1 - echo nameserver 1.1.1.1 > /etc/resolv.conf - '')]; - kexec.justdoit = { - bootSize = 512; - rootDevice = "/dev/vda"; - bootType = "vfat"; - luksEncrypt = false; - uefi = false; - }; - } - ]; - # boot.kernelPackages = lib.mkDefault pkgs.linuxPackages_latest; - # TODO: NIX_PATH and nix.nixPath are being set by default.nix right now - # cd ~/stockholm ; nix-build -A config.system.build.isoImage -I nixos-config=makefu/1systems/iso/config.nix -I secrets=/home/makefu/secrets/iso /var/src/nixpkgs/nixos - #krebs.build.host = { cores = 0; }; - isoImage.isoBaseName = lib.mkForce "stockholm"; - #krebs.hidden-ssh.enable = true; - # environment.systemPackages = with pkgs; [ - # aria2 - # ddrescue - # ]; - environment.extraInit = '' - EDITOR=vim - ''; - # iso-specific - services.openssh = { - enable = true; - hostKeys = [ - { bits = 8192; type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; } - ]; - }; - # enable ssh in the iso boot process - systemd.services.sshd.wantedBy = lib.mkForce [ "multi-user.target" ]; - # hack `tee` behavior - #nixpkgs.config.packageOverrides = super: { - # irc-announce = super.callPackage <stockholm/krebs/5pkgs/simple/irc-announce> { - # pkgs = pkgs // { - # coreutils = pkgs.symlinkJoin { - # name = "coreutils-hack"; - # paths = [ - # pkgs.coreutils - # (pkgs.writeDashBin "tee" '' - # if test "$1" = /dev/stderr; then - # while read -r line; do - # echo "$line" - # echo "$line" >&2 - # done - # else - # ${super.coreutils}/bin/tee "$@" - # fi - # '') - # ]; - # }; - # }; - # }; - #}; -} diff --git a/machines/iso/justdoit.nix b/machines/iso/justdoit.nix deleted file mode 100644 index 0ce9049..0000000 --- a/machines/iso/justdoit.nix +++ /dev/null @@ -1,120 +0,0 @@ -{ config, pkgs, lib, ... }: - -with lib; -let - cfg = config.kexec.justdoit; - x = if cfg.nvme then "p" else ""; -in { - options = { - kexec.justdoit = { - rootDevice = mkOption { - type = types.str; - default = "/dev/sda"; - description = "the root block device that justdoit will nuke from orbit and force nixos onto"; - }; - bootSize = mkOption { - type = types.int; - default = 256; - description = "size of /boot in mb"; - }; - bootType = mkOption { - type = types.enum [ "ext4" "vfat" "zfs" ]; - default = "ext4"; - }; - swapSize = mkOption { - type = types.int; - default = 1024; - description = "size of swap in mb"; - }; - poolName = mkOption { - type = types.str; - default = "tank"; - description = "zfs pool name"; - }; - luksEncrypt = mkOption { - type = types.bool; - default = false; - description = "encrypt all of zfs and swap"; - }; - uefi = mkOption { - type = types.bool; - default = false; - description = "create a uefi install"; - }; - nvme = mkOption { - type = types.bool; - default = false; - description = "rootDevice is nvme"; - }; - }; - }; - config = let - mkBootTable = { - ext4 = "mkfs.ext4 $NIXOS_BOOT -L NIXOS_BOOT"; - vfat = "mkfs.vfat $NIXOS_BOOT -n NIXOS_BOOT"; - zfs = ""; - }; - in lib.mkIf true { - system.build.justdoit = pkgs.writeScriptBin "justdoit" '' - #!${pkgs.stdenv.shell} - set -e - vgchange -a n - wipefs -a ${cfg.rootDevice} - dd if=/dev/zero of=${cfg.rootDevice} bs=512 count=10000 - sfdisk ${cfg.rootDevice} <<EOF - label: gpt - device: ${cfg.rootDevice} - unit: sectors - ${lib.optionalString (cfg.bootType != "zfs") "1 : size=${toString (2048 * cfg.bootSize)}, type=0FC63DAF-8483-4772-8E79-3D69D8477DE4"} - ${lib.optionalString (! cfg.uefi) "4 : size=4096, type=21686148-6449-6E6F-744E-656564454649"} - 2 : type=0FC63DAF-8483-4772-8E79-3D69D8477DE4 - EOF - ${if cfg.luksEncrypt then '' - cryptsetup luksFormat ${cfg.rootDevice}${x}2 - cryptsetup open --type luks ${cfg.rootDevice}${x}2 root - export ROOT_DEVICE=/dev/mapper/root - '' else '' - export ROOT_DEVICE=${cfg.rootDevice}${x}2 - ''} - ${lib.optionalString (cfg.bootType != "zfs") "export NIXOS_BOOT=${cfg.rootDevice}${x}1"} - mkdir -p /mnt - ${mkBootTable.${cfg.bootType}} - zpool create -o ashift=12 -o altroot=/mnt ${cfg.poolName} $ROOT_DEVICE - zfs create -o mountpoint=legacy ${cfg.poolName}/root - zfs create -o mountpoint=legacy ${cfg.poolName}/home - zfs create -o mountpoint=legacy ${cfg.poolName}/nix - mount -t zfs ${cfg.poolName}/root /mnt/ - mkdir /mnt/{home,nix,boot} - mount -t zfs ${cfg.poolName}/home /mnt/home/ - mount -t zfs ${cfg.poolName}/nix /mnt/nix/ - ${lib.optionalString (cfg.bootType != "zfs") "mount $NIXOS_BOOT /mnt/boot/"} - nixos-generate-config --root /mnt/ - hostId=$(echo $(head -c4 /dev/urandom | od -A none -t x4)) - cp ${./target-config.nix} /mnt/etc/nixos/configuration.nix - cat > /mnt/etc/nixos/generated.nix <<EOF - { ... }: - { - ${if cfg.uefi then '' - boot.loader.grub.efiInstallAsRemovable = true; - boot.loader.grub.efiSupport = true; - boot.loader.grub.device = "nodev"; - '' else '' - boot.loader.grub.device = "${cfg.rootDevice}"; - ''} - networking.hostId = "$hostId"; # required for zfs use - ${lib.optionalString cfg.luksEncrypt '' - boot.initrd.luks.devices = [ - { name = "root"; device = "${cfg.rootDevice}${x}2"; preLVM = true; } - ]; - ''} - } - EOF - nixos-install - umount /mnt/home /mnt/nix ${lib.optionalString (cfg.bootType != "zfs") "/mnt/boot"} /mnt - zpool export ${cfg.poolName} - ''; - environment.systemPackages = [ config.system.build.justdoit ]; - boot.supportedFilesystems = [ "zfs" ]; - users.users.root.openssh.authorizedKeys.keys = [ "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCl3RTOHd5DLiVeUbUr/GSiKoRWknXQnbkIf+uNiFO+XxiqZVojPlumQUVhasY8UzDzj9tSDruUKXpjut50FhIO5UFAgsBeMJyoZbgY/+R+QKU00Q19+IiUtxeFol/9dCO+F4o937MC0OpAC10LbOXN/9SYIXueYk3pJxIycXwUqhYmyEqtDdVh9Rx32LBVqlBoXRHpNGPLiswV2qNe0b5p919IGcslzf1XoUzfE3a3yjk/XbWh/59xnl4V7Oe7+iQheFxOT6rFA30WYwEygs5As//ZYtxvnn0gA02gOnXJsNjOW9irlxOUeP7IOU6Ye3WRKFRR0+7PS+w8IJLag2xb" ]; - }; -} diff --git a/machines/iso/source.nix b/machines/iso/source.nix deleted file mode 100644 index 6bef8ad..0000000 --- a/machines/iso/source.nix +++ /dev/null @@ -1,3 +0,0 @@ -{ - name="iso"; -} diff --git a/machines/iso/target-config.nix b/machines/iso/target-config.nix deleted file mode 100644 index 9d921c3..0000000 --- a/machines/iso/target-config.nix +++ /dev/null @@ -1,45 +0,0 @@ -{ pkgs, lib, ... }: - -{ - imports = [ ./hardware-configuration.nix ./generated.nix ]; - boot.loader.grub.enable = true; - boot.zfs.devNodes = "/dev"; # fixes some virtualmachine issues - #boot.zfs.forceImportRoot = false; - #boot.zfs.forceImportAll = false; - boot.kernelParams = [ - "boot.shell_on_fail" - "panic=30" "boot.panic_on_fail" # reboot the machine upon fatal boot issues - ]; - users.users.root.openssh.authorizedKeys.keys = [ "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCl3RTOHd5DLiVeUbUr/GSiKoRWknXQnbkIf+uNiFO+XxiqZVojPlumQUVhasY8UzDzj9tSDruUKXpjut50FhIO5UFAgsBeMJyoZbgY/+R+QKU00Q19+IiUtxeFol/9dCO+F4o937MC0OpAC10LbOXN/9SYIXueYk3pJxIycXwUqhYmyEqtDdVh9Rx32LBVqlBoXRHpNGPLiswV2qNe0b5p919IGcslzf1XoUzfE3a3yjk/XbWh/59xnl4V7Oe7+iQheFxOT6rFA30WYwEygs5As//ZYtxvnn0gA02gOnXJsNjOW9irlxOUeP7IOU6Ye3WRKFRR0+7PS+w8IJLag2xb" ]; - boot.tmp.useTmpfs = true; - programs.bash.enableCompletion = true; - services.journald.extraConfig = '' - SystemMaxUse=1G - RuntimeMaxUse=128M - ''; - environment.systemPackages = [ (pkgs.writeScriptBin "network-setup" '' - #!/bin/sh - ip addr add 178.254.30.202/255.255.252.0 dev ens3 - ip route add default via 178.254.28.1 - echo nameserver 1.1.1.1 > /etc/resolv.conf - '')]; - - # minimal - boot.supportedFilesystems = [ "zfs" ]; - programs.command-not-found.enable = false; - time.timeZone = "Europe/Berlin"; - programs.ssh.startAgent = false; - nix.useSandbox = true; - users.mutableUsers = false; - networking.firewall.rejectPackets = true; - networking.firewall.allowPing = true; - services.openssh.enable = true; - i18n = { - consoleKeyMap = "us"; - defaultLocale = "en_US.UTF-8"; - }; - boot.kernel.sysctl = { - "net.ipv6.conf.all.use_tempaddr" = lib.mkDefault "2"; - "net.ipv6.conf.default.use_tempaddr" = lib.mkDefault "2"; - }; -} diff --git a/machines/kexec/config.nix b/machines/kexec/config.nix deleted file mode 100644 index 545bbb1..0000000 --- a/machines/kexec/config.nix +++ /dev/null @@ -1,25 +0,0 @@ -{ config, pkgs, lib, ... }: - -with pkgs.stockholm.lib; -{ - imports = [ - <stockholm/makefu> - # <stockholm/makefu/2configs/tools/core.nix> - <nixpkgs/nixos/modules/installer/netboot/netboot-minimal.nix> - <clever_kexec/kexec/kexec.nix> - ]; - # cd ~/stockholm ; nix-build '<nixpkgs/nixos>' -A config.system.build.kexec_tarball -j 4 -I nixos-config=makefu/1systems/iso.nix -I secrets=/home/makefu/secrets/iso - - krebs.build.host = config.krebs.hosts.iso; - krebs.hidden-ssh.enable = true; - environment.extraInit = '' - EDITOR=vim - ''; - services.openssh = { - enable = true; - hostKeys = [ - { bits = 8192; type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; } - ]; - }; - systemd.services.sshd.wantedBy = lib.mkForce [ "multi-user.target" ]; -} diff --git a/machines/kexec/source.nix b/machines/kexec/source.nix deleted file mode 100644 index 6bef8ad..0000000 --- a/machines/kexec/source.nix +++ /dev/null @@ -1,3 +0,0 @@ -{ - name="iso"; -} diff --git a/machines/latte/1blu/default.nix b/machines/latte/1blu/default.nix deleted file mode 100644 index c246229..0000000 --- a/machines/latte/1blu/default.nix +++ /dev/null @@ -1,49 +0,0 @@ -{ config, lib, pkgs, modulesPath, ... }: -{ - - imports = - [ ./network.nix - (modulesPath + "/profiles/qemu-guest.nix") - ]; - - # Disk - boot.initrd.availableKernelModules = [ "ata_piix" "virtio_pci" "virtio_scsi" "xhci_pci" "sr_mod" "virtio_blk" ]; - boot.initrd.kernelModules = [ ]; - boot.kernelModules = [ ]; - boot.extraModulePackages = [ ]; - - fileSystems."/" = - { device = "tank/root"; - fsType = "zfs"; - }; - - fileSystems."/home" = - { device = "tank/home"; - fsType = "zfs"; - }; - - fileSystems."/nix" = - { device = "tank/nix"; - fsType = "zfs"; - }; - - fileSystems."/boot" = - { device = "/dev/disk/by-uuid/AEF3-A486"; - fsType = "vfat"; - }; - - swapDevices = [ ]; - boot.loader.grub.device = "/dev/vda"; - - networking.hostId = "3150697c"; # required for zfs use - boot.tmp.useTmpfs = true; - boot.supportedFilesystems = [ "zfs" ]; - - boot.loader.grub.enable = true; - boot.loader.grub.copyKernels = true; - boot.zfs.devNodes = "/dev"; # fixes some virtualmachine issues - boot.kernelParams = [ - "boot.shell_on_fail" - "panic=30" "boot.panic_on_fail" # reboot the machine upon fatal boot issues - ]; -} diff --git a/machines/latte/1blu/network.nix b/machines/latte/1blu/network.nix deleted file mode 100644 index 0a0eac9..0000000 --- a/machines/latte/1blu/network.nix +++ /dev/null @@ -1,32 +0,0 @@ -{ config, lib, pkgs, modulesPath, ... }: -let - external-mac = "c4:37:72:55:4e:1c"; - external-gw = "178.254.28.1"; - external-ip = "178.254.30.202"; - external-ip6 = "2a00:6800:3:18c::2"; - external-gw6 = "2a00:6800:3::1"; - external-netmask = 22; - external-netmask6 = 64; - internal-ip = config.krebs.build.host.nets.retiolum.ip4.addr; - ext-if = "et0"; # gets renamed on the fly -in -{ - services.udev.extraRules = '' - SUBSYSTEM=="net", ATTR{address}=="${external-mac}", NAME="${ext-if}" - ''; - networking = { - interfaces."${ext-if}" = { - ipv4.addresses = [{ - address = external-ip; - prefixLength = external-netmask; - }]; - ipv6.addresses = [{ - address = external-ip6; - prefixLength = external-netmask6; - }]; - }; - defaultGateway6 = { address = external-gw6; interface = ext-if; }; - defaultGateway = external-gw; - nameservers = [ "1.1.1.1" ]; - }; -} diff --git a/machines/latte/config.nix b/machines/latte/config.nix deleted file mode 100644 index 9a242a4..0000000 --- a/machines/latte/config.nix +++ /dev/null @@ -1,67 +0,0 @@ -{ config, lib, pkgs, ... }: -let - - # external-ip = config.krebs.build.host.nets.internet.ip4.addr; - # internal-ip = config.krebs.build.host.nets.retiolum.ip4.addr; - # default-gw = "185.215.224.1"; - # prefixLength = 24; - # external-mac = "46:5b:fc:f4:44:c9"; - # ext-if = "et0"; -in { - - imports = [ - ./1blu - <stockholm/makefu> - - # common - <stockholm/makefu/2configs/nur.nix> - <stockholm/makefu/2configs/home-manager> - <stockholm/makefu/2configs/home-manager/cli.nix> - - # Security - <stockholm/makefu/2configs/sshd-totp.nix> - - # Tools - <stockholm/makefu/2configs/tools/core.nix> - <stockholm/makefu/2configs/zsh-user.nix> - - # NixOS Build - <stockholm/makefu/2configs/remote-build/slave.nix> - - # Storage - <stockholm/makefu/2configs/share> - # <stockholm/makefu/2configs/share/hetzner-client.nix> - - - # torrent is managed by gum - # <stockholm/makefu/2configs/torrent/rtorrent.nix> - - ## Web - - # local usage: - <stockholm/makefu/2configs/mosh.nix> - - - # Supervision - <stockholm/makefu/2configs/nix-community/supervision.nix> - - # Krebs - <stockholm/makefu/2configs/tinc/retiolum.nix> - - # backup - <stockholm/makefu/2configs/backup/state.nix> - - # migrated: - # <stockholm/makefu/2configs/bitlbee.nix> - - - ]; - krebs = { - enable = true; - build.host = config.krebs.hosts.latte; - }; - - makefu.dl-dir = "/media/cloud/download"; - networking.firewall.allowedTCPPorts = [ 80 443 ]; - -} diff --git a/machines/latte/source.nix b/machines/latte/source.nix deleted file mode 100644 index 41abecf..0000000 --- a/machines/latte/source.nix +++ /dev/null @@ -1,5 +0,0 @@ -{ - name = "latte"; - torrent = true; - home-manager = true; -} diff --git a/machines/minicake/config.nix b/machines/minicake/config.nix deleted file mode 100644 index fe66679..0000000 --- a/machines/minicake/config.nix +++ /dev/null @@ -1,27 +0,0 @@ -{ config,nixpkgsPath, pkgs, lib, ... }: -{ - krebs = { - enable = true; - - dns.providers.lan = "hosts"; - build.user = config.krebs.users.makefu; - }; - imports = [ - (nixpkgsPath + "/nixos/modules/profiles/minimal.nix") - (nixpkgsPath + "/nixos/modules/profiles/installation-device.nix") - ]; - - # cifs-utils fails to cross-compile - # Let's simplify this by removing all unneeded filesystems from the image. - boot.supportedFilesystems = lib.mkForce [ "vfat" ]; - - boot.kernelPackages = lib.mkDefault pkgs.linuxPackages_latest; - - - users.users = { - root = { - openssh.authorizedKeys.keys = [ config.krebs.users.makefu.pubkey ]; - }; - }; - services.openssh.enable = true; -} diff --git a/machines/mrdavid/config.nix b/machines/mrdavid/config.nix deleted file mode 100644 index 99b627c..0000000 --- a/machines/mrdavid/config.nix +++ /dev/null @@ -1,28 +0,0 @@ -{ config, pkgs, lib, self, ... }: - -{ - imports = - [ # Include the results of the hardware scan. - ./hardware.nix - ../../2configs/default.nix - - # ../../2configs/nur.nix - ../../2configs/home-manager - ../../2configs/main-laptop.nix - ../../2configs/editor/neovim - ../../2configs/tools/core.nix - # ../../2configs/tools/all.nix - - ((import ../../2configs/fs/disko/single-disk-ext4.nix ) { disk = "/dev/sda"; }) - # hardware specifics are in here - - ../../2configs/zsh-user.nix - ../../2configs/home-manager - ../../2configs/home-manager/desktop.nix - ../../2configs/home-manager/cli.nix - - # ../../2configs/tinc/retiolum.nix - ]; - - krebs.build.host.name = "mrdavid"; -} diff --git a/machines/mrdavid/hardware.nix b/machines/mrdavid/hardware.nix deleted file mode 100644 index 7398306..0000000 --- a/machines/mrdavid/hardware.nix +++ /dev/null @@ -1,5 +0,0 @@ -{ lib, ... }: -{ - imports = [ ]; - hardware.enableRedistributableFirmware = true; -} diff --git a/machines/pnp/config.nix b/machines/pnp/config.nix deleted file mode 100644 index 6c9fc06..0000000 --- a/machines/pnp/config.nix +++ /dev/null @@ -1,50 +0,0 @@ -# Usage: -# NIX_PATH=secrets=/home/makefu/secrets/wry:nixpkgs=/var/src/nixpkgs nix-build -A users.makefu.pnp.config.system.build.vm -# result/bin/run-pnp-vm -virtfs local,path=/home/makefu/secrets/pnp,security_model=none,mount_tag=secrets -{ config, pkgs, ... }: - -{ - imports = - [ - <stockholm/makefu> - <stockholm/makefu/2configs/headless.nix> - - # these will be overwritten by qemu-vm.nix but will be used if the system - # is directly deployed - <nixpkgs/nixos/modules/profiles/qemu-guest.nix> - <stockholm/makefu/2configs/fs/vm-single-partition.nix> - - <stockholm/makefu/2configs/tinc/retiolum.nix> - - # config.system.build.vm - (toString <nixpkgs/nixos/modules/virtualisation/qemu-vm.nix>) - ]; - - virtualisation.graphics = false; - # also export secrets, see Usage above - fileSystems = pkgs.lib.mkVMOverride { - "${builtins.toString <secrets>}" = - { device = "secrets"; - fsType = "9p"; - options = [ "trans=virtio" "version=9p2000.L" "cache=loose" ]; - neededForBoot = true; - }; - }; - - krebs.Reaktor.debug = { - debug = true; - extraEnviron = { - # TODO: remove hard-coded server - REAKTOR_HOST = "irc.r"; - }; - plugins = with pkgs.ReaktorPlugins; [ stockholm-issue nixos-version sed-plugin ]; - channels = [ "#xxx" ]; - }; - - krebs.build.host = config.krebs.hosts.pnp; - - networking.firewall.allowedTCPPorts = [ - 25 - ]; - -} diff --git a/machines/pnp/source.nix b/machines/pnp/source.nix deleted file mode 100644 index 02f7d0a..0000000 --- a/machines/pnp/source.nix +++ /dev/null @@ -1,3 +0,0 @@ -{ - name="pnp"; -} diff --git a/machines/repunit/config.nix b/machines/repunit/config.nix deleted file mode 100644 index 23b0dc6..0000000 --- a/machines/repunit/config.nix +++ /dev/null @@ -1,39 +0,0 @@ -# Edit this configuration file to define what should be installed on -# your system. Help is available in the configuration.nix(5) man page -# and in the NixOS manual (accessible by running ‘nixos-help’). - -{ config, pkgs, ... }: - -{ - imports = - [ # Include the results of the hardware scan. - <stockholm/makefu> - <nixpkgs/nixos/modules/profiles/qemu-guest.nix> - <stockholm/makefu/2configs/git/cgit-retiolum.nix> - <stockholm/makefu/2configs/tinc/retiolum.nix> - ]; - krebs.build.host = config.krebs.hosts.repunit; - - boot.loader.grub.enable = true; - boot.loader.grub.device = "/dev/vda"; - - boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "ehci_pci" "virtio_pci" "virtio_blk" ]; - boot.kernelModules = [ ]; - boot.extraModulePackages = [ ]; - hardware.enableRedistributableFirmware = true; - hardware.cpu.amd.updateMicrocode = true; - -# networking.firewall is enabled by default - networking.firewall.allowedTCPPorts = [ 80 ]; - networking.firewall.allowPing = true; - - fileSystems."/" = - { device = "/dev/disk/by-label/nixos"; - fsType = "ext4"; - }; - -# $ nix-env -qaP | grep wget - environment.systemPackages = with pkgs; [ - jq - ]; -} diff --git a/machines/repunit/source.nix b/machines/repunit/source.nix deleted file mode 100644 index 20d3cd1..0000000 --- a/machines/repunit/source.nix +++ /dev/null @@ -1,3 +0,0 @@ -{ - name="repunit"; -} diff --git a/machines/sdcard/config.nix b/machines/sdcard/config.nix deleted file mode 100644 index 4e3c22a..0000000 --- a/machines/sdcard/config.nix +++ /dev/null @@ -1,40 +0,0 @@ -{ config, pkgs, lib, ... }: -let - kernel = pkgs.callPackage ./kernel.nix { - kernelPatches = with pkgs.kernelPatches; [ - # kernelPatches.bridge_stp_helper - # kernelPatches.modinst_arg_list_too_long - ]; - }; -in -{ - imports = [ - <nixpkgs/nixos/modules/installer/cd-dvd/sd-image-aarch64.nix> - # <stockholm/makefu/2configs/minimal.nix> - ]; - # TODO: NIX_PATH and nix.nixPath are being set by default.nix right now - # cd ~/stockholm ; nix build config.system.build.sdImage -I nixos-config=makefu/1systems/sdcard/config.nix -f /home/makefu/nixpkgs/nixos - - boot.kernelParams = ["console=ttyS2,1500000" "earlycon=uart8250,mmio32,0xff1a0000"]; - # boot.kernelPackages = pkgs.linuxPackages_latest; - boot.kernelPackages = pkgs.linuxPackagesFor kernel; - boot.supportedFilesystems = lib.mkForce [ "vfat" "f2fs" "xfs" "ntfs" "cifs" ]; - - # krebs.hidden-ssh.enable = true; - environment.systemPackages = with pkgs; [ - aria2 - ddrescue - ]; - environment.extraInit = '' - EDITOR=vim - ''; - # iso-specific - services.openssh = { - enable = true; - hostKeys = [ - { bits = 8192; type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; } - ]; - }; - # enable ssh in the iso boot process - systemd.services.sshd.wantedBy = lib.mkForce [ "multi-user.target" ]; -} diff --git a/machines/sdcard/kernel.nix b/machines/sdcard/kernel.nix deleted file mode 100644 index df5e7ad..0000000 --- a/machines/sdcard/kernel.nix +++ /dev/null @@ -1,15 +0,0 @@ -{ fetchFromGitLab, buildLinux, ... } @ args: -buildLinux (args // rec { - version = "4.4.55"; - modDirVersion = "4.4.55"; - extraMeta.branch = "4.4"; - defconfig = "firefly_linux_defconfig"; - - src = fetchFromGitLab { - owner = "TeeFirefly"; - repo = "linux-kernel"; - rev = "firefly_0821_release"; - sha256 = "1fwj9cm5ysz286znrr3fyrhfn903m84i7py4rv3y3h9avxb3zl1r"; - }; - extraMeta.platforms = [ "aarch64-linux" ]; -} // (args.argsOverride or {})) diff --git a/machines/sdcard/source.nix b/machines/sdcard/source.nix deleted file mode 100644 index 6bef8ad..0000000 --- a/machines/sdcard/source.nix +++ /dev/null @@ -1,3 +0,0 @@ -{ - name="iso"; -} diff --git a/machines/sdev/config.nix b/machines/sdev/config.nix deleted file mode 100644 index d02c303..0000000 --- a/machines/sdev/config.nix +++ /dev/null @@ -1,54 +0,0 @@ -{ lib, config, pkgs, ... }: -{ - krebs.build.host = config.krebs.hosts.sdev; - makefu.awesome.modkey = "Mod1"; - imports = - [ # Include the results of the hardware scan. - <stockholm/makefu> - <stockholm/makefu/2configs/home-manager> - - # <stockholm/makefu/2configs/hw/vbox-guest.nix> # broken since 2019-04-18 - { # until virtualbox-image is fixed - imports = [ - <stockholm/makefu/2configs/fs/single-partition-ext4.nix> - ]; - boot.loader.grub.device = lib.mkForce "/dev/sda"; - } - <stockholm/makefu/2configs/main-laptop.nix> - # <secrets/extra-hosts.nix> - - # environment - <stockholm/makefu/2configs/tinc/retiolum.nix> - <stockholm/makefu/2configs/virtualisation/docker.nix> - - ]; - # allow sdev to deploy self - users.extraUsers = { - root = { - openssh.authorizedKeys.keys = [ config.krebs.users.makefu-vbob.pubkey ]; - }; - }; - # corefonts - nixpkgs.config.allowUnfree = true; - - environment.systemPackages = with pkgs;[ - ppp xclip - get - passwdqc-utils - gnupg - populate - # 20.09: torbrowser is broken - #(pkgs.writeScriptBin "tor-browser" '' - # #! /bin/sh - # TOR_SKIP_LAUNCH=1 ${torbrowser}/bin/tor-browser - #'') - ]; - - networking.firewall.allowedTCPPorts = [ - 25 - 80 - 8010 - ]; - - -} diff --git a/machines/sdev/source.nix b/machines/sdev/source.nix deleted file mode 100644 index d6c3d20..0000000 --- a/machines/sdev/source.nix +++ /dev/null @@ -1,7 +0,0 @@ -{ - name="sdev"; - home-manager = true; - hw = true; - mic92 = true; - unstable = true; -} diff --git a/machines/shack-autoinstall/config.nix b/machines/shack-autoinstall/config.nix deleted file mode 100644 index 18bfd2c..0000000 --- a/machines/shack-autoinstall/config.nix +++ /dev/null @@ -1,49 +0,0 @@ -{ config, pkgs, lib, ... }: - -with pkgs.stockholm.lib; -let - disk = "/dev/sda"; -in { - imports = [ - <stockholm/makefu> - <nixpkgs/nixos/modules/installer/cd-dvd/installation-cd-minimal.nix> - <nixpkgs/nixos/modules/installer/cd-dvd/channel.nix> - <stockholm/makefu/2configs/tools/core.nix> - ]; - # TODO: NIX_PATH and nix.nixPath are being set by default.nix right now - # cd ~/stockholm ; nix-build -A config.system.build.isoImage -I nixos-config=makefu/1systems/iso.nix -I secrets=/home/makefu/secrets/iso /var/src/nixpkgs/nixos - krebs.build.host = config.krebs.hosts.iso; - krebs.hidden-ssh.enable = true; - - environment.extraInit = '' - EDITOR=vim - ''; - # iso-specific - boot.kernelParams = [ "copytoram" ]; - - - environment.systemPackages = [ - pkgs.parted - ( pkgs.writeScriptBin "shack-install" '' - #! /bin/sh - echo "go ahead and try NIX_PATH=/root/.nix-defexpr/channels/ nixos-install" - '') - ]; - - systemd.services.wpa_supplicant.wantedBy = lib.mkForce [ "multi-user.target" ]; - - networking.wireless = { - enable = true; - networks.shack.psk = "welcome2shack"; - }; - - - services.openssh = { - enable = true; - hostKeys = [ - { bits = 8192; type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; } - ]; - }; - # enable ssh in the iso boot process - systemd.services.sshd.wantedBy = lib.mkForce [ "multi-user.target" ]; -} diff --git a/machines/shack-autoinstall/grub-partition.sh b/machines/shack-autoinstall/grub-partition.sh deleted file mode 100644 index c23c897..0000000 --- a/machines/shack-autoinstall/grub-partition.sh +++ /dev/null @@ -1,5 +0,0 @@ -#!/bin/sh -set -euf -parted -s ${disk} mklabel msdos -parted -s ${disk} -- mkpart primary linux-swap 1M 4096M -parted -s ${disk} -- mkpart primary ext2 4096M 100% diff --git a/machines/shack-autoinstall/shack-config.nix b/machines/shack-autoinstall/shack-config.nix deleted file mode 100644 index cd79aa6..0000000 --- a/machines/shack-autoinstall/shack-config.nix +++ /dev/null @@ -1,230 +0,0 @@ -{ config, pkgs, lib, ... }: - -{ - imports = [ - ./hardware-configuration.nix - # TODO: - ]; - - # shacks-specific - networking.wireless = { - enable = true; - networks.shack.psk = "181471eb97eb23f12c6871227bc4a7b13c8f6af56dcc0d0e8b71f4d7a510cb4e"; - }; - networking.hostName = "shackbook"; - - boot.tmp.useTmpfs = true; - - users.users.shack = { - createHome = true; - useDefaultShell = true; - home = "/home/shack"; - uid = 9001; - packages = with pkgs;[ - chromium - firefox - ]; - extraGroups = [ "audio" "wheel" ]; - hashedPassword = "$6$KIxlQTLEnKl7cwC$LrmbwZ64Mlm7zqUUZ0EObPJMES3C0mQ6Sw7ynTuXzUo7d9EWg/k5XCGkDHMFvL/Pz19Awcv0knHB1j3dHT6fh/" ; - }; - - environment.variables = let - ca-bundle = "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"; - in { - EDITOR = lib.mkForce "vim"; - CURL_CA_BUNDLE = ca-bundle; - GIT_SSL_CAINFO = ca-bundle; - SSL_CERT_FILE = ca-bundle; - }; - - services.printing = { - enable = true; - # TODO: shack-printer - }; - - - environment.systemPackages = with pkgs;[ - parted - ddrescue - tmux - jq git gnumake htop rxvt_unicode.terminfo - (pkgs.vim_configurable.customize { - name = "vim"; - vimrcConfig.customRC = '' - set nocompatible - syntax on - set list - set listchars=tab:▸\ - "set list listchars=tab:>-,trail:.,extends:> - - filetype off - filetype plugin indent on - - colorscheme darkblue - set background=dark - - set number - set relativenumber - set mouse=a - set ignorecase - set incsearch - set wildignore=*.o,*.obj,*.bak,*.exe,*.os - set textwidth=79 - set shiftwidth=2 - set expandtab - set softtabstop=2 - set shiftround - set smarttab - set tabstop=2 - set et - set autoindent - set backspace=indent,eol,start - - - inoremap <F1> <ESC> - nnoremap <F1> <ESC> - vnoremap <F1> <ESC> - - nnoremap <F5> :UndotreeToggle<CR> - set undodir =~/.vim/undo - set undofile - "maximum number of changes that can be undone - set undolevels=1000000 - "maximum number lines to save for undo on a buffer reload - set undoreload=10000000 - - nnoremap <F2> :set invpaste paste?<CR> - set pastetoggle=<F2> - set showmode - - set showmatch - set matchtime=3 - set hlsearch - - autocmd ColorScheme * highlight ExtraWhitespace ctermbg=red guibg=red - - - " save on focus lost - au FocusLost * :wa - - autocmd BufRead *.json set filetype=json - au BufNewFile,BufRead *.mustache set syntax=mustache - - cnoremap SudoWrite w !sudo tee > /dev/null % - - " create Backup/tmp/undo dirs - set backupdir=~/.vim/backup - set directory=~/.vim/tmp - - function! InitBackupDir() - let l:parent = $HOME . '/.vim/' - let l:backup = l:parent . 'backup/' - let l:tmpdir = l:parent . 'tmp/' - let l:undodir= l:parent . 'undo/' - - - if !isdirectory(l:parent) - call mkdir(l:parent) - endif - if !isdirectory(l:backup) - call mkdir(l:backup) - endif - if !isdirectory(l:tmpdir) - call mkdir(l:tmpdir) - endif - if !isdirectory(l:undodir) - call mkdir(l:undodir) - endif - endfunction - call InitBackupDir() - - augroup Binary - " edit binaries in xxd-output, xxd is part of vim - au! - au BufReadPre *.bin let &bin=1 - au BufReadPost *.bin if &bin | %!xxd - au BufReadPost *.bin set ft=xxd | endif - au BufWritePre *.bin if &bin | %!xxd -r - au BufWritePre *.bin endif - au BufWritePost *.bin if &bin | %!xxd - au BufWritePost *.bin set nomod | endif - augroup END - ''; - vimrcConfig.vam.knownPlugins = pkgs.vimPlugins; - vimrcConfig.vam.pluginDictionaries = [ - { names = [ "undotree" ]; } - # vim-nix handles indentation better but does not perform sanity - { names = [ "vim-addon-nix" ]; ft_regex = "^nix\$"; } - ]; - }) - - ]; - programs.bash = { - enableCompletion = true; - interactiveShellInit = '' - HISTCONTROL='erasedups:ignorespace' - HISTSIZE=900001 - HISTFILESIZE=$HISTSIZE - shopt -s checkhash - shopt -s histappend histreedit histverify - shopt -s no_empty_cmd_completion - PS1='\[\e[1;32m\]\w\[\e[0m\] ' - ''; - }; - - services.journald.extraConfig = '' - SystemMaxUse=1G - RuntimeMaxUse=128M - ''; - nix = { - package = pkgs.nixUnstable; - optimise.automatic = true; - useSandbox = true; - gc.automatic = true; - }; - - system.autoUpgrade.enable = true; - - boot.loader.grub.enable = true; - boot.loader.grub.device = "/dev/sda"; - fileSystems."/".options = [ "noatime" "nodiratime" "discard" ]; - - - # gui and stuff - i18n = { - consoleFont = "Lat2-Terminus16"; - consoleKeyMap = "us"; - defaultLocale = "en_US.UTF-8"; - }; - - fonts = { - enableFontDir = true; - enableGhostscriptFonts = true; - fonts = [ pkgs.terminus_font ]; - }; - - time.timeZone = "Europe/Berlin"; - services.timesyncd.enable = true; - - - # GUI - hardware.pulseaudio.enable = true; - services.xserver = { - enable = true; - displayManager.auto.enable = true; - displayManager.auto.user = "shack"; - - desktopManager.xfce.enable = true; - - layout = "us"; - xkbVariant = "altgr-intl"; - xkbOptions = "ctrl:nocaps, eurosign:e"; - }; - - services.openssh = { - enable = true; - hostKeys = [ - { bits = 8192; type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; } - ]; - }; -} diff --git a/machines/shack-autoinstall/source.nix b/machines/shack-autoinstall/source.nix deleted file mode 100644 index 6bef8ad..0000000 --- a/machines/shack-autoinstall/source.nix +++ /dev/null @@ -1,3 +0,0 @@ -{ - name="iso"; -} diff --git a/machines/shack-autoinstall/uefi-partition.sh b/machines/shack-autoinstall/uefi-partition.sh deleted file mode 100644 index 4566b7d..0000000 --- a/machines/shack-autoinstall/uefi-partition.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/sh -set -euf -p(){ - parted -s ${disk} -- $@ -} -p mklabel gpt -p mkpart primary fat32 1M 551M -p set 1 boot on -p mkpart primary linux-swap 51M 4647M -p mkpart primary ext2 4647M 100% -udevadm settle -mkfs.fat -nboot -F32 /dev/sda1 - -udevadm settle -mkswap ${disk}2 -L swap -swapon -L swap -mkfs.ext4 -L nixos ${disk}3 -mount LABEL=nixos /mnt -mkdir /mnt/boot -mount LABEL=boot /mnt/boot - -mkdir -p /mnt/etc/nixos -cp ${./shack-config.nix} /mnt/etc/nixos/configuration.nix -nixos-generate-config --root /mnt diff --git a/machines/shoney/config.nix b/machines/shoney/config.nix deleted file mode 100644 index 27d389b..0000000 --- a/machines/shoney/config.nix +++ /dev/null @@ -1,62 +0,0 @@ -{ config, pkgs, ... }: -let - tinc-siem-ip = "10.8.10.1"; - - ip = "64.137.234.215"; - alt-ip = "64.137.234.210"; # honeydrive honeyd - extra-ip1 = "64.137.234.114"; # floating tinc.siem - extra-ip2 = "64.137.234.232"; # honeydrive - gw = "64.137.234.1"; -in { - imports = [ - <stockholm/makefu> - <stockholm/makefu/2configs/save-diskspace.nix> - <stockholm/makefu/2configs/hw/CAC.nix> - <stockholm/makefu/2configs/fs/CAC-CentOS-7-64bit.nix> - <stockholm/makefu/2configs/tinc/retiolum.nix> - ]; - - - krebs = { - enable = true; - build.host = config.krebs.hosts.shoney; - tinc_graphs = { - enable = true; - network = "siem"; - hostsPath = "/etc/tinc/siem/hosts"; - nginx = { - enable = true; - # TODO: remove hard-coded hostname - anonymous-domain = "localhost.localdomain"; - anonymous.extraConfig = "return 403;"; - complete = { - serverAliases = [ "graph.siem" ]; - extraConfig = '' - if ( $server_addr = "${ip}" ) { - return 403; - } - ''; - }; - }; - }; - }; - makefu.forward-journal = { - enable = true; - src = "10.8.10.1"; - dst = "10.8.10.6"; - }; - networking = { - interfaces.enp2s1.ipv4.addresses = [ - { address = ip; prefixLength = 24; } - # { address = alt-ip; prefixLength = 24; } - ]; - - defaultGateway = gw; - nameservers = [ "8.8.8.8" ]; - firewall = { - trustedInterfaces = [ "tinc.siem" ]; - allowedUDPPorts = [ 655 1655 ]; - allowedTCPPorts = [ 655 1655 ]; - }; - }; -} diff --git a/machines/shoney/source.nix b/machines/shoney/source.nix deleted file mode 100644 index 3616716..0000000 --- a/machines/shoney/source.nix +++ /dev/null @@ -1,3 +0,0 @@ -{ - name="shoney"; -} diff --git a/machines/snake/config.nix b/machines/snake/config.nix deleted file mode 100644 index 69e347d..0000000 --- a/machines/snake/config.nix +++ /dev/null @@ -1,26 +0,0 @@ -{ config, lib, pkgs, ... }: -let - primaryInterface = "eth0"; -in { - imports = [ - <stockholm/makefu> - ./hardware-config.nix - <stockholm/makefu/2configs/home-manager> - <stockholm/makefu/2configs/tools/core.nix> - <stockholm/makefu/2configs/binary-cache/nixos.nix> - - <stockholm/makefu/2configs/home/rhasspy> - # <stockholm/makefu/2configs/hw/pseyecam.nix> - ]; - krebs = { - enable = true; - tinc.retiolum.enable = true; - build.host = config.krebs.hosts.snake; - }; - # ensure disk usage is limited - services.journald.extraConfig = "Storage=volatile"; - networking.firewall.trustedInterfaces = [ primaryInterface ]; - documentation.info.enable = false; - documentation.man.enable = false; - documentation.nixos.enable = false; -} diff --git a/machines/snake/disk.nix b/machines/snake/disk.nix deleted file mode 100644 index f9e1484..0000000 --- a/machines/snake/disk.nix +++ /dev/null @@ -1,64 +0,0 @@ -{ disks ? [ "/dev/sda" ], ... }: { - disk = { - x = { - type = "disk"; - device = "/dev/sda"; - content = { - type = "table"; - format = "gpt"; - partitions = [ - { - name = "boot"; - type = "partition"; - start = "0"; - end = "1M"; - part-type = "primary"; - flags = ["bios_grub"]; - } - { - type = "partition"; - name = "ESP"; - start = "1M"; - end = "512MiB"; - fs-type = "fat32"; - bootable = true; - content = { - type = "filesystem"; - format = "vfat"; - mountpoint = "/boot"; - }; - } - { - type = "partition"; - name = "zfs"; - start = "512MiB"; - end = "100%"; - content = { - type = "zfs"; - pool = "zroot"; - }; - } - ]; - }; - }; - }; - zpool = { - zroot = { - type = "zpool"; - rootFsOptions.compression = "lz4"; - mountpoint = "/"; - - datasets = { - home = { - zfs_type = "filesystem"; - mountpoint = "/home"; - options.mountpoint = "legacy"; - }; - reserved = { - zfs_type = "filesystem"; - options.refreservation = "1G"; - }; - }; - }; - }; -} diff --git a/machines/snake/hardware-config.nix b/machines/snake/hardware-config.nix deleted file mode 100644 index de3607e..0000000 --- a/machines/snake/hardware-config.nix +++ /dev/null @@ -1,23 +0,0 @@ -{ pkgs, lib, ... }: -{ - imports = [ - <nixpkgs/nixos/modules/installer/scan/not-detected.nix> - ./wifi.nix - ./sound.nix - ]; - boot.loader.grub.enable = true; - boot.loader.grub.efiSupport = true; - boot.loader.grub.device = "/dev/sda"; - boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "sd_mod" ]; - boot.kernelModules = [ "kvm-amd" ]; - disko.devices = import ./disk.nix; - - hardware.enableRedistributableFirmware = true; - hardware.cpu.amd.updateMicrocode = true; - nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; - powerManagement.cpuFreqGovernor = lib.mkDefault "ondemand"; - - boot.kernelParams = [ "net.ifnames=0" ]; - networking.hostId = "0123AABB"; - -} diff --git a/machines/snake/sound.nix b/machines/snake/sound.nix deleted file mode 100644 index 452f4b4..0000000 --- a/machines/snake/sound.nix +++ /dev/null @@ -1,51 +0,0 @@ -{ lib, ... }: { - imports = [ - <stockholm/makefu/2configs/gui/snake-kiosk.nix> - ]; - nixpkgs.config.allowUnfree = true; - networking.networkmanager.enable = lib.mkForce false; - # sound.enable = true; - #hardware.pulseaudio = { - # enable = true; - # systemWide = true; - # tcp = { - # enable = true; - # anonymousClients.allowAll = true; - # }; - #}; - - #users.users.makefu = { - # extraGroups = [ "pipewire" "audio" ]; - #}; - - - #services.xserver = { - # enable = true; - # # desktopManager.xterm.enable = true; - # desktopManager.xfce = { - # enable = true; - # noDesktop = true; - # }; - - # displayManager.autoLogin = { - # enable = true; - # user = "makefu"; - # }; - #}; - hardware.pulseaudio.enable = lib.mkForce false; - security.rtkit.enable = true; - #services.pipewire = { - # enable = true; - # systemWide = true; - # socketActivation = false; - # alsa.enable = true; - # alsa.support32Bit = true; - # pulse.enable = true; - # config.pipewire-pulse = { - # "pulse.properties"."server.address" = [ "unix:native" "tcp:4713" ]; - # }; - - #}; - - -} diff --git a/machines/snake/source.nix b/machines/snake/source.nix deleted file mode 100644 index 8fc2fff..0000000 --- a/machines/snake/source.nix +++ /dev/null @@ -1,6 +0,0 @@ -{ - name="cake"; - full = true; - home-manager = true; - hw = true; -} diff --git a/machines/snake/wifi.nix b/machines/snake/wifi.nix deleted file mode 100644 index 7e15690..0000000 --- a/machines/snake/wifi.nix +++ /dev/null @@ -1,6 +0,0 @@ -{ - networking.wireless = { - enable = true; - networks = import <secrets/wifi.nix>; - }; -} diff --git a/machines/studio/config.nix b/machines/studio/config.nix deleted file mode 100644 index 841e32c..0000000 --- a/machines/studio/config.nix +++ /dev/null @@ -1,75 +0,0 @@ -{ config, pkgs, ... }: -{ - imports = [ - <stockholm/makefu> - <stockholm/makefu/2configs/vncserver.nix> - <stockholm/makefu/2configs/disable_v6.nix> - <stockholm/makefu/2configs/audio/jack-on-pulse.nix> - <stockholm/makefu/2configs/audio/realtime-audio.nix> - <stockholm/makefu/2configs/gui/studio.nix> - <stockholm/makefu/2configs/binary-cache/lass.nix> - - ]; - makefu.gui.user = "user"; # we use an extra user - krebs = { - enable = true; - tinc.retiolum.enable = true; - build.host = config.krebs.hosts.studio; - }; - networking.firewall.allowedTCPPorts = [ 655 ]; - networking.firewall.allowedUDPPorts = [ 655 ]; - - - environment.systemPackages = with pkgs;[ - # audio foo - ## pulseaudio - pavucontrol - paprefs - pamixer - - # extra alsa tools - alsa-hdspconf - alsa-hdspmixer - alsa-hdsploader - - # recording - darkice - (mumble.override { jackSupport = true; }) - - # browsing - firefox - chromium - ]; - - - nixpkgs.config.allowUnfree = true; - fonts = { - enableCoreFonts = true; - enableFontDir = true; - enableGhostscriptFonts = true; - fonts = [ ]; - }; - # ingos favorite display manager - - - # hardware - boot.loader.grub.enable = true; - boot.loader.grub.device = "/dev/sda"; - - boot.initrd.availableKernelModules = [ "uhci_hcd" "ehci_pci" "ata_piix" "usb_storage" "sd_mod" ]; - boot.kernelModules = [ ]; - boot.extraModulePackages = [ ]; - - fileSystems."/" = { - device = "/dev/disk/by-uuid/0aeda516-230e-4c54-9e27-13515c2f3f21"; - fsType = "ext4"; - }; - - swapDevices = [ { device = "/dev/disk/by-uuid/1914af67-5a8f-41d3-a1c2-211c39605da9"; } ]; - users.users.user = { - isNormalUser = true; - extraGroups = [ "wheel" "audio" ]; - uid = 1000; - openssh.authorizedKeys.keys = [ config.krebs.users.makefu.pubkey ]; - }; -} diff --git a/machines/studio/source.nix b/machines/studio/source.nix deleted file mode 100644 index ff88d35..0000000 --- a/machines/studio/source.nix +++ /dev/null @@ -1,4 +0,0 @@ -{ - name="studio"; - musnix = true; -} diff --git a/machines/vbob/config.nix b/machines/vbob/config.nix deleted file mode 100644 index 208dd1f..0000000 --- a/machines/vbob/config.nix +++ /dev/null @@ -1,91 +0,0 @@ -{ lib, config, pkgs, ... }: -{ - krebs.build.host = config.krebs.hosts.vbob; - makefu.awesome.modkey = "Mod1"; - imports = - [ - <stockholm/makefu> - { - imports = [<stockholm/makefu/2configs/fs/single-partition-ext4.nix> ]; - boot.loader.grub.device = "/dev/sda"; - } - # <stockholm/makefu/2configs/hw/vbox-guest.nix> - # <nixpkgs/nixos/modules/virtualisation/qemu-vm.nix> - - # base gui - # <stockholm/makefu/2configs/main-laptop.nix> - # <stockholm/makefu/2configs/tools/core-gui.nix> - - <stockholm/makefu/2configs/zsh-user.nix> - - # security - <stockholm/makefu/2configs/sshd-totp.nix> - - # Tools - <stockholm/makefu/2configs/tools/core.nix> - <stockholm/makefu/2configs/tools/dev.nix> - # <stockholm/makefu/2configs/tools/extra-gui.nix> - # <stockholm/makefu/2configs/tools/sec.nix> - - # environment - <stockholm/makefu/2configs/tinc/retiolum.nix> - (let - gum-ip = config.krebs.hosts.gum.nets.internet.ip4.addr; - gateway = "10.0.2.2"; - in { - # make sure the route to gum gets added after the network is online - systemd.services.wireguard-wg0.after = [ "network-online.target" ]; - networking.wireguard.interfaces.wg0 = { - ips = [ "10.244.0.3/24" ]; - privateKeyFile = (toString <secrets>) + "/wireguard.key"; - # explicit route via eth0 to gum - preSetup = ["${pkgs.iproute}/bin/ip route add ${gum-ip} via ${gateway}"]; - peers = [ - { # gum - endpoint = "${gum-ip}:51820"; - allowedIPs = [ "0.0.0.0/0" "10.244.0.0/24" ]; - publicKey = "yAKvxTvcEVdn+MeKsmptZkR3XSEue+wSyLxwcjBYxxo="; - persistentKeepalive = 25; - } - ]; - }; - }) - - ]; - networking.extraHosts = import (toString <secrets/extra-hosts.nix>); - - # allow vbob to deploy self - users.extraUsers.root.openssh.authorizedKeys.keys = [ config.krebs.users.makefu-vbob.pubkey ]; - - environment.shellAliases = { - forti = "cat ~/vpn/pw.txt | xclip; sudo forticlientsslvpn"; - }; - - system.activationScripts.prepare-fortclientvpnssl = '' - # TODO: for forticlientsslpn - mkdir -p /usr/{s,}bin - ln -fs ${pkgs.ppp}/bin/pppd /usr/sbin/pppd - ln -fs ${pkgs.coreutils}/bin/tail /usr/bin/tail - ''; - - # for forticlient - nixpkgs.config.allowUnfree = true; - - environment.systemPackages = with pkgs;[ - fortclientsslvpn ppp xclip - get - logstash - #devpi-web - #devpi-client - ansible - ]; - - - networking.firewall.allowedTCPPorts = [ - 25 - 80 - 8010 - ]; - # required for qemu - systemd.services."serial-getty@ttyS0".enable = true; -} diff --git a/machines/vbob/source.nix b/machines/vbob/source.nix deleted file mode 100644 index 59744fa..0000000 --- a/machines/vbob/source.nix +++ /dev/null @@ -1,4 +0,0 @@ -{ - name="vbob"; - # musnix = true; -} diff --git a/machines/wry/config.nix b/machines/wry/config.nix deleted file mode 100644 index abeb7d8..0000000 --- a/machines/wry/config.nix +++ /dev/null @@ -1,54 +0,0 @@ -{ config, lib, pkgs, ... }: - -with pkgs.stockholm.lib; -let - - external-ip = config.krebs.build.host.nets.internet.ip4.addr; - internal-ip = config.krebs.build.host.nets.retiolum.ip4.addr; -in { - imports = [ - <stockholm/makefu> - # TODO: copy this config or move to krebs - <stockholm/makefu/2configs/hw/CAC.nix> - <stockholm/makefu/2configs/fs/CAC-CentOS-7-64bit.nix> - <stockholm/makefu/2configs/save-diskspace.nix> - - # <stockholm/makefu/2configs/bepasty-dual.nix> - - <stockholm/makefu/2configs/iodined.nix> - <stockholm/makefu/2configs/backup.nix> - - # other nginx - # <stockholm/makefu/2configs/nginx/euer.test.nix> - - # collectd - <stockholm/makefu/2configs/stats/client.nix> - <stockholm/makefu/2configs/logging/client.nix> - - <stockholm/makefu/2configs/tinc/retiolum.nix> - # <stockholm/makefu/2configs/torrent.nix> - ]; - - krebs.build.host = config.krebs.hosts.wry; - - # prepare graphs - services.nginx.enable = true; - krebs.retiolum-bootstrap.enable = true; - - networking = { - firewall = { - allowPing = true; - logRefusedConnections = false; - allowedTCPPorts = [ 53 80 443 ]; - allowedUDPPorts = [ 655 53 ]; - }; - interfaces.enp2s1.ipv4.addresses = [{ - address = external-ip; - prefixLength = 24; - }]; - defaultGateway = "104.233.87.1"; - nameservers = [ "8.8.8.8" ]; - }; - - environment.systemPackages = [ pkgs.screen ]; -} diff --git a/machines/wry/source.nix b/machines/wry/source.nix deleted file mode 100644 index 7303005..0000000 --- a/machines/wry/source.nix +++ /dev/null @@ -1,3 +0,0 @@ -{ - name="wry"; -}