Merge branch 'makefu'
This commit is contained in:
commit
a9f6f7ac7b
Makefiledefault.nix
krebs
makefu
1systems
2configs
tv
19
Makefile
19
Makefile
|
@ -2,7 +2,7 @@
|
|||
# usage:
|
||||
# make system=foo
|
||||
# make systems='foo bar'
|
||||
# make eval system=foo get=config.networking.extraHosts [filter=json]
|
||||
# make eval get=tv.wu.config.time.timeZone [filter=json]
|
||||
#
|
||||
|
||||
.ONESHELL:
|
||||
|
@ -10,20 +10,19 @@
|
|||
|
||||
ifdef systems
|
||||
$(systems):
|
||||
@
|
||||
parallel \
|
||||
--line-buffer \
|
||||
-j0 \
|
||||
--no-notice \
|
||||
--tagstring {} \
|
||||
-q make systems= system={} ::: $(systems)
|
||||
-q make -s systems= system={} ::: $(systems)
|
||||
else ifdef system
|
||||
.PHONY: deploy
|
||||
deploy:;@
|
||||
make -s eval system=$(system) get=config.krebs.build.script filter=json | sh
|
||||
|
||||
.PHONY: infest
|
||||
infest:;@
|
||||
make -s eval system=$(system) get=config.krebs.build.infest filter=json | sh
|
||||
.PHONY: deploy infest
|
||||
deploy infest:;@
|
||||
export get=$$LOGNAME.${system}.config.krebs.build.scripts.$@
|
||||
export filter=json
|
||||
make -s eval | sh
|
||||
|
||||
.PHONY: eval
|
||||
eval:
|
||||
|
@ -41,7 +40,7 @@ endif
|
|||
-A "$$get" \
|
||||
'<stockholm>' \
|
||||
--argstr user-name "$$LOGNAME" \
|
||||
--argstr system-name "$$system" \
|
||||
--argstr host-name "$$HOSTNAME" \
|
||||
| filter
|
||||
else
|
||||
$(error unbound variable: system[s])
|
||||
|
|
83
default.nix
83
default.nix
|
@ -1,26 +1,81 @@
|
|||
{ user-name, system-name }:
|
||||
{ user-name, host-name }:
|
||||
|
||||
let
|
||||
lib = import <nixpkgs/lib>;
|
||||
|
||||
eval = import <nixpkgs/nixos/lib/eval-config.nix> {
|
||||
krebs-modules-path = ./krebs/3modules;
|
||||
krebs-pkgs-path = ./krebs/5pkgs;
|
||||
user-modules-path = ./. + "/${user-name}/3modules";
|
||||
user-pkgs-path = ./. + "/${user-name}/5pkgs";
|
||||
|
||||
out =
|
||||
(lib.mapAttrs (k: v: mk-namespace (./. + "/${k}"))
|
||||
(lib.filterAttrs
|
||||
(k: v: !lib.hasPrefix "." k && v == "directory")
|
||||
(builtins.readDir ./.)));
|
||||
|
||||
eval = path: import <nixpkgs/nixos/lib/eval-config.nix> {
|
||||
system = builtins.currentSystem;
|
||||
modules = map (p: ./. + "/${p}") [
|
||||
"${user-name}/1systems/${system-name}.nix"
|
||||
"${user-name}/3modules"
|
||||
"krebs/3modules"
|
||||
modules = [
|
||||
({ config, ... }:
|
||||
with import ./krebs/4lib { inherit lib; };
|
||||
{
|
||||
options.krebs.exec.host = mkOption {
|
||||
type = types.host;
|
||||
default = config.krebs.hosts.${host-name};
|
||||
};
|
||||
options.krebs.exec.user = mkOption {
|
||||
type = types.user;
|
||||
default = config.krebs.users.${user-name};
|
||||
};
|
||||
}
|
||||
)
|
||||
path
|
||||
krebs-modules-path
|
||||
user-modules-path
|
||||
] ++ [
|
||||
({ lib, pkgs, ... }: {
|
||||
({ config, lib, pkgs, ... }@args: {
|
||||
_module.args.pkgs =
|
||||
(import ./krebs/5pkgs { inherit lib pkgs; }) //
|
||||
(import (./. + "/${user-name}/5pkgs") { inherit lib pkgs; });
|
||||
(import krebs-pkgs-path args) //
|
||||
(import user-pkgs-path args);
|
||||
})
|
||||
];
|
||||
};
|
||||
|
||||
in
|
||||
mk-namespace = path: mapNixDir mk-system (path + "/1systems");
|
||||
|
||||
{
|
||||
inherit (eval) config options;
|
||||
mk-system = path: rec {
|
||||
inherit (eval path) config options;
|
||||
system = config.system.build.toplevel;
|
||||
fetch = import ./krebs/0tools/fetch.nix { inherit config lib; };
|
||||
};
|
||||
|
||||
system = eval.config.system.build.toplevel;
|
||||
}
|
||||
mapNixDir = f: path: lib.mapAttrs (_: f) (nixDir path);
|
||||
|
||||
nixDir = path:
|
||||
builtins.listToAttrs
|
||||
(catMaybes
|
||||
(lib.mapAttrsToList
|
||||
(k: v: {
|
||||
directory =
|
||||
let p = path + "/${k}/default.nix"; in
|
||||
if builtins.pathExists p
|
||||
then Just (lib.nameValuePair k p)
|
||||
else Nothing;
|
||||
regular =
|
||||
let p = path + "/${k}"; in
|
||||
if lib.hasSuffix ".nix" p
|
||||
then Just (lib.nameValuePair (lib.removeSuffix ".nix" k) p)
|
||||
else Nothing;
|
||||
}.${v} or Nothing)
|
||||
(builtins.readDir path)));
|
||||
|
||||
# TODO move to lib
|
||||
Just = x: { type = "maybe"; value = x; };
|
||||
Nothing = { type = "maybe"; };
|
||||
isMaybe = x: builtins.typeOf x == "set" && x.type or false == "maybe";
|
||||
isJust = x: isMaybe x && builtins.hasAttr "value" x;
|
||||
fromJust = x: assert isJust x; x.value;
|
||||
catMaybes = xs: map fromJust (builtins.filter isJust xs);
|
||||
|
||||
in out
|
||||
|
|
269
krebs/3modules/build/default.nix
Normal file
269
krebs/3modules/build/default.nix
Normal file
|
@ -0,0 +1,269 @@
|
|||
{ config, lib, ... }:
|
||||
|
||||
with import ../../4lib { inherit lib; };
|
||||
|
||||
let
|
||||
target = config.krebs.build // { user.name = "root"; };
|
||||
|
||||
out = {
|
||||
# TODO deprecate krebs.build.host
|
||||
options.krebs.build.host = mkOption {
|
||||
type = types.host;
|
||||
};
|
||||
|
||||
# TODO make krebs.build.profile shell safe
|
||||
options.krebs.build.profile = mkOption {
|
||||
type = types.str;
|
||||
default = "/nix/var/nix/profiles/system";
|
||||
};
|
||||
|
||||
# TODO make krebs.build.target.host :: host
|
||||
options.krebs.build.target = mkOption {
|
||||
type = with types; nullOr str;
|
||||
default = null;
|
||||
};
|
||||
|
||||
# TODO deprecate krebs.build.user
|
||||
options.krebs.build.user = mkOption {
|
||||
type = types.user;
|
||||
};
|
||||
|
||||
options.krebs.build.scripts.deploy = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = ''
|
||||
set -efu
|
||||
(${config.krebs.build.scripts._source})
|
||||
${ssh-target ''
|
||||
${config.krebs.build.scripts._nix-env}
|
||||
${config.krebs.build.profile}/bin/switch-to-configuration switch
|
||||
''}
|
||||
echo OK
|
||||
'';
|
||||
};
|
||||
|
||||
options.krebs.build.scripts.infest = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = ''
|
||||
set -efu
|
||||
|
||||
export RSYNC_RSH; RSYNC_RSH="$(type -p ssh) \
|
||||
-o 'HostName ${target.host.infest.addr}' \
|
||||
-o 'Port ${toString target.host.infest.port}' \
|
||||
"
|
||||
ssh() {
|
||||
eval "$RSYNC_RSH \"\$@\""
|
||||
}
|
||||
|
||||
${ssh-target ''
|
||||
${readFile ./infest/prepare.sh}
|
||||
${readFile ./infest/install-nix.sh}
|
||||
''}
|
||||
|
||||
(${config.krebs.build.scripts._source})
|
||||
|
||||
${ssh-target ''
|
||||
export PATH; PATH=/root/.nix-profile/bin:$PATH
|
||||
|
||||
src=$(type -p nixos-install)
|
||||
cat_src() {
|
||||
sed < "$src" "$(
|
||||
sed < "$src" -n '
|
||||
/^if ! test -e "\$mountPoint\/\$NIXOS_CONFIG/,/^fi$/=
|
||||
/^nixpkgs=/=
|
||||
/^NIX_PATH=/,/^$/{/./=}
|
||||
' \
|
||||
| sed 's:$:s/^/#krebs#/:'
|
||||
)"
|
||||
}
|
||||
|
||||
# Location to insert config.krebs.build.scripts._nix-env
|
||||
i=$(sed -n '/^echo "building the system configuration/=' "$src")
|
||||
|
||||
{
|
||||
cat_src | sed -n "1,$i{p}"
|
||||
cat ${doc config.krebs.build.scripts._nix-env}
|
||||
cat_src | sed -n "$i,\''${$i!p}"
|
||||
} > nixos-install
|
||||
chmod +x nixos-install
|
||||
|
||||
# Wrap inserted config.krebs.build.scripts._nix-env into chroot.
|
||||
nix_env=$(cat_src | sed -n '
|
||||
s:.*\(/nix/store/[a-z0-9]*-nix-[0-9.]\+/bin/nix-env\).*:\1:p;T;q
|
||||
')
|
||||
echo nix-env is $nix_env
|
||||
sed -i '
|
||||
s:^nix-env:chroot $mountPoint '"$nix_env"':
|
||||
' nixos-install
|
||||
|
||||
./nixos-install
|
||||
|
||||
${readFile ./infest/finalize.sh}
|
||||
''}
|
||||
'';
|
||||
};
|
||||
|
||||
options.krebs.build.scripts._nix-env = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = ''
|
||||
set -efu
|
||||
NIX_PATH=${config.krebs.build.source.NIX_PATH} \
|
||||
nix-env \
|
||||
-f '<stockholm>' \
|
||||
-Q \
|
||||
--argstr user-name ${config.krebs.exec.user.name} \
|
||||
--argstr host-name ${target.host.name} \
|
||||
--profile ${config.krebs.build.profile} \
|
||||
--set \
|
||||
-A ${lib.escapeShellArg (lib.concatStringsSep "." [
|
||||
config.krebs.build.user.name
|
||||
config.krebs.build.host.name
|
||||
"system"
|
||||
])}
|
||||
'';
|
||||
};
|
||||
|
||||
options.krebs.build.scripts._source = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = ''
|
||||
set -efu
|
||||
${
|
||||
lib.concatStringsSep "\n"
|
||||
(lib.mapAttrsToList
|
||||
(name: { scripts, url, ... }: "(${scripts._source})")
|
||||
(config.krebs.build.source.dir //
|
||||
config.krebs.build.source.git))
|
||||
}
|
||||
'';
|
||||
};
|
||||
|
||||
options.krebs.build.source.NIX_PATH = mkOption {
|
||||
type = types.str;
|
||||
default =
|
||||
lib.concatStringsSep ":"
|
||||
(lib.mapAttrsToList (name: _: "${name}=/root/${name}")
|
||||
(config.krebs.build.source.dir //
|
||||
config.krebs.build.source.git));
|
||||
};
|
||||
|
||||
options.krebs.build.source.dir = mkOption {
|
||||
type =
|
||||
let
|
||||
exec = config.krebs.exec;
|
||||
in
|
||||
types.attrsOf (types.submodule ({ config, ... }:
|
||||
let
|
||||
url = "file://${config.host.name}${config.path}";
|
||||
|
||||
can-link = config.host.name == target.host.name;
|
||||
can-push = config.host.name == exec.host.name;
|
||||
|
||||
push-method = ''
|
||||
rsync \
|
||||
--exclude .git \
|
||||
--exclude .graveyard \
|
||||
--exclude old \
|
||||
--exclude tmp \
|
||||
--rsync-path='mkdir -p ${config.target-path} && rsync' \
|
||||
--delete-excluded \
|
||||
-vrLptgoD \
|
||||
${config.path}/ \
|
||||
${target.user.name}@${target.host.name}:${config.target-path}
|
||||
'';
|
||||
in
|
||||
{
|
||||
options = {
|
||||
host = mkOption {
|
||||
type = types.host;
|
||||
description = ''
|
||||
define the host where the directory is stored on.
|
||||
XXX: currently it is just used to check if rsync is working,
|
||||
becomes part of url
|
||||
'';
|
||||
};
|
||||
path = mkOption {
|
||||
type = types.str;
|
||||
};
|
||||
scripts._source = mkOption {
|
||||
type = types.str;
|
||||
default =
|
||||
#if can-link then link-method else
|
||||
if can-push then push-method else
|
||||
throw "cannot source ${url}";
|
||||
};
|
||||
target-path = mkOption {
|
||||
type = types.str;
|
||||
default = "/root/${config._module.args.name}";
|
||||
};
|
||||
url = mkOption {
|
||||
type = types.str;
|
||||
default = "file://${config.host.name}${config.path}";
|
||||
};
|
||||
};
|
||||
}
|
||||
));
|
||||
default = {};
|
||||
};
|
||||
|
||||
options.krebs.build.source.git = mkOption {
|
||||
type =
|
||||
let
|
||||
target = config.krebs.build // { user.name = "root"; };
|
||||
in
|
||||
with types; attrsOf (submodule ({ config, ... }:
|
||||
{
|
||||
options = {
|
||||
url = mkOption {
|
||||
type = types.str; # TODO must be shell safe
|
||||
};
|
||||
rev = mkOption {
|
||||
type = types.str;
|
||||
};
|
||||
scripts._source = mkOption {
|
||||
type = types.str;
|
||||
default = ssh-target ''
|
||||
mkdir -p ${config.target-path}
|
||||
cd ${config.target-path}
|
||||
if ! test -e .git; then
|
||||
git init
|
||||
fi
|
||||
if ! cur_url=$(git config remote.origin.url 2>/dev/null); then
|
||||
git remote add origin ${config.url}
|
||||
elif test "$cur_url" != ${config.url}; then
|
||||
git remote set-url origin ${config.url}
|
||||
fi
|
||||
if test "$(git rev-parse --verify HEAD 2>/dev/null)" != ${config.rev}; then
|
||||
git fetch origin
|
||||
git checkout ${config.rev} -- .
|
||||
git checkout -q ${config.rev}
|
||||
git submodule init
|
||||
git submodule update
|
||||
fi
|
||||
git clean -dxf
|
||||
'';
|
||||
};
|
||||
target-path = mkOption {
|
||||
type = types.str;
|
||||
default = "/root/${config._module.args.name}";
|
||||
};
|
||||
};
|
||||
}
|
||||
));
|
||||
default = {};
|
||||
};
|
||||
};
|
||||
|
||||
doc = s:
|
||||
let b = "EOF${hashString "sha256" s}"; in
|
||||
''
|
||||
<<\${b}
|
||||
${s}
|
||||
${b}
|
||||
'';
|
||||
|
||||
ssh-target = script:
|
||||
"ssh root@${target.host.name} -T ${doc ''
|
||||
set -efu
|
||||
${script}
|
||||
''}";
|
||||
|
||||
in out
|
|
@ -7,7 +7,7 @@ set -eux
|
|||
umount /mnt || [ $? -eq 32 ]
|
||||
umount /boot || [ $? -eq 32 ]
|
||||
|
||||
PATH=$(for i in /nix/store/*coreutils*/bin; do :; done; echo $i)
|
||||
PATH=$(set +f; for i in /nix/store/*coreutils*/bin; do :; done; echo $i)
|
||||
export PATH
|
||||
|
||||
mkdir /oldshit
|
|
@ -2,9 +2,9 @@
|
|||
set -efu
|
||||
|
||||
nix_url=https://nixos.org/releases/nix/nix-1.10/nix-1.10-x86_64-linux.tar.bz2
|
||||
nix_sha256="504f7a3a85fceffb8766ae5e1005de9e02e489742f5a63cc3e7552120b138bf4"
|
||||
nix_sha256=504f7a3a85fceffb8766ae5e1005de9e02e489742f5a63cc3e7552120b138bf4
|
||||
|
||||
install-nix() {(
|
||||
install_nix() {(
|
||||
|
||||
# install nix on host (cf. https://nixos.org/nix/install)
|
||||
if ! test -e /root/.nix-profile/etc/profile.d/nix.sh; then
|
||||
|
@ -23,7 +23,7 @@ install-nix() {(
|
|||
$nix_src_dir/install
|
||||
fi
|
||||
|
||||
#TODO: make this general or move to 1prepare
|
||||
#TODO: make this general or move to prepare
|
||||
if ! mount | grep -Fq '/dev/mapper/centos-root on /mnt/nix type xfs'; then
|
||||
mkdir -p /mnt/nix
|
||||
mount --bind /nix /mnt/nix
|
||||
|
@ -54,4 +54,4 @@ install-nix() {(
|
|||
fi
|
||||
)}
|
||||
|
||||
install-nix "$@"
|
||||
install_nix "$@"
|
|
@ -6,6 +6,7 @@ let
|
|||
|
||||
out = {
|
||||
imports = [
|
||||
./build
|
||||
./exim-retiolum.nix
|
||||
./exim-smarthost.nix
|
||||
./github-hosts-sync.nix
|
||||
|
@ -22,225 +23,6 @@ let
|
|||
api = {
|
||||
enable = mkEnableOption "krebs";
|
||||
|
||||
build = mkOption {
|
||||
type = types.submodule ({ config, ... }: {
|
||||
options = {
|
||||
target = mkOption {
|
||||
type = with types; nullOr str;
|
||||
default = null;
|
||||
};
|
||||
deps = mkOption {
|
||||
type = with types; attrsOf (submodule {
|
||||
options = {
|
||||
url = mkOption {
|
||||
type = str;
|
||||
};
|
||||
rev = mkOption {
|
||||
type = nullOr str;
|
||||
default = null;
|
||||
};
|
||||
};
|
||||
});
|
||||
default = {};
|
||||
};
|
||||
script = mkOption {
|
||||
type = types.str;
|
||||
default = ''
|
||||
#! /bin/sh
|
||||
set -efux
|
||||
|
||||
target=${escapeShellArg cfg.build.target}
|
||||
|
||||
push(){(
|
||||
src=$1/
|
||||
dst=$target:$2
|
||||
rsync \
|
||||
--exclude .git \
|
||||
--exclude .graveyard \
|
||||
--exclude old \
|
||||
--rsync-path="mkdir -p \"$2\" && rsync" \
|
||||
--delete-excluded \
|
||||
-vrLptgoD \
|
||||
"$src" "$dst"
|
||||
)}
|
||||
|
||||
${concatStrings (mapAttrsToList (name: { url, rev, ... }:
|
||||
optionalString (rev == null) ''
|
||||
push ${toString (map escapeShellArg [
|
||||
"${url}"
|
||||
"/root/src/${name}"
|
||||
])}
|
||||
'') config.deps)}
|
||||
|
||||
exec ssh -S none "$target" /bin/sh <<\EOF
|
||||
set -efux
|
||||
fetch(){(
|
||||
url=$1
|
||||
rev=$2
|
||||
dst=$3
|
||||
mkdir -p "$dst"
|
||||
cd "$dst"
|
||||
if ! test -e .git; then
|
||||
git init
|
||||
fi
|
||||
if ! cur_url=$(git config remote.origin.url 2>/dev/null); then
|
||||
git remote add origin "$url"
|
||||
elif test "$cur_url" != "$url"; then
|
||||
git remote set-url origin "$url"
|
||||
fi
|
||||
if test "$(git rev-parse --verify HEAD 2>/dev/null)" != "$rev"; then
|
||||
git fetch origin
|
||||
git checkout "$rev" -- .
|
||||
git checkout -q "$rev"
|
||||
git submodule init
|
||||
git submodule update
|
||||
fi
|
||||
git clean -dxf
|
||||
)}
|
||||
|
||||
${concatStrings (mapAttrsToList (name: { url, rev, ... }:
|
||||
optionalString (rev != null) ''
|
||||
fetch ${toString (map escapeShellArg [
|
||||
url
|
||||
rev
|
||||
"/root/src/${name}"
|
||||
])}
|
||||
'') config.deps)}
|
||||
|
||||
echo build system...
|
||||
profile=/nix/var/nix/profiles/system
|
||||
NIX_PATH=/root/src \
|
||||
nix-env \
|
||||
-Q \
|
||||
-p "$profile" \
|
||||
-f '<stockholm>' \
|
||||
--set \
|
||||
-A system \
|
||||
--argstr user-name ${escapeShellArg cfg.build.user.name} \
|
||||
--argstr system-name ${escapeShellArg cfg.build.host.name}
|
||||
|
||||
exec "$profile"/bin/switch-to-configuration switch
|
||||
EOF
|
||||
|
||||
'';
|
||||
};
|
||||
infest = mkOption {
|
||||
type = types.str;
|
||||
default = ''
|
||||
#! /bin/sh
|
||||
set -efux
|
||||
|
||||
target=${escapeShellArg cfg.build.target}
|
||||
|
||||
push(){(
|
||||
src=$1/
|
||||
dst=$target:/mnt$2
|
||||
rsync \
|
||||
--exclude .git \
|
||||
--exclude .graveyard \
|
||||
--exclude old \
|
||||
--rsync-path="mkdir -p \"/mnt$2\" && rsync" \
|
||||
--delete-excluded \
|
||||
-vrLptgoD \
|
||||
"$src" "$dst"
|
||||
)}
|
||||
|
||||
cat krebs/4lib/infest/1prepare | ssh "$target"
|
||||
cat krebs/4lib/infest/2install-nix | ssh "$target"
|
||||
|
||||
${concatStrings (mapAttrsToList (name: { url, rev, ... }:
|
||||
optionalString (rev == null) ''
|
||||
push ${toString (map escapeShellArg [
|
||||
"${url}"
|
||||
"/root/src/${name}"
|
||||
])}
|
||||
'') config.deps)}
|
||||
|
||||
ssh -S none "$target" /bin/sh <<\EOF
|
||||
set -efux
|
||||
|
||||
fetch(){(
|
||||
url=$1
|
||||
rev=$2
|
||||
dst=$3
|
||||
mkdir -p "$dst"
|
||||
cd "$dst"
|
||||
if ! test -e .git; then
|
||||
git init
|
||||
fi
|
||||
if ! cur_url=$(git config remote.origin.url 2>/dev/null); then
|
||||
git remote add origin "$url"
|
||||
elif test "$cur_url" != "$url"; then
|
||||
git remote set-url origin "$url"
|
||||
fi
|
||||
if test "$(git rev-parse --verify HEAD 2>/dev/null)" != "$rev"; then
|
||||
git fetch origin
|
||||
git checkout "$rev" -- .
|
||||
git checkout -q "$rev"
|
||||
git submodule init
|
||||
git submodule update
|
||||
fi
|
||||
git clean -dxf
|
||||
)}
|
||||
|
||||
${concatStrings (mapAttrsToList (name: { url, rev, ... }:
|
||||
optionalString (rev != null) ''
|
||||
fetch ${toString (map escapeShellArg [
|
||||
url
|
||||
rev
|
||||
"/mnt/root/src/${name}"
|
||||
])}
|
||||
'') config.deps)}
|
||||
|
||||
export PATH=/root/.nix-profile/bin:/root/.nix-profile/sbin:$PATH
|
||||
|
||||
sed < "$(type -p nixos-install)" > nixos-install '
|
||||
/^echo "building the system configuration..."/,/--set -A system/{
|
||||
s/.*/# &/
|
||||
s@.*--set -A system.*@&\n${concatStringsSep " " [
|
||||
"NIX_PATH=/mnt/root/src/"
|
||||
"nix-env"
|
||||
"-Q"
|
||||
"-p /nix/var/nix/profiles/system"
|
||||
"-f \"<stockholm>\""
|
||||
"--set"
|
||||
"-A system"
|
||||
"--argstr user-name ${escapeShellArg cfg.build.user.name}"
|
||||
"--argstr system-name ${escapeShellArg cfg.build.host.name}"
|
||||
]}@
|
||||
}
|
||||
'
|
||||
|
||||
sed -i 's/^nixpkgs=.*$/#&/' nixos-install
|
||||
|
||||
|
||||
chmod +x nixos-install
|
||||
|
||||
echo {} > /root/dummy.nix
|
||||
|
||||
echo build system...
|
||||
profile=/nix/var/nix/profiles/system
|
||||
NIXOS_CONFIG=/root/dummy.nix \
|
||||
./nixos-install -I /root/src/
|
||||
#nl -bp nixos-install
|
||||
|
||||
EOF
|
||||
|
||||
cat krebs/4lib/infest/4finalize | ssh "$target"
|
||||
'';
|
||||
};
|
||||
host = mkOption {
|
||||
type = types.host;
|
||||
};
|
||||
user = mkOption {
|
||||
type = types.user;
|
||||
};
|
||||
};
|
||||
});
|
||||
# Define defaul value, so unset values of the submodule get reported.
|
||||
default = {};
|
||||
};
|
||||
|
||||
dns = {
|
||||
providers = mkOption {
|
||||
# TODO with types; tree dns.label dns.provider, so we can merge.
|
||||
|
@ -537,8 +319,8 @@ let
|
|||
|
||||
extraZones = {
|
||||
"krebsco.de" = ''
|
||||
mediengewitter IN A ${elemAt nets.internet.addrs4 0}
|
||||
flap IN A ${elemAt nets.internet.addrs4 0}'';
|
||||
mediengewitter IN A ${head nets.internet.addrs4}
|
||||
flap IN A ${head nets.internet.addrs4}'';
|
||||
};
|
||||
nets = {
|
||||
internet = {
|
||||
|
@ -575,14 +357,13 @@ let
|
|||
IN MX 10 mx42
|
||||
euer IN MX 1 aspmx.l.google.com.
|
||||
io IN NS pigstarter.krebsco.de.
|
||||
euer IN A ${elemAt nets.internet.addrs4 0}
|
||||
pigstarter IN A ${elemAt nets.internet.addrs4 0}
|
||||
conf IN A ${elemAt nets.internet.addrs4 0}
|
||||
gold IN A ${elemAt nets.internet.addrs4 0}
|
||||
graph IN A ${elemAt nets.internet.addrs4 0}
|
||||
tinc IN A ${elemAt nets.internet.addrs4 0}
|
||||
boot IN A ${elemAt nets.internet.addrs4 0}
|
||||
mx42 IN A ${elemAt nets.internet.addrs4 0}'';
|
||||
pigstarter IN A ${head nets.internet.addrs4}
|
||||
conf IN A ${head nets.internet.addrs4}
|
||||
gold IN A ${head nets.internet.addrs4}
|
||||
graph IN A ${head nets.internet.addrs4}
|
||||
tinc IN A ${head nets.internet.addrs4}
|
||||
boot IN A ${head nets.internet.addrs4}
|
||||
mx42 IN A ${head nets.internet.addrs4}'';
|
||||
};
|
||||
nets = {
|
||||
internet = {
|
||||
|
@ -611,15 +392,56 @@ let
|
|||
};
|
||||
};
|
||||
};
|
||||
wry = rec {
|
||||
cores = 1;
|
||||
dc = "makefu"; #dc = "cac";
|
||||
extraZones = {
|
||||
"krebsco.de" = ''
|
||||
wry IN A ${head nets.internet.addrs4}
|
||||
'';
|
||||
};
|
||||
nets = rec {
|
||||
internet = {
|
||||
addrs4 = ["162.219.7.216"];
|
||||
aliases = [
|
||||
"wry.internet"
|
||||
];
|
||||
};
|
||||
retiolum = {
|
||||
via = internet;
|
||||
addrs4 = ["10.243.29.169"];
|
||||
addrs6 = ["42:6e1e:cc8a:7cef:827:f938:8c64:baad"];
|
||||
aliases = [
|
||||
"wry.retiolum"
|
||||
];
|
||||
tinc.pubkey = ''
|
||||
-----BEGIN RSA PUBLIC KEY-----
|
||||
MIICCgKCAgEAvmCBVNKT/Su4v9nl/Nm3STPo5QxWPg7xEkzIs3Oh39BS8+r6/7UQ
|
||||
rebib7mczb+ebZd+Rg2yFoGrWO8cmM0VcLy5bYRMK7in8XroLEjWecNNM4TRfNR4
|
||||
e53+LhcPdkxo0A3/D+yiut+A2Mkqe+4VXDm/JhAiAYkZTn7jUtj00Atrc7CWW1gN
|
||||
sP3jIgv4+CGftdSYOB4dm699B7OD9XDLci2kOaFqFl4cjDYUok03G0AduUlRx10v
|
||||
CKbKOTIdm8C36A902/3ms+Hyzkruu+VagGIZuPSwqXHJPCu7Ju+jarKQstMmpQi0
|
||||
PubweWDL0o/Dfz2qT3DuL4xDecIvGE6kv3m41hHJYiK+2/azTSehyPFbsVbL7w0V
|
||||
LgKN3usnZNcpTsBWxRGT7nMFSnX2FLDu7d9OfCuaXYxHVFLZaNrpccOq8NF/7Hbk
|
||||
DDW81W7CvLyJDlp0WLnAawSOGTUTPoYv/2wAapJ89i8QGCueGvEc6o2EcnBVMFEW
|
||||
ejWTQzyD816f4RsplnrRqLVlIMbr9Q/n5TvlgjjhX7IMEfMy4+7qLGRQkNbFzgwK
|
||||
jxNG2fFSCjOEQitm0gAtx7QRIyvYr6c7/xiHz4AwxYzBmvQsL/OK57NO4+Krwgj5
|
||||
Vk8TQ2jGO7J4bB38zaxK+Lrtfl8i1AK1171JqFMhOc34JSJ7T4LWDMECAwEAAQ==
|
||||
-----END RSA PUBLIC KEY-----
|
||||
'';
|
||||
};
|
||||
};
|
||||
};
|
||||
gum = rec {
|
||||
cores = 1;
|
||||
dc = "online.net"; #root-server
|
||||
|
||||
extraZones = {
|
||||
"krebsco.de" = ''
|
||||
omo IN A ${elemAt nets.internet.addrs4 0}
|
||||
gum IN A ${elemAt nets.internet.addrs4 0}
|
||||
paste IN A ${elemAt nets.internet.addrs4 0}'';
|
||||
omo IN A ${head nets.internet.addrs4}
|
||||
euer IN A ${head nets.internet.addrs4}
|
||||
gum IN A ${head nets.internet.addrs4}
|
||||
paste IN A ${head nets.internet.addrs4}'';
|
||||
};
|
||||
nets = {
|
||||
internet = {
|
||||
|
@ -706,12 +528,13 @@ let
|
|||
};
|
||||
};
|
||||
};
|
||||
mkdir = {
|
||||
mkdir = rec {
|
||||
cores = 1;
|
||||
dc = "tv"; #dc = "cac";
|
||||
infest.addr = head nets.internet.addrs4;
|
||||
nets = rec {
|
||||
internet = {
|
||||
addrs4 = ["162.248.167.241"];
|
||||
addrs4 = ["104.233.84.102"];
|
||||
aliases = [
|
||||
"mkdir.internet"
|
||||
];
|
||||
|
@ -762,12 +585,13 @@ let
|
|||
};
|
||||
secure = true;
|
||||
};
|
||||
rmdir = {
|
||||
rmdir = rec {
|
||||
cores = 1;
|
||||
dc = "tv"; #dc = "cac";
|
||||
infest.addr = head nets.internet.addrs4;
|
||||
nets = rec {
|
||||
internet = {
|
||||
addrs4 = ["167.88.44.94"];
|
||||
addrs4 = ["104.233.84.70"];
|
||||
aliases = [
|
||||
"rmdir.internet"
|
||||
];
|
||||
|
|
|
@ -22,7 +22,7 @@ let
|
|||
};
|
||||
ssh-identity-file = mkOption {
|
||||
type = types.str; # TODO must be named *.ssh.{id_rsa,id_ed25519}
|
||||
default = "/root/src/secrets/github-hosts-sync.ssh.id_rsa";
|
||||
default = toString <secrets/github-hosts-sync.ssh.id_rsa>;
|
||||
};
|
||||
};
|
||||
|
||||
|
|
|
@ -75,7 +75,7 @@ let
|
|||
# TODO if it's types.path then it gets copied to /nix/store with
|
||||
# bad unsafe permissions...
|
||||
type = types.str;
|
||||
default = "/root/src/secrets/retiolum.rsa_key.priv";
|
||||
default = toString <secrets/retiolum.rsa_key.priv>;
|
||||
description = ''
|
||||
Generate file with <literal>tincd -K</literal>.
|
||||
This file must exist on the local system. The default points to
|
||||
|
|
|
@ -1,9 +0,0 @@
|
|||
#! /bin/sh
|
||||
set -efu
|
||||
|
||||
install-nix-tools() {(
|
||||
|
||||
|
||||
)}
|
||||
|
||||
install-nix-tools "$@"
|
|
@ -27,6 +27,16 @@ types // rec {
|
|||
type = with types; attrsOf string;
|
||||
};
|
||||
|
||||
infest = {
|
||||
addr = mkOption {
|
||||
type = str;
|
||||
};
|
||||
port = mkOption {
|
||||
type = int;
|
||||
default = 22;
|
||||
};
|
||||
};
|
||||
|
||||
secure = mkOption {
|
||||
type = bool;
|
||||
default = false;
|
||||
|
|
|
@ -1,12 +1,12 @@
|
|||
{ stdenv, fetchgit, coreutils, curl, gnused, inotifyTools, jq, ncurses, sshpass, ... }:
|
||||
|
||||
stdenv.mkDerivation {
|
||||
name = "cac";
|
||||
name = "cac-1.0.0";
|
||||
|
||||
src = fetchgit {
|
||||
url = http://cgit.cd.retiolum/cac;
|
||||
rev = "f4589158572ab35969b9bccf801ea07e115705e1";
|
||||
sha256 = "9d761cd1d7ff68507392cbfd6c3f6000ddff9cc540293da2b3c4ee902321fb27";
|
||||
rev = "14de1d3c78385e3f8b6d694f5d799eb1b613159e";
|
||||
sha256 = "9b2a3d47345d6f8f27d9764c4f2f2acff17d3dde145dd0e674e4183e9312fec3";
|
||||
};
|
||||
|
||||
phases = [
|
||||
|
|
|
@ -1,12 +1,12 @@
|
|||
{ coreutils, gnugrep, gnused, fetchgit, jq, nix, stdenv, ... }:
|
||||
|
||||
stdenv.mkDerivation {
|
||||
name = "get-1.1.0";
|
||||
name = "get-1.1.1";
|
||||
|
||||
src = fetchgit {
|
||||
url = http://cgit.cd.retiolum/get;
|
||||
rev = "e75084e39f0402107bb520b5c9d5434a9d7f5d64";
|
||||
sha256 = "5bafc9fa68cdb8ab76437a00354cbe4af4020cbbbbce848c325cae55863d9477";
|
||||
rev = "e64826a4f5f74cbaa895e538b97d0e523e9709f9";
|
||||
sha256 = "4d1aa07bba52f697cf7aa7ad1b02b9ff41598dfea83c578e77b8d81e3e8830d2";
|
||||
};
|
||||
|
||||
phases = [
|
||||
|
|
|
@ -9,6 +9,7 @@
|
|||
[ # Include the results of the hardware scan.
|
||||
# Base
|
||||
../2configs/base.nix
|
||||
../2configs/base-sources.nix
|
||||
../2configs/tinc-basic-retiolum.nix
|
||||
|
||||
# HW/FS
|
||||
|
@ -38,12 +39,6 @@
|
|||
|
||||
nixpkgs.config.packageOverrides = pkgs: { tinc = pkgs.tinc_pre; };
|
||||
|
||||
krebs.build.deps = {
|
||||
nixpkgs = {
|
||||
url = https://github.com/NixOS/nixpkgs;
|
||||
rev = "03921972268934d900cc32dad253ff383926771c";
|
||||
};
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [
|
||||
# nginx runs on 80
|
||||
|
|
|
@ -9,6 +9,9 @@
|
|||
../2configs/base.nix
|
||||
../2configs/main-laptop.nix #< base-gui
|
||||
|
||||
# configures sources
|
||||
../2configs/base-sources.nix
|
||||
|
||||
# Krebs
|
||||
../2configs/tinc-basic-retiolum.nix
|
||||
#../2configs/disable_v6.nix
|
||||
|
@ -18,34 +21,30 @@
|
|||
|
||||
# applications
|
||||
../2configs/exim-retiolum.nix
|
||||
../2configs/virtualization.nix
|
||||
#../2configs/virtualization.nix
|
||||
../2configs/virtualization-virtualbox.nix
|
||||
../2configs/wwan.nix
|
||||
|
||||
# services
|
||||
../2configs/git/brain-retiolum.nix
|
||||
# ../2configs/Reaktor/simpleExtend.nix
|
||||
../2configs/tor.nix
|
||||
|
||||
# hardware specifics are in here
|
||||
../2configs/hw/tp-x220.nix
|
||||
# mount points
|
||||
../2configs/fs/sda-crypto-root-home.nix
|
||||
];
|
||||
krebs.Reaktor.enable = true;
|
||||
krebs.Reaktor.debug = true;
|
||||
krebs.Reaktor.nickname = "makefu|r";
|
||||
|
||||
krebs.build.host = config.krebs.hosts.pornocauster;
|
||||
krebs.build.user = config.krebs.users.makefu;
|
||||
krebs.build.target = "root@pornocauster";
|
||||
|
||||
#krebs.Reaktor.nickname = "makefu|r";
|
||||
|
||||
networking.firewall.allowedTCPPorts = [
|
||||
25
|
||||
];
|
||||
|
||||
krebs.build.deps = {
|
||||
nixpkgs = {
|
||||
url = https://github.com/NixOS/nixpkgs;
|
||||
#url = https://github.com/makefu/nixpkgs;
|
||||
rev = "03921972268934d900cc32dad253ff383926771c";
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
34
makefu/1systems/wry.nix
Normal file
34
makefu/1systems/wry.nix
Normal file
|
@ -0,0 +1,34 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
|
||||
ip = (lib.elemAt config.krebs.build.host.nets.internet.addrs4 0);
|
||||
in {
|
||||
imports = [
|
||||
../../tv/2configs/CAC-CentOS-7-64bit.nix
|
||||
../2configs/base.nix
|
||||
../2configs/tinc-basic-retiolum.nix
|
||||
{
|
||||
}
|
||||
];
|
||||
networking.firewall.allowPing = true;
|
||||
networking.interfaces.enp2s1.ip4 = [
|
||||
{
|
||||
address = ip;
|
||||
prefixLength = 24;
|
||||
}
|
||||
];
|
||||
networking.defaultGateway = "104.233.80.1";
|
||||
networking.nameservers = [
|
||||
"8.8.8.8"
|
||||
];
|
||||
|
||||
# based on ../../tv/2configs/CAC-Developer-2.nix
|
||||
sound.enable = false;
|
||||
krebs.build = {
|
||||
user = config.krebs.users.makefu;
|
||||
target = "root@${ip}";
|
||||
host = config.krebs.hosts.wry;
|
||||
};
|
||||
|
||||
}
|
19
makefu/2configs/base-sources.nix
Normal file
19
makefu/2configs/base-sources.nix
Normal file
|
@ -0,0 +1,19 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
{
|
||||
krebs.build.source = {
|
||||
git.nixpkgs = {
|
||||
url = https://github.com/NixOS/nixpkgs;
|
||||
#url = https://github.com/makefu/nixpkgs;
|
||||
rev = "68bd8e4a9dc247726ae89cc8739574261718e328";
|
||||
};
|
||||
dir.secrets = {
|
||||
host = config.krebs.hosts.pornocauster;
|
||||
path = "/home/makefu/secrets/${config.krebs.build.host.name}/";
|
||||
};
|
||||
dir.stockholm = {
|
||||
host = config.krebs.hosts.pornocauster;
|
||||
path = toString ../.. ;
|
||||
};
|
||||
};
|
||||
}
|
|
@ -37,15 +37,6 @@ with lib;
|
|||
time.timeZone = "Europe/Berlin";
|
||||
#nix.maxJobs = 1;
|
||||
|
||||
krebs.build.deps = {
|
||||
secrets = {
|
||||
url = "/home/makefu/secrets/${config.krebs.build.host.name}";
|
||||
};
|
||||
stockholm = {
|
||||
url = toString ../..;
|
||||
};
|
||||
};
|
||||
|
||||
services.openssh.enable = true;
|
||||
nix.useChroot = true;
|
||||
|
||||
|
|
7
makefu/2configs/tor.nix
Normal file
7
makefu/2configs/tor.nix
Normal file
|
@ -0,0 +1,7 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
{
|
||||
services.tor.enable = true;
|
||||
services.tor.client.enable = true;
|
||||
# also enables services.tor.client.privoxy
|
||||
}
|
18
makefu/2configs/virtualization-virtualbox.nix
Normal file
18
makefu/2configs/virtualization-virtualbox.nix
Normal file
|
@ -0,0 +1,18 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
mainUser = config.krebs.build.user;
|
||||
version = "5.0.4";
|
||||
rev = "102546";
|
||||
vboxguestpkg = pkgs.fetchurl {
|
||||
url = "http://download.virtualbox.org/virtualbox/${version}/Oracle_VM_VirtualBox_Extension_Pack-${version}-${rev}.vbox-extpack";
|
||||
sha256 = "1ykwpjvfgj11iwhx70bh2hbxhyy3hg6rnqzl4qac7xzg8xw8wqg4";
|
||||
};
|
||||
in {
|
||||
inherit vboxguestpkg;
|
||||
virtualisation.virtualbox.host.enable = true;
|
||||
nixpkgs.config.virtualbox.enableExtensionPack = true;
|
||||
|
||||
users.extraGroups.vboxusers.members = [ "${mainUser.name}" ];
|
||||
environment.systemPackages = [ vboxguestpkg ];
|
||||
}
|
|
@ -8,16 +8,18 @@ with lib;
|
|||
|
||||
krebs.build.target = "root@cd.internet";
|
||||
|
||||
krebs.build.deps = {
|
||||
nixpkgs = {
|
||||
krebs.build.source = {
|
||||
git.nixpkgs = {
|
||||
url = https://github.com/4z3/nixpkgs;
|
||||
rev = "03130ec91356cd250b80f144022ee2f4d665ca36"; # 1357692
|
||||
};
|
||||
secrets = {
|
||||
url = "/home/tv/secrets/${config.krebs.build.host.name}";
|
||||
dir.secrets = {
|
||||
host = config.krebs.hosts.wu;
|
||||
path = "/home/tv/secrets/cd";
|
||||
};
|
||||
stockholm = {
|
||||
url = toString ../..;
|
||||
dir.stockholm = {
|
||||
host = config.krebs.hosts.wu;
|
||||
path = "/home/tv/stockholm";
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -26,6 +28,7 @@ with lib;
|
|||
../2configs/CAC-CentOS-7-64bit.nix
|
||||
../2configs/base.nix
|
||||
#../2configs/consul-server.nix
|
||||
../2configs/exim-smarthost.nix
|
||||
../2configs/git.nix
|
||||
{
|
||||
imports = [ ../2configs/charybdis.nix ];
|
||||
|
@ -40,59 +43,6 @@ with lib;
|
|||
hosts = [ "jabber.viljetic.de" ];
|
||||
};
|
||||
}
|
||||
{
|
||||
krebs.exim-smarthost = {
|
||||
enable = true;
|
||||
primary_hostname = "${config.networking.hostName}.retiolum";
|
||||
sender_domains = [
|
||||
"shackspace.de"
|
||||
"viljetic.de"
|
||||
];
|
||||
relay_from_hosts = [
|
||||
"10.243.13.37"
|
||||
];
|
||||
internet-aliases = with config.krebs.users; [
|
||||
{ from = "tomislav@viljetic.de"; to = tv.mail; }
|
||||
|
||||
# (mindestens) lisp-stammtisch und elli haben die:
|
||||
{ from = "tv@viljetic.de"; to = tv.mail; }
|
||||
|
||||
{ from = "tv@destroy.dyn.shackspace.de"; to = tv.mail; }
|
||||
|
||||
{ from = "mirko@viljetic.de"; to = mv.mail; }
|
||||
|
||||
# TODO killme (wo wird die benutzt?)
|
||||
{ from = "tv@cd.retiolum"; to = tv.mail; }
|
||||
|
||||
# TODO lists@smtp.retiolum [consul]
|
||||
{ from = "postmaster@krebsco.de"; to = tv.mail; }
|
||||
|
||||
{ from = "spam@krebsco.de";
|
||||
to = pkgs.lib.concatStringsSep "," [
|
||||
tv.mail
|
||||
"lass@mors.retiolum"
|
||||
makefu.mail
|
||||
];
|
||||
}
|
||||
];
|
||||
system-aliases = [
|
||||
{ from = "mailer-daemon"; to = "postmaster"; }
|
||||
{ from = "postmaster"; to = "root"; }
|
||||
{ from = "nobody"; to = "root"; }
|
||||
{ from = "hostmaster"; to = "root"; }
|
||||
{ from = "usenet"; to = "root"; }
|
||||
{ from = "news"; to = "root"; }
|
||||
{ from = "webmaster"; to = "root"; }
|
||||
{ from = "www"; to = "root"; }
|
||||
{ from = "ftp"; to = "root"; }
|
||||
{ from = "abuse"; to = "root"; }
|
||||
{ from = "noc"; to = "root"; }
|
||||
{ from = "security"; to = "root"; }
|
||||
{ from = "root"; to = "tv"; }
|
||||
{ from = "mirko"; to = "mv"; }
|
||||
];
|
||||
};
|
||||
}
|
||||
{
|
||||
krebs.github-hosts-sync.enable = true;
|
||||
tv.iptables.input-internet-accept-new-tcp =
|
||||
|
|
|
@ -2,22 +2,37 @@
|
|||
|
||||
with lib;
|
||||
|
||||
let
|
||||
# TODO merge with lass
|
||||
getDefaultGateway = ip:
|
||||
concatStringsSep "." (take 3 (splitString "." ip) ++ ["1"]);
|
||||
|
||||
|
||||
primary-addr4 =
|
||||
builtins.elemAt config.krebs.build.host.nets.internet.addrs4 0;
|
||||
|
||||
#secondary-addr4 =
|
||||
# builtins.elemAt config.krebs.build.host.nets.internet.addrs4 1;
|
||||
in
|
||||
|
||||
{
|
||||
krebs.build.host = config.krebs.hosts.mkdir;
|
||||
krebs.build.user = config.krebs.users.tv;
|
||||
|
||||
krebs.build.target = "root@mkdir.internet";
|
||||
krebs.build.target = "root@${primary-addr4}";
|
||||
|
||||
krebs.build.deps = {
|
||||
nixpkgs = {
|
||||
krebs.build.source = {
|
||||
git.nixpkgs = {
|
||||
url = https://github.com/NixOS/nixpkgs;
|
||||
rev = "9d5508d85c33b8fb22d79dde6176792eac2c2696";
|
||||
rev = "68bd8e4a9dc247726ae89cc8739574261718e328";
|
||||
};
|
||||
secrets = {
|
||||
url = "/home/tv/secrets/${config.krebs.build.host.name}";
|
||||
dir.secrets = {
|
||||
host = config.krebs.hosts.wu;
|
||||
path = "/home/tv/secrets/mkdir";
|
||||
};
|
||||
stockholm = {
|
||||
url = toString ../..;
|
||||
dir.stockholm = {
|
||||
host = config.krebs.hosts.wu;
|
||||
path = "/home/tv/stockholm";
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -56,11 +71,18 @@ with lib;
|
|||
|
||||
networking.interfaces.enp2s1.ip4 = [
|
||||
{
|
||||
address = "162.248.167.241"; # TODO
|
||||
address = primary-addr4;
|
||||
prefixLength = 24;
|
||||
}
|
||||
#{
|
||||
# address = secondary-addr4;
|
||||
# prefixLength = 24;
|
||||
#}
|
||||
];
|
||||
networking.defaultGateway = "162.248.167.1";
|
||||
|
||||
# TODO define gateway in krebs/3modules/default.nix
|
||||
networking.defaultGateway = getDefaultGateway primary-addr4;
|
||||
|
||||
networking.nameservers = [
|
||||
"8.8.8.8"
|
||||
];
|
||||
|
|
|
@ -8,16 +8,18 @@ with lib;
|
|||
|
||||
krebs.build.target = "root@nomic.gg23";
|
||||
|
||||
krebs.build.deps = {
|
||||
nixpkgs = {
|
||||
krebs.build.source = {
|
||||
git.nixpkgs = {
|
||||
url = https://github.com/4z3/nixpkgs;
|
||||
rev = "03130ec91356cd250b80f144022ee2f4d665ca36"; # 1357692
|
||||
};
|
||||
secrets = {
|
||||
url = "/home/tv/secrets/${config.krebs.build.host.name}";
|
||||
dir.secrets = {
|
||||
host = config.krebs.hosts.wu;
|
||||
path = "/home/tv/secrets/nomic";
|
||||
};
|
||||
stockholm = {
|
||||
url = toString ../..;
|
||||
dir.stockholm = {
|
||||
host = config.krebs.hosts.wu;
|
||||
path = "/home/tv/stockholm";
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -112,6 +114,7 @@ with lib;
|
|||
exit 23
|
||||
esac
|
||||
'')
|
||||
gnupg
|
||||
ntp # ntpate
|
||||
rxvt_unicode.terminfo
|
||||
tmux
|
||||
|
|
|
@ -2,22 +2,37 @@
|
|||
|
||||
with lib;
|
||||
|
||||
let
|
||||
# TODO merge with lass
|
||||
getDefaultGateway = ip:
|
||||
concatStringsSep "." (take 3 (splitString "." ip) ++ ["1"]);
|
||||
|
||||
|
||||
primary-addr4 =
|
||||
builtins.elemAt config.krebs.build.host.nets.internet.addrs4 0;
|
||||
|
||||
#secondary-addr4 =
|
||||
# builtins.elemAt config.krebs.build.host.nets.internet.addrs4 1;
|
||||
in
|
||||
|
||||
{
|
||||
krebs.build.host = config.krebs.hosts.rmdir;
|
||||
krebs.build.user = config.krebs.users.tv;
|
||||
|
||||
krebs.build.target = "root@rmdir.internet";
|
||||
|
||||
krebs.build.deps = {
|
||||
nixpkgs = {
|
||||
krebs.build.source = {
|
||||
git.nixpkgs = {
|
||||
url = https://github.com/NixOS/nixpkgs;
|
||||
rev = "4c01e6d91993b6de128795f4fbdd25f6227fb870";
|
||||
rev = "68bd8e4a9dc247726ae89cc8739574261718e328";
|
||||
};
|
||||
secrets = {
|
||||
url = "/home/tv/secrets/${config.krebs.build.host.name}";
|
||||
dir.secrets = {
|
||||
host = config.krebs.hosts.wu;
|
||||
path = "/home/tv/secrets/rmdir";
|
||||
};
|
||||
stockholm = {
|
||||
url = toString ../..;
|
||||
dir.stockholm = {
|
||||
host = config.krebs.hosts.wu;
|
||||
path = "/home/tv/stockholm";
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -57,11 +72,13 @@ with lib;
|
|||
|
||||
networking.interfaces.enp2s1.ip4 = [
|
||||
{
|
||||
address = "167.88.44.94";
|
||||
address = primary-addr4;
|
||||
prefixLength = 24;
|
||||
}
|
||||
];
|
||||
networking.defaultGateway = "167.88.44.1";
|
||||
# TODO define gateway in krebs/3modules/default.nix
|
||||
networking.defaultGateway = getDefaultGateway primary-addr4;
|
||||
|
||||
networking.nameservers = [
|
||||
"8.8.8.8"
|
||||
];
|
||||
|
|
|
@ -8,16 +8,18 @@ with lib;
|
|||
|
||||
krebs.build.target = "root@wu";
|
||||
|
||||
krebs.build.deps = {
|
||||
nixpkgs = {
|
||||
url = https://github.com/4z3/nixpkgs;
|
||||
rev = "03130ec91356cd250b80f144022ee2f4d665ca36"; # 1357692
|
||||
krebs.build.source = {
|
||||
git.nixpkgs = {
|
||||
url = https://github.com/NixOS/nixpkgs;
|
||||
rev = "bd84ebaa1e0359f41350e053ed24592b169b5714";
|
||||
};
|
||||
secrets = {
|
||||
url = "/home/tv/secrets/${config.krebs.build.host.name}";
|
||||
dir.secrets = {
|
||||
host = config.krebs.hosts.wu;
|
||||
path = "/home/tv/secrets/wu";
|
||||
};
|
||||
stockholm = {
|
||||
url = toString ../..;
|
||||
dir.stockholm = {
|
||||
host = config.krebs.hosts.wu;
|
||||
path = "/home/tv/stockholm";
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -214,7 +216,6 @@ with lib;
|
|||
extraGroups = [
|
||||
"audio"
|
||||
"video"
|
||||
"bumblebee"
|
||||
];
|
||||
};
|
||||
|
||||
|
@ -255,7 +256,6 @@ with lib;
|
|||
extraGroups = [
|
||||
"audio"
|
||||
"video"
|
||||
"bumblebee"
|
||||
];
|
||||
};
|
||||
|
||||
|
@ -264,7 +264,6 @@ with lib;
|
|||
extraGroups = [
|
||||
"audio"
|
||||
"video"
|
||||
"bumblebee"
|
||||
];
|
||||
};
|
||||
|
||||
|
@ -332,6 +331,7 @@ with lib;
|
|||
};
|
||||
"/home" = {
|
||||
device = "/dev/mapper/home";
|
||||
fsType = "btrfs";
|
||||
options = "defaults,noatime,ssd,compress=lzo";
|
||||
};
|
||||
"/boot" = {
|
||||
|
|
|
@ -15,9 +15,10 @@ in
|
|||
|
||||
imports = [
|
||||
{
|
||||
# TODO never put hashedPassword into the store
|
||||
users.extraUsers =
|
||||
mapAttrs (_: h: { hashedPassword = h; })
|
||||
(import /root/src/secrets/hashedPasswords.nix);
|
||||
(import <secrets/hashedPasswords.nix>);
|
||||
}
|
||||
{
|
||||
users.defaultUserShell = "/run/current-system/sw/bin/bash";
|
||||
|
|
|
@ -21,7 +21,7 @@ let
|
|||
};
|
||||
dhParams = mkOption {
|
||||
type = types.str;
|
||||
default = "/root/src/secrets/charybdis.dh.pem";
|
||||
default = toString <secrets/charybdis.dh.pem>;
|
||||
};
|
||||
motd = mkOption {
|
||||
type = types.str;
|
||||
|
@ -32,7 +32,7 @@ let
|
|||
};
|
||||
sslKey = mkOption {
|
||||
type = types.str;
|
||||
default = "/root/src/secrets/charybdis.key.pem";
|
||||
default = toString <secrets/charybdis.key.pem>;
|
||||
};
|
||||
};
|
||||
|
||||
|
|
55
tv/2configs/exim-smarthost.nix
Normal file
55
tv/2configs/exim-smarthost.nix
Normal file
|
@ -0,0 +1,55 @@
|
|||
{ config, pkgs, ... }:
|
||||
|
||||
{
|
||||
krebs.exim-smarthost = {
|
||||
enable = true;
|
||||
primary_hostname = "${config.networking.hostName}.retiolum";
|
||||
sender_domains = [
|
||||
"shackspace.de"
|
||||
"viljetic.de"
|
||||
];
|
||||
relay_from_hosts = [
|
||||
"10.243.13.37"
|
||||
];
|
||||
internet-aliases = with config.krebs.users; [
|
||||
{ from = "tomislav@viljetic.de"; to = tv.mail; }
|
||||
|
||||
# (mindestens) lisp-stammtisch und elli haben die:
|
||||
{ from = "tv@viljetic.de"; to = tv.mail; }
|
||||
|
||||
{ from = "tv@destroy.dyn.shackspace.de"; to = tv.mail; }
|
||||
|
||||
{ from = "mirko@viljetic.de"; to = mv.mail; }
|
||||
|
||||
# TODO killme (wo wird die benutzt?)
|
||||
{ from = "tv@cd.retiolum"; to = tv.mail; }
|
||||
|
||||
# TODO lists@smtp.retiolum [consul]
|
||||
{ from = "postmaster@krebsco.de"; to = tv.mail; }
|
||||
|
||||
{ from = "spam@krebsco.de";
|
||||
to = pkgs.lib.concatStringsSep "," [
|
||||
tv.mail
|
||||
"lass@mors.retiolum"
|
||||
makefu.mail
|
||||
];
|
||||
}
|
||||
];
|
||||
system-aliases = [
|
||||
{ from = "mailer-daemon"; to = "postmaster"; }
|
||||
{ from = "postmaster"; to = "root"; }
|
||||
{ from = "nobody"; to = "root"; }
|
||||
{ from = "hostmaster"; to = "root"; }
|
||||
{ from = "usenet"; to = "root"; }
|
||||
{ from = "news"; to = "root"; }
|
||||
{ from = "webmaster"; to = "root"; }
|
||||
{ from = "www"; to = "root"; }
|
||||
{ from = "ftp"; to = "root"; }
|
||||
{ from = "abuse"; to = "root"; }
|
||||
{ from = "noc"; to = "root"; }
|
||||
{ from = "security"; to = "root"; }
|
||||
{ from = "root"; to = "tv"; }
|
||||
{ from = "mirko"; to = "mv"; }
|
||||
];
|
||||
};
|
||||
}
|
|
@ -51,7 +51,8 @@ let
|
|||
collaborators = with config.krebs.users; [ lass makefu ];
|
||||
};
|
||||
} //
|
||||
import /root/src/secrets/repos.nix { inherit config lib pkgs; }
|
||||
# TODO don't put secrets/repos.nix into the store
|
||||
import <secrets/repos.nix> { inherit config lib pkgs; }
|
||||
);
|
||||
|
||||
make-public-repo = name: { desc ? null, ... }: {
|
||||
|
|
|
@ -29,7 +29,7 @@ let
|
|||
};
|
||||
encrypt-file = mkOption {
|
||||
type = types.str; # TODO path (but not just into store)
|
||||
default = "/root/src/secrets/consul-encrypt.json";
|
||||
default = toString <secrets/consul-encrypt.json>;
|
||||
};
|
||||
data-dir = mkOption {
|
||||
type = types.str; # TODO path (but not just into store)
|
||||
|
|
|
@ -15,7 +15,7 @@ let
|
|||
|
||||
certFile = mkOption {
|
||||
type = types.str;
|
||||
default = "/root/src/secrets/ejabberd.pem";
|
||||
default = toString <secrets/ejabberd.pem>;
|
||||
};
|
||||
|
||||
hosts = mkOption {
|
||||
|
|
Loading…
Reference in a new issue