From f55307fd73af235069744dd5155fda0bc73fe613 Mon Sep 17 00:00:00 2001 From: lassulus Date: Thu, 7 Sep 2023 12:26:31 +0200 Subject: lass: migrate away --- lass/2configs/AP.nix | 83 ---- lass/2configs/IM.nix | 38 -- lass/2configs/ableton.nix | 20 - lass/2configs/alacritty.nix | 134 ------ lass/2configs/antimicrox/default.nix | 39 -- lass/2configs/antimicrox/empty.gamecontroller.amgp | 20 - lass/2configs/antimicrox/mouse.gamecontroller.amgp | 281 ------------- lass/2configs/atuin-server.nix | 10 - lass/2configs/autotether.nix | 16 - lass/2configs/baseX.nix | 196 --------- lass/2configs/bgt-bot/bgt-check.sh | 57 --- lass/2configs/bgt-bot/default.nix | 44 -- lass/2configs/binary-cache/client.nix | 17 - lass/2configs/binary-cache/proxy.nix | 13 - lass/2configs/binary-cache/server.nix | 31 -- lass/2configs/bird.nix | 13 - lass/2configs/bitcoin.nix | 34 -- lass/2configs/bitlbee.nix | 34 -- lass/2configs/blue-host.nix | 116 ------ lass/2configs/blue.nix | 33 -- lass/2configs/boot/coreboot.nix | 10 - lass/2configs/boot/stock-x220.nix | 8 - lass/2configs/boot/universal.nix | 11 - lass/2configs/br.nix | 51 --- lass/2configs/browsers.nix | 8 - lass/2configs/c-base.nix | 115 ------ lass/2configs/ciko.nix | 20 - lass/2configs/codimd.nix | 70 ---- lass/2configs/consul.nix | 40 -- lass/2configs/container-networking.nix | 22 - lass/2configs/copyq.nix | 37 -- lass/2configs/default.nix | 249 ----------- lass/2configs/docker.nix | 6 - lass/2configs/dunst.nix | 277 ------------- lass/2configs/elster.nix | 24 -- lass/2configs/et-server.nix | 7 - lass/2configs/exim-retiolum.nix | 15 - lass/2configs/exim-smarthost.nix | 62 --- lass/2configs/fetchWallpaper.nix | 11 - lass/2configs/firefoxPatched.nix | 58 --- lass/2configs/fonts.nix | 14 - lass/2configs/fysiirc.nix | 69 ---- lass/2configs/games.nix | 96 ----- lass/2configs/gc.nix | 9 - lass/2configs/gg23.nix | 93 ----- lass/2configs/git-brain.nix | 56 --- lass/2configs/git.nix | 206 ---------- lass/2configs/go.nix | 19 - lass/2configs/green-host.nix | 6 - lass/2configs/green-hosts/cryfs.nix | 95 ----- lass/2configs/green-hosts/ecryptfs.nix | 99 ----- lass/2configs/green-hosts/plain-bindfs.nix | 90 ---- lass/2configs/green-hosts/plain-permown.nix | 88 ---- lass/2configs/green-hosts/plain.nix | 87 ---- lass/2configs/green-hosts/securefs.nix | 101 ----- lass/2configs/gsm-wiki.nix | 46 --- lass/2configs/hardening.nix | 11 - lass/2configs/hass/default.nix | 125 ------ lass/2configs/hass/lib.nix | 256 ------------ lass/2configs/hass/pyscript/.gitignore | 1 - lass/2configs/hass/pyscript/default.nix | 26 -- lass/2configs/hass/pyscript/shell.nix | 51 --- lass/2configs/hass/rooms/bett.nix | 39 -- lass/2configs/hass/rooms/essen.nix | 9 - lass/2configs/hass/rooms/nass.nix | 10 - lass/2configs/hass/zigbee.nix | 76 ---- lass/2configs/hfos.nix | 48 --- lass/2configs/home-media.nix | 102 ----- lass/2configs/htop.nix | 43 -- lass/2configs/hw/brcmfmac4356-pcie.txt | 125 ------ lass/2configs/hw/gpd-pocket.nix | 28 -- lass/2configs/hw/x220.nix | 50 --- lass/2configs/iodined.nix | 20 - lass/2configs/libvirt.nix | 33 -- lass/2configs/livestream.nix | 12 - lass/2configs/logf.nix | 24 -- lass/2configs/mail.nix | 272 ------------ lass/2configs/mail/internet-gateway.nix | 48 --- lass/2configs/matrix.nix | 62 --- lass/2configs/mc.nix | 344 ---------------- lass/2configs/minecraft.nix | 13 - lass/2configs/monitoring/alert-rules.nix | 208 ---------- lass/2configs/monitoring/prometheus.nix | 110 ----- lass/2configs/monitoring/telegraf.nix | 163 -------- lass/2configs/mouse.nix | 20 - lass/2configs/mpv.nix | 103 ----- lass/2configs/muchsync.nix | 40 -- lass/2configs/mumble-reminder.nix | 107 ----- lass/2configs/murmur.nix | 37 -- lass/2configs/network-manager.nix | 25 -- lass/2configs/networkd.nix | 20 - lass/2configs/nfs-dl.nix | 22 - lass/2configs/orange-host.nix | 19 - .../2configs/os-templates/CAC-CentOS-6.5-64bit.nix | 47 --- lass/2configs/os-templates/CAC-CentOS-7-64bit.nix | 47 --- lass/2configs/otp-ssh.nix | 18 - lass/2configs/pass.nix | 21 - lass/2configs/paste.nix | 146 ------- lass/2configs/pipewire.nix | 35 -- lass/2configs/power-action.nix | 45 -- lass/2configs/ppp/umts-stick.nix | 33 -- lass/2configs/ppp/x220-modem.nix | 32 -- lass/2configs/print.nix | 19 - lass/2configs/prism-share.nix | 42 -- lass/2configs/privoxy-retiolum.nix | 21 - lass/2configs/privoxy.nix | 7 - lass/2configs/programs.nix | 54 --- lass/2configs/reaktor-coders.nix | 56 --- lass/2configs/realwallpaper.nix | 52 --- lass/2configs/rebuild-on-boot.nix | 18 - lass/2configs/red-host.nix | 163 -------- lass/2configs/redis.nix | 8 - lass/2configs/retiolum.nix | 55 --- lass/2configs/review.nix | 14 - lass/2configs/riot.nix | 87 ---- lass/2configs/rtl-sdr.nix | 6 - lass/2configs/searx.nix | 23 -- lass/2configs/services/coms/default.nix | 6 - lass/2configs/services/coms/jitsi.nix | 43 -- lass/2configs/services/coms/murmur.nix | 47 --- lass/2configs/services/coms/proxy.nix | 41 -- lass/2configs/services/flix/container-host.nix | 40 -- lass/2configs/services/flix/default.nix | 316 -------------- lass/2configs/services/flix/proxy.nix | 12 - lass/2configs/services/git/default.nix | 21 - lass/2configs/services/git/proxy.nix | 23 -- lass/2configs/services/radio/container-host.nix | 23 -- lass/2configs/services/radio/controls.html | 83 ---- lass/2configs/services/radio/default.nix | 348 ---------------- lass/2configs/services/radio/news.nix | 131 ------ lass/2configs/services/radio/proxy.nix | 17 - lass/2configs/services/radio/radio.liq | 112 ----- lass/2configs/services/radio/shell.nix | 7 - lass/2configs/services/radio/weather.nix | 60 --- lass/2configs/services/radio/weather_for_ips.py | 48 --- lass/2configs/skype.nix | 27 -- lass/2configs/smartd.nix | 17 - lass/2configs/snapclient.nix | 12 - lass/2configs/snapserver.nix | 30 -- lass/2configs/ssh-cryptsetup.nix | 15 - lass/2configs/starcraft.nix | 22 - lass/2configs/steam.nix | 29 -- lass/2configs/sync/decsync.nix | 10 - lass/2configs/sync/sync.nix | 15 - lass/2configs/sync/the_playlist.nix | 9 - lass/2configs/sync/weechat.nix | 6 - lass/2configs/syncthing.nix | 15 - lass/2configs/termite.nix | 22 - .../tests/dummy-secrets/bepasty-secret.nix | 1 - lass/2configs/tests/dummy-secrets/cbase.txt | 0 .../tests/dummy-secrets/grafana_security.nix | 4 - .../tests/dummy-secrets/hashedPasswords.nix | 1 - lass/2configs/tests/dummy-secrets/icecast-admin-pw | 1 - .../2configs/tests/dummy-secrets/icecast-source-pw | 1 - .../tests/dummy-secrets/initrd/ssh.ed25519_key | 0 lass/2configs/tests/dummy-secrets/iodinepw.nix | 1 - .../tests/dummy-secrets/lassul.us.dkim.priv | 3 - lass/2configs/tests/dummy-secrets/mails.nix | 1 - .../tests/dummy-secrets/mysql_rootPassword | 1 - lass/2configs/tests/dummy-secrets/nix-serve.key | 1 - lass/2configs/tests/dummy-secrets/nordvpn.txt | 0 lass/2configs/tests/dummy-secrets/repos.nix | 1 - .../tests/dummy-secrets/retiolum.rsa_key.priv | 4 - lass/2configs/tests/dummy-secrets/searx.key | 1 - lass/2configs/tests/dummy-secrets/ssh-tor.priv | 0 lass/2configs/tests/dummy-secrets/ssh.id_ed25519 | 3 - lass/2configs/tests/dummy-secrets/ssh.id_rsa | 3 - lass/2configs/tests/dummy-secrets/syncthing.cert | 0 lass/2configs/tests/dummy-secrets/syncthing.key | 0 lass/2configs/tests/dummy-secrets/torrent-auth | 3 - lass/2configs/tests/dummy-secrets/transmission-pw | 1 - lass/2configs/texlive.nix | 12 - lass/2configs/themes.nix | 75 ---- lass/2configs/tmux.nix | 47 --- lass/2configs/tor-initrd.nix | 49 --- lass/2configs/tor-ssh.nix | 16 - lass/2configs/tv.nix | 194 --------- lass/2configs/ubik-host.nix | 26 -- lass/2configs/urxvt.nix | 37 -- lass/2configs/vim.nix | 349 ---------------- lass/2configs/virtualbox.nix | 24 -- lass/2configs/websites/default.nix | 20 - lass/2configs/websites/domsen.nix | 454 --------------------- lass/2configs/websites/flix.lassul.us.nix | 13 - lass/2configs/websites/lassulus.nix | 74 ---- lass/2configs/websites/ref.ptkk.de/default.nix | 89 ---- lass/2configs/websites/sqlBackup.nix | 30 -- lass/2configs/websites/util.nix | 246 ----------- lass/2configs/weechat.nix | 214 ---------- lass/2configs/weron/client.nix | 20 - lass/2configs/weron/signaler.nix | 13 - lass/2configs/wine.nix | 25 -- lass/2configs/wiregrill.nix | 59 --- lass/2configs/xdg-open.nix | 67 --- lass/2configs/xmonad.nix | 236 ----------- lass/2configs/xonsh.nix | 7 - lass/2configs/yellow-mounts/samba.nix | 15 - lass/2configs/yubikey.nix | 62 --- lass/2configs/zsh.nix | 144 ------- 199 files changed, 11510 deletions(-) delete mode 100644 lass/2configs/AP.nix delete mode 100644 lass/2configs/IM.nix delete mode 100644 lass/2configs/ableton.nix delete mode 100644 lass/2configs/alacritty.nix delete mode 100644 lass/2configs/antimicrox/default.nix delete mode 100644 lass/2configs/antimicrox/empty.gamecontroller.amgp delete mode 100644 lass/2configs/antimicrox/mouse.gamecontroller.amgp delete mode 100644 lass/2configs/atuin-server.nix delete mode 100644 lass/2configs/autotether.nix delete mode 100644 lass/2configs/baseX.nix delete mode 100644 lass/2configs/bgt-bot/bgt-check.sh delete mode 100644 lass/2configs/bgt-bot/default.nix delete mode 100644 lass/2configs/binary-cache/client.nix delete mode 100644 lass/2configs/binary-cache/proxy.nix delete mode 100644 lass/2configs/binary-cache/server.nix delete mode 100644 lass/2configs/bird.nix delete mode 100644 lass/2configs/bitcoin.nix delete mode 100644 lass/2configs/bitlbee.nix delete mode 100644 lass/2configs/blue-host.nix delete mode 100644 lass/2configs/blue.nix delete mode 100644 lass/2configs/boot/coreboot.nix delete mode 100644 lass/2configs/boot/stock-x220.nix delete mode 100644 lass/2configs/boot/universal.nix delete mode 100644 lass/2configs/br.nix delete mode 100644 lass/2configs/browsers.nix delete mode 100644 lass/2configs/c-base.nix delete mode 100644 lass/2configs/ciko.nix delete mode 100644 lass/2configs/codimd.nix delete mode 100644 lass/2configs/consul.nix delete mode 100644 lass/2configs/container-networking.nix delete mode 100644 lass/2configs/copyq.nix delete mode 100644 lass/2configs/default.nix delete mode 100644 lass/2configs/docker.nix delete mode 100644 lass/2configs/dunst.nix delete mode 100644 lass/2configs/elster.nix delete mode 100644 lass/2configs/et-server.nix delete mode 100644 lass/2configs/exim-retiolum.nix delete mode 100644 lass/2configs/exim-smarthost.nix delete mode 100644 lass/2configs/fetchWallpaper.nix delete mode 100644 lass/2configs/firefoxPatched.nix delete mode 100644 lass/2configs/fonts.nix delete mode 100644 lass/2configs/fysiirc.nix delete mode 100644 lass/2configs/games.nix delete mode 100644 lass/2configs/gc.nix delete mode 100644 lass/2configs/gg23.nix delete mode 100644 lass/2configs/git-brain.nix delete mode 100644 lass/2configs/git.nix delete mode 100644 lass/2configs/go.nix delete mode 100644 lass/2configs/green-host.nix delete mode 100644 lass/2configs/green-hosts/cryfs.nix delete mode 100644 lass/2configs/green-hosts/ecryptfs.nix delete mode 100644 lass/2configs/green-hosts/plain-bindfs.nix delete mode 100644 lass/2configs/green-hosts/plain-permown.nix delete mode 100644 lass/2configs/green-hosts/plain.nix delete mode 100644 lass/2configs/green-hosts/securefs.nix delete mode 100644 lass/2configs/gsm-wiki.nix delete mode 100644 lass/2configs/hardening.nix delete mode 100644 lass/2configs/hass/default.nix delete mode 100644 lass/2configs/hass/lib.nix delete mode 100644 lass/2configs/hass/pyscript/.gitignore delete mode 100644 lass/2configs/hass/pyscript/default.nix delete mode 100644 lass/2configs/hass/pyscript/shell.nix delete mode 100644 lass/2configs/hass/rooms/bett.nix delete mode 100644 lass/2configs/hass/rooms/essen.nix delete mode 100644 lass/2configs/hass/rooms/nass.nix delete mode 100644 lass/2configs/hass/zigbee.nix delete mode 100644 lass/2configs/hfos.nix delete mode 100644 lass/2configs/home-media.nix delete mode 100644 lass/2configs/htop.nix delete mode 100644 lass/2configs/hw/brcmfmac4356-pcie.txt delete mode 100644 lass/2configs/hw/gpd-pocket.nix delete mode 100644 lass/2configs/hw/x220.nix delete mode 100644 lass/2configs/iodined.nix delete mode 100644 lass/2configs/libvirt.nix delete mode 100644 lass/2configs/livestream.nix delete mode 100644 lass/2configs/logf.nix delete mode 100644 lass/2configs/mail.nix delete mode 100644 lass/2configs/mail/internet-gateway.nix delete mode 100644 lass/2configs/matrix.nix delete mode 100644 lass/2configs/mc.nix delete mode 100644 lass/2configs/minecraft.nix delete mode 100644 lass/2configs/monitoring/alert-rules.nix delete mode 100644 lass/2configs/monitoring/prometheus.nix delete mode 100644 lass/2configs/monitoring/telegraf.nix delete mode 100644 lass/2configs/mouse.nix delete mode 100644 lass/2configs/mpv.nix delete mode 100644 lass/2configs/muchsync.nix delete mode 100644 lass/2configs/mumble-reminder.nix delete mode 100644 lass/2configs/murmur.nix delete mode 100644 lass/2configs/network-manager.nix delete mode 100644 lass/2configs/networkd.nix delete mode 100644 lass/2configs/nfs-dl.nix delete mode 100644 lass/2configs/orange-host.nix delete mode 100644 lass/2configs/os-templates/CAC-CentOS-6.5-64bit.nix delete mode 100644 lass/2configs/os-templates/CAC-CentOS-7-64bit.nix delete mode 100644 lass/2configs/otp-ssh.nix delete mode 100644 lass/2configs/pass.nix delete mode 100644 lass/2configs/paste.nix delete mode 100644 lass/2configs/pipewire.nix delete mode 100644 lass/2configs/power-action.nix delete mode 100644 lass/2configs/ppp/umts-stick.nix delete mode 100644 lass/2configs/ppp/x220-modem.nix delete mode 100644 lass/2configs/print.nix delete mode 100644 lass/2configs/prism-share.nix delete mode 100644 lass/2configs/privoxy-retiolum.nix delete mode 100644 lass/2configs/privoxy.nix delete mode 100644 lass/2configs/programs.nix delete mode 100644 lass/2configs/reaktor-coders.nix delete mode 100644 lass/2configs/realwallpaper.nix delete mode 100644 lass/2configs/rebuild-on-boot.nix delete mode 100644 lass/2configs/red-host.nix delete mode 100644 lass/2configs/redis.nix delete mode 100644 lass/2configs/retiolum.nix delete mode 100644 lass/2configs/review.nix delete mode 100644 lass/2configs/riot.nix delete mode 100644 lass/2configs/rtl-sdr.nix delete mode 100644 lass/2configs/searx.nix delete mode 100644 lass/2configs/services/coms/default.nix delete mode 100644 lass/2configs/services/coms/jitsi.nix delete mode 100644 lass/2configs/services/coms/murmur.nix delete mode 100644 lass/2configs/services/coms/proxy.nix delete mode 100644 lass/2configs/services/flix/container-host.nix delete mode 100644 lass/2configs/services/flix/default.nix delete mode 100644 lass/2configs/services/flix/proxy.nix delete mode 100644 lass/2configs/services/git/default.nix delete mode 100644 lass/2configs/services/git/proxy.nix delete mode 100644 lass/2configs/services/radio/container-host.nix delete mode 100644 lass/2configs/services/radio/controls.html delete mode 100644 lass/2configs/services/radio/default.nix delete mode 100644 lass/2configs/services/radio/news.nix delete mode 100644 lass/2configs/services/radio/proxy.nix delete mode 100644 lass/2configs/services/radio/radio.liq delete mode 100644 lass/2configs/services/radio/shell.nix delete mode 100644 lass/2configs/services/radio/weather.nix delete mode 100644 lass/2configs/services/radio/weather_for_ips.py delete mode 100644 lass/2configs/skype.nix delete mode 100644 lass/2configs/smartd.nix delete mode 100644 lass/2configs/snapclient.nix delete mode 100644 lass/2configs/snapserver.nix delete mode 100644 lass/2configs/ssh-cryptsetup.nix delete mode 100644 lass/2configs/starcraft.nix delete mode 100644 lass/2configs/steam.nix delete mode 100644 lass/2configs/sync/decsync.nix delete mode 100644 lass/2configs/sync/sync.nix delete mode 100644 lass/2configs/sync/the_playlist.nix delete mode 100644 lass/2configs/sync/weechat.nix delete mode 100644 lass/2configs/syncthing.nix delete mode 100644 lass/2configs/termite.nix delete mode 100644 lass/2configs/tests/dummy-secrets/bepasty-secret.nix delete mode 100644 lass/2configs/tests/dummy-secrets/cbase.txt delete mode 100644 lass/2configs/tests/dummy-secrets/grafana_security.nix delete mode 100644 lass/2configs/tests/dummy-secrets/hashedPasswords.nix delete mode 100644 lass/2configs/tests/dummy-secrets/icecast-admin-pw delete mode 100644 lass/2configs/tests/dummy-secrets/icecast-source-pw delete mode 100644 lass/2configs/tests/dummy-secrets/initrd/ssh.ed25519_key delete mode 100644 lass/2configs/tests/dummy-secrets/iodinepw.nix delete mode 100644 lass/2configs/tests/dummy-secrets/lassul.us.dkim.priv delete mode 100644 lass/2configs/tests/dummy-secrets/mails.nix delete mode 100644 lass/2configs/tests/dummy-secrets/mysql_rootPassword delete mode 100644 lass/2configs/tests/dummy-secrets/nix-serve.key delete mode 100644 lass/2configs/tests/dummy-secrets/nordvpn.txt delete mode 100644 lass/2configs/tests/dummy-secrets/repos.nix delete mode 100644 lass/2configs/tests/dummy-secrets/retiolum.rsa_key.priv delete mode 100644 lass/2configs/tests/dummy-secrets/searx.key delete mode 100644 lass/2configs/tests/dummy-secrets/ssh-tor.priv delete mode 100644 lass/2configs/tests/dummy-secrets/ssh.id_ed25519 delete mode 100644 lass/2configs/tests/dummy-secrets/ssh.id_rsa delete mode 100644 lass/2configs/tests/dummy-secrets/syncthing.cert delete mode 100644 lass/2configs/tests/dummy-secrets/syncthing.key delete mode 100644 lass/2configs/tests/dummy-secrets/torrent-auth delete mode 100644 lass/2configs/tests/dummy-secrets/transmission-pw delete mode 100644 lass/2configs/texlive.nix delete mode 100644 lass/2configs/themes.nix delete mode 100644 lass/2configs/tmux.nix delete mode 100644 lass/2configs/tor-initrd.nix delete mode 100644 lass/2configs/tor-ssh.nix delete mode 100644 lass/2configs/tv.nix delete mode 100644 lass/2configs/ubik-host.nix delete mode 100644 lass/2configs/urxvt.nix delete mode 100644 lass/2configs/vim.nix delete mode 100644 lass/2configs/virtualbox.nix delete mode 100644 lass/2configs/websites/default.nix delete mode 100644 lass/2configs/websites/domsen.nix delete mode 100644 lass/2configs/websites/flix.lassul.us.nix delete mode 100644 lass/2configs/websites/lassulus.nix delete mode 100644 lass/2configs/websites/ref.ptkk.de/default.nix delete mode 100644 lass/2configs/websites/sqlBackup.nix delete mode 100644 lass/2configs/websites/util.nix delete mode 100644 lass/2configs/weechat.nix delete mode 100644 lass/2configs/weron/client.nix delete mode 100644 lass/2configs/weron/signaler.nix delete mode 100644 lass/2configs/wine.nix delete mode 100644 lass/2configs/wiregrill.nix delete mode 100644 lass/2configs/xdg-open.nix delete mode 100644 lass/2configs/xmonad.nix delete mode 100644 lass/2configs/xonsh.nix delete mode 100644 lass/2configs/yellow-mounts/samba.nix delete mode 100644 lass/2configs/yubikey.nix delete mode 100644 lass/2configs/zsh.nix (limited to 'lass/2configs') diff --git a/lass/2configs/AP.nix b/lass/2configs/AP.nix deleted file mode 100644 index e3847538..00000000 --- a/lass/2configs/AP.nix +++ /dev/null @@ -1,83 +0,0 @@ -{ config, pkgs, ... }: -with import ; -let - wifi = "wlp0s29u1u2"; -in { - boot.extraModulePackages = [ - pkgs.linuxPackages.rtl8814au - ]; - networking.networkmanager.unmanaged = [ wifi "et0" ]; - - systemd.services.hostapd = { - description = "hostapd wireless AP"; - path = [ pkgs.hostapd ]; - wantedBy = [ "network.target" ]; - - after = [ "${wifi}-cfg.service" "nat.service" "bind.service" "dhcpd.service" "sys-subsystem-net-devices-${wifi}.device" ]; - - serviceConfig = { - ExecStart = "${pkgs.hostapd}/bin/hostapd ${pkgs.writeText "hostapd.conf" '' - interface=${wifi} - hw_mode=a - channel=36 - ieee80211d=1 - country_code=DE - ieee80211n=1 - ieee80211ac=1 - wmm_enabled=1 - - # 5ghz - ssid=krebsing - auth_algs=1 - wpa=2 - wpa_key_mgmt=WPA-PSK - rsn_pairwise=CCMP - wpa_passphrase=aidsballz - ''}"; - Restart = "always"; - }; - }; - - networking.bridges.br0.interfaces = [ - wifi - "et0" - ]; - - networking.interfaces.br0.ipv4.addresses = [ - { address = "10.99.0.1"; prefixLength = 24; } - ]; - services.dhcpd4 = { - enable = true; - interfaces = [ "br0" ]; - extraConfig = '' - option subnet-mask 255.255.255.0; - option routers 10.99.0.1; - option domain-name-servers 1.1.1.1, 8.8.8.8; - subnet 10.99.0.0 netmask 255.255.255.0 { - range 10.99.0.100 10.99.0.200; - } - ''; - }; - - boot.kernel.sysctl."net.ipv4.ip_forward" = 1; - krebs.iptables.tables.filter.FORWARD.rules = [ - { v6 = false; predicate = "-d 10.99.0.0/24 -o br0 -m conntrack --ctstate RELATED,ESTABLISHED"; target = "ACCEPT"; } - { v6 = false; predicate = "-s 10.99.0.0/24 -i br0"; target = "ACCEPT"; } - { v6 = false; predicate = "-i br0 -o br0"; target = "ACCEPT"; } - { v6 = false; predicate = "-i br0 -o br0"; target = "ACCEPT"; } - { v6 = false; predicate = "-o br0"; target = "REJECT --reject-with icmp-port-unreachable"; } - { v6 = false; predicate = "-i br0"; target = "REJECT --reject-with icmp-port-unreachable"; } - ]; - krebs.iptables.tables.nat.PREROUTING.rules = mkBefore [ - { v6 = false; predicate = "-s 10.99.0.0/24"; target = "ACCEPT"; } - ]; - krebs.iptables.tables.nat.POSTROUTING.rules = [ - #TODO find out what this is about? - { v6 = false; predicate = "-s 10.99.0.0/24 -d 224.0.0.0/24"; target = "RETURN"; } - { v6 = false; predicate = "-s 10.99.0.0/24 -d 255.255.255.255"; target = "RETURN"; } - - { v6 = false; predicate = "-s 10.99.0.0/24 ! -d 10.99.0.0/24"; target = "MASQUERADE"; } - { v6 = false; predicate = "-s 10.99.0.0/24 ! -d 10.99.0.0/24 -p tcp"; target = "MASQUERADE --to-ports 1024-65535"; } - { v6 = false; predicate = "-s 10.99.0.0/24 ! -d 10.99.0.0/24 -p udp"; target = "MASQUERADE --to-ports 1024-65535"; } - ]; -} diff --git a/lass/2configs/IM.nix b/lass/2configs/IM.nix deleted file mode 100644 index 8db2a05d..00000000 --- a/lass/2configs/IM.nix +++ /dev/null @@ -1,38 +0,0 @@ -with (import ); -{ config, lib, pkgs, ... }: let - weechat = pkgs.weechat.override { - configure = { availablePlugins, ... }: { - scripts = with pkgs.weechatScripts; [ - weechat-matrix - ]; - }; - }; - - tmux = "/run/current-system/sw/bin/tmux"; - -in { - imports = [ - ./bitlbee.nix - ]; - environment.systemPackages = [ weechat ]; - systemd.services.chat = { - description = "chat environment setup"; - environment.WEECHAT_HOME = "\$HOME/.weechat"; - after = [ "network.target" ]; - wantedBy = [ "multi-user.target" ]; - - restartIfChanged = false; - - path = [ - pkgs.rxvt-unicode-unwrapped.terminfo - ]; - - serviceConfig = { - User = "lass"; - RemainAfterExit = true; - Type = "oneshot"; - ExecStart = "${tmux} -2 new-session -d -s IM ${weechat}/bin/weechat"; - ExecStop = "${tmux} kill-session -t IM"; # TODO run save in weechat - }; - }; -} diff --git a/lass/2configs/ableton.nix b/lass/2configs/ableton.nix deleted file mode 100644 index 9d6f481b..00000000 --- a/lass/2configs/ableton.nix +++ /dev/null @@ -1,20 +0,0 @@ -{ config, pkgs, ... }: let - mainUser = config.users.extraUsers.mainUser; -in { - users.users= { - ableton = { - isNormalUser = true; - extraGroups = [ - "audio" - "video" - ]; - packages = [ - pkgs.wine - pkgs.winetricks - ]; - }; - }; - security.sudo.extraConfig = '' - ${mainUser.name} ALL=(ableton) NOPASSWD: ALL - ''; -} diff --git a/lass/2configs/alacritty.nix b/lass/2configs/alacritty.nix deleted file mode 100644 index 7f24e4a2..00000000 --- a/lass/2configs/alacritty.nix +++ /dev/null @@ -1,134 +0,0 @@ -{ config, lib, pkgs, ... }: let - - alacritty-cfg = extrVals: builtins.toJSON ({ - font = let - family = "Iosevka Term SS15"; - in { - normal = { - family = family; - style = "Regular"; - }; - bold = { - family = family; - style = "Bold"; - }; - italic = { - family = family; - style = "Italic"; - }; - bold_italic = { - family = family; - style = "Bold Italic"; - }; - size = 12; - }; - live_config_reload = true; - window.dimensions = { - columns = 80; - lines = 20; - }; - env.WINIT_X11_SCALE_FACTOR = "1.0"; - # window.opacity = 0; - hints.enabled = [ - { - regex = ''(mailto:|gemini:|gopher:|https:|http:|news:|file:|git:|ssh:|ftp:)[^\u0000-\u001F\u007F-\u009F<>"\s{-}\^⟨⟩`]+''; - command = "/run/current-system/sw/bin/xdg-open"; - post_processing = true; - mouse.enabled = true; - binding = { - key = "U"; - mods = "Alt"; - }; - } - ]; - } // extrVals); - - alacritty = pkgs.symlinkJoin { - name = "alacritty"; - paths = [ - (pkgs.writeDashBin "alacritty" '' - ${pkgs.alacritty}/bin/alacritty --config-file /var/theme/config/alacritty.yaml msg create-window "$@" || - ${pkgs.alacritty}/bin/alacritty --config-file /var/theme/config/alacritty.yaml "$@" - '') - pkgs.alacritty - ]; - }; - -in { - environment.etc = { - "themes/light/alacritty.yaml".text = alacritty-cfg { - colors = { - # Default colors - primary = { - # hard contrast: background = '#f9f5d7' - # background = "#fbf1c7"; - background = "#f9f5d7"; - # soft contrast: background = '#f2e5bc' - foreground = "#3c3836"; - }; - - # Normal colors - normal = { - black = "#fbf1c7"; - red = "#cc241d"; - green = "#98971a"; - yellow = "#d79921"; - blue = "#458588"; - magenta = "#b16286"; - cyan = "#689d6a"; - white = "#7c6f64"; - }; - - # Bright colors - bright = { - black = "#928374"; - red = "#9d0006"; - green = "#79740e"; - yellow = "#b57614"; - blue = "#076678"; - magenta = "#8f3f71"; - cyan = "#427b58"; - white = "#3c3836"; - }; - }; - }; - "themes/dark/alacritty.yaml".text = alacritty-cfg { - colors = { - # Default colors - primary = { - background = "0x000000"; - foreground = "0xffffff"; - }; - cursor = { - text = "0xF81CE5"; - cursor = "0xffffff"; - }; - - # Normal colors - normal = { - black = "0x000000"; - red = "0xfe0100"; - green = "0x33ff00"; - yellow = "0xfeff00"; - blue = "0x0066ff"; - magenta = "0xcc00ff"; - cyan = "0x00ffff"; - white = "0xd0d0d0"; - }; - - # Bright colors - bright = { - black = "0x808080"; - red = "0xfe0100"; - green = "0x33ff00"; - yellow = "0xfeff00"; - blue = "0x0066ff"; - magenta = "0xcc00ff"; - cyan = "0x00ffff"; - white = "0xFFFFFF"; - }; - }; - }; - }; - environment.systemPackages = [ alacritty ]; -} diff --git a/lass/2configs/antimicrox/default.nix b/lass/2configs/antimicrox/default.nix deleted file mode 100644 index 2b683b8b..00000000 --- a/lass/2configs/antimicrox/default.nix +++ /dev/null @@ -1,39 +0,0 @@ -{ config, lib, pkgs, ... }: -{ - systemd.services.antimicrox = { - after = [ "display-manager.service" ]; - wantedBy = [ "multi-user.target" ]; - environment = { - DISPLAY = ":0"; - }; - serviceConfig = { - User = config.users.users.mainUser.name; - ExecStartPre = lib.singleton (pkgs.writeDash "init_state" "echo 0 > /tmp/gamepad.state"); - ExecStart = "${pkgs.antimicrox}/bin/antimicrox --hidden --profile ${./mouse.gamecontroller.amgp}"; - }; - }; - - services.udev.extraRules = '' - KERNEL=="uinput", MODE="0660", GROUP="input", OPTIONS+="static_node=uinput" - ''; - - environment.systemPackages = [ - pkgs.antimicrox - (pkgs.writers.writeDashBin "gamepad_mouse_disable" '' - echo 1 > /tmp/gamepad.state - ${pkgs.antimicrox}/bin/antimicrox --profile ${./empty.gamecontroller.amgp} - '') - (pkgs.writers.writeDashBin "gamepad_mouse_enable" '' - echo 0 > /tmp/gamepad.state - ${pkgs.antimicrox}/bin/antimicrox --profile ${./mouse.gamecontroller.amgp} - '') - (pkgs.writers.writeDashBin "gamepad_mouse_toggle" '' - state=$(${pkgs.coreutils}/bin/cat /tmp/gamepad.state) - if [ "$state" = 1 ]; then - /run/current-system/sw/bin/gamepad_mouse_enable - else - /run/current-system/sw/bin/gamepad_mouse_disable - fi - '') - ]; -} diff --git a/lass/2configs/antimicrox/empty.gamecontroller.amgp b/lass/2configs/antimicrox/empty.gamecontroller.amgp deleted file mode 100644 index 0257bfe7..00000000 --- a/lass/2configs/antimicrox/empty.gamecontroller.amgp +++ /dev/null @@ -1,20 +0,0 @@ - - - - XInput Controller - - 030000005e0400008e020000010100001118654 - - - - - - - - - - R Stick - L Stick - - - diff --git a/lass/2configs/antimicrox/mouse.gamecontroller.amgp b/lass/2configs/antimicrox/mouse.gamecontroller.amgp deleted file mode 100644 index 743618f5..00000000 --- a/lass/2configs/antimicrox/mouse.gamecontroller.amgp +++ /dev/null @@ -1,281 +0,0 @@ - - - - XInput Controller - - 030000005e0400008e020000010100001118654 - - - - - - - - - - Stick 2 - Stick 1 - - - - - 1 - 29501 - 1412 - 90 - 100 - - 74 - 74 - 4 - 20 - 3 - easeoutquad - - - 1 - mousemovement - - - - - 74 - 74 - 4 - 20 - 3 - easeoutquad - - - 4 - mousemovement - - - - - 74 - 74 - - - 74 - 74 - 4 - 20 - 3 - easeoutquad - - - 2 - mousemovement - - - - - 74 - 74 - - - 74 - 74 - 4 - 20 - 3 - easeoutquad - - - 3 - mousemovement - - - - - 74 - 74 - - - 74 - 74 - - - - 2578 - 30799 - - linear - - - 4 - mousebutton - - - - - linear - - - 7 - mousebutton - - - - - linear - - - linear - - - 5 - mousebutton - - - - - linear - - - linear - - - 6 - mousebutton - - - - - linear - - - linear - - - - - 2 - 10 - - - 10 - 10 - - - 0x1000013 - keyboard - - - - - 2 - 10 - - - 2 - 10 - - - 0x1000014 - keyboard - - - - - 2 - 10 - - - 0x1000015 - keyboard - - - - - 2 - 10 - - - 2 - 10 - - - 2 - 10 - - - 0x1000012 - keyboard - - - - - - 2000 - positivehalf - - 100 - 100 - - - 100 - 100 - - - 250 - mousespeedmod - - - - - - positivehalf - - - - - - - - - - diff --git a/lass/2configs/atuin-server.nix b/lass/2configs/atuin-server.nix deleted file mode 100644 index 05d3b4fd..00000000 --- a/lass/2configs/atuin-server.nix +++ /dev/null @@ -1,10 +0,0 @@ -{ config, lib, pkgs, ... }: -{ - services.atuin = { - enable = true; - host = "0.0.0.0"; - maxHistoryLength = 1000000; - openFirewall = true; - }; - -} diff --git a/lass/2configs/autotether.nix b/lass/2configs/autotether.nix deleted file mode 100644 index 98712303..00000000 --- a/lass/2configs/autotether.nix +++ /dev/null @@ -1,16 +0,0 @@ -{ config, lib, pkgs, ... }: -{ - systemd.services.usb_tether = { - script = '' - ${pkgs.android-tools}/bin/adb -s QV770FAMEK wait-for-device - ${pkgs.android-tools}/bin/adb -s QV770FAMEK shell svc usb setFunctions rndis - ''; - }; - services.udev.extraRules = '' - ACTION=="add", SUBSYSTEM=="usb", ENV{PRODUCT}=="fce/320d/510", TAG+="systemd", ENV{SYSTEMD_WANTS}="usb_tether.service" - ''; - systemd.network.networks.android = { - matchConfig.Name = "enp0s20u1"; - DHCP = "yes"; - }; -} diff --git a/lass/2configs/baseX.nix b/lass/2configs/baseX.nix deleted file mode 100644 index e5b1f0b9..00000000 --- a/lass/2configs/baseX.nix +++ /dev/null @@ -1,196 +0,0 @@ -{ config, pkgs, ... }: -with import ; -let - user = config.krebs.build.user; -in { - imports = [ - ./alacritty.nix - ./mpv.nix - ./power-action.nix - ./urxvt.nix - ./xdg-open.nix - ./yubikey.nix - ./pipewire.nix - ./tmux.nix - ./xmonad.nix - ./themes.nix - ./fonts.nix - { - users.users.mainUser.packages = [ - pkgs.sshuttle - ]; - security.sudo.extraConfig = '' - lass ALL= (root) NOPASSWD:SETENV: ${pkgs.sshuttle}/bin/.sshuttle-wrapped - ''; - } - { #font magic - options.lass.fonts = { - regular = mkOption { - type = types.str; - default = "xft:Iosevka Term SS15:style=regular"; - }; - bold = mkOption { - type = types.str; - default = "xft:Iosevka Term SS15:style=bold"; - }; - italic = mkOption { - type = types.str; - default = "xft:Iosevka Term SS15:style=italic"; - }; - }; - config.krebs.xresources.resources.X = '' - *.font: ${config.lass.fonts.regular} - *.boldFont: ${config.lass.fonts.bold} - *.italicFont: ${config.lass.fonts.italic} - ''; - } - ]; - - users.users.mainUser.extraGroups = [ "audio" "pipewire" "video" ]; - - time.timeZone = "Europe/Berlin"; - - programs.ssh.agentTimeout = "10m"; - programs.ssh.startAgent = false; - services.openssh.forwardX11 = true; - - environment.systemPackages = with pkgs; [ - acpi - acpilight - ripgrep - cabal2nix - dic - dmenu - font-size - fzfmenu - gimp - gitAndTools.gh - git-crypt - git-preview - dconf - iodine - libarchive - lm_sensors - ncdu - nix-index - nixpkgs-review - nmap - pavucontrol - ponymix - powertop - rxvt-unicode - sshvnc - sxiv - nsxiv - taskwarrior - termite - transgui - wirelesstools - x11vnc - xclip - xephyrify - xorg.xmodmap - xorg.xhost - xdotool - xsel - zathura - flameshot - (pkgs.writeDashBin "screenshot" '' - set -efu - - ${pkgs.flameshot}/bin/flameshot gui && - ${pkgs.klem}/bin/klem - '') - (pkgs.writers.writeDashBin "IM" '' - ${pkgs.mosh}/bin/mosh green.r -- tmux new-session -A -s IM -- weechat - '') - (pkgs.writers.writeDashBin "deploy_hm" '' - target=$1 - shift - - hm_profile=$(${pkgs.home-manager}/bin/home-manager -f ~/sync/stockholm/lass/2configs/home-manager.nix build "$@") - nix-copy-closure --to "$target" "$hm_profile" - ssh "$target" -- "$hm_profile"/activate - '') - zbar - ]; - - services.udev.extraRules = '' - SUBSYSTEM=="backlight", ACTION=="add", \ - RUN+="${pkgs.coreutils}/bin/chgrp video /sys/class/backlight/%k/brightness", \ - RUN+="${pkgs.coreutils}/bin/chmod g+w /sys/class/backlight/%k/brightness" - ''; - - services.xserver = { - enable = true; - layout = "us"; - display = mkForce 0; - xkbVariant = "altgr-intl"; - xkbOptions = "caps:escape"; - libinput.enable = true; - exportConfiguration = true; - displayManager = { - lightdm.enable = true; - defaultSession = "none+xmonad"; - sessionCommands = '' - ${pkgs.xorg.xhost}/bin/xhost +LOCAL: - ''; - }; - }; - - nixpkgs.config.packageOverrides = super: { - dmenu = pkgs.writeDashBin "dmenu" '' - ${pkgs.fzfmenu}/bin/fzfmenu "$@" - ''; - }; - - krebs.xresources.enable = true; - - lass.klem = { - kpaste.script = pkgs.writeDash "kpaste-wrapper" '' - ${pkgs.kpaste}/bin/kpaste \ - | ${pkgs.coreutils}/bin/tail -1 \ - | ${pkgs.coreutils}/bin/tr -d '\r\n' - ''; - go = { - target = "STRING"; - script = "${pkgs.goify}/bin/goify"; - }; - "go.lassul.us" = { - target = "STRING"; - script = pkgs.writeDash "go.lassul.us" '' - export GO_HOST='go.lassul.us' - ${pkgs.goify}/bin/goify - ''; - }; - qrcode = { - target = "image"; - script = pkgs.writeDash "zbar" '' - ${pkgs.zbar}/bin/zbarimg -q --raw - - ''; - }; - ocr = { - target = "image"; - script = pkgs.writeDash "gocr" '' - ${pkgs.netpbm}/bin/pngtopnm - \ - | ${pkgs.gocr}/bin/gocr - - ''; - }; - }; - - services.clipmenu.enable = true; - - # synchronize all the clipboards - systemd.user.services.autocutsel = { - enable = true; - wantedBy = [ "graphical-session.target" ]; - after = [ "graphical-session.target" ]; - serviceConfig = { - Type = "forking"; - ExecStart = pkgs.writers.writeDash "autocutsel" '' - ${pkgs.autocutsel}/bin/autocutsel -fork -selection PRIMARY - ${pkgs.autocutsel}/bin/autocutsel -fork -selection CLIPBOARD - ''; - }; - }; -} diff --git a/lass/2configs/bgt-bot/bgt-check.sh b/lass/2configs/bgt-bot/bgt-check.sh deleted file mode 100644 index 30185ba1..00000000 --- a/lass/2configs/bgt-bot/bgt-check.sh +++ /dev/null @@ -1,57 +0,0 @@ -#!/bin/sh -# needs in path: -# curl gnugrep jq -# creates and manages $PWD/state -set -xeuf - -send_reaktor(){ - # usage: send_reaktor "text" - echo "send_reaktor: $1" - curl -fsS "http://localhost:$REAKTOR_PORT" \ - -H content-type:application/json \ - -d "$(jq -n \ - --arg text "$1" \ - --arg channel "$IRC_CHANNEL" \ - '{ - command:"PRIVMSG", - params:[$channel,$text] - }' - )" -} - -live=$(shuf -n1 < state -fi diff --git a/lass/2configs/bgt-bot/default.nix b/lass/2configs/bgt-bot/default.nix deleted file mode 100644 index 6f9e3370..00000000 --- a/lass/2configs/bgt-bot/default.nix +++ /dev/null @@ -1,44 +0,0 @@ -{ config, lib, pkgs, ... }: -let - - bot_port = "7654"; - irc_channel = "#binaergewitter"; -in -{ - krebs.reaktor2.bgt-announce = { - hostname = "irc.libera.chat"; - port = "6697"; - nick = "bgt-announce"; - API.listen = "inet://127.0.0.1:${bot_port}"; - plugins = [ - { - plugin = "register"; - config = { - channels = [ - irc_channel - ]; - }; - } - ]; - }; - systemd.services.check_bgt_show = { - startAt = "*:0/5"; - environment = { - IRC_CHANNEL = irc_channel; - REAKTOR_PORT = bot_port; - }; - path = with pkgs; [ - curl - gnugrep - jq - ]; - script = builtins.readFile ./bgt-check.sh; - serviceConfig = { - DynamicUser = true; - StateDirectory = "bgt-announce"; - WorkingDirectory = "/var/lib/bgt-announce"; - PrivateTmp = true; - }; - }; -} - diff --git a/lass/2configs/binary-cache/client.nix b/lass/2configs/binary-cache/client.nix deleted file mode 100644 index de15aff9..00000000 --- a/lass/2configs/binary-cache/client.nix +++ /dev/null @@ -1,17 +0,0 @@ -{ config, ... }: - -{ - nix = { - binaryCaches = [ - "http://cache.prism.r" - "http://cache.neoprism.r" - "https://cache.nixos.org/" - ]; - binaryCachePublicKeys = [ - "cache.prism-1:+S+6Lo/n27XEtvdlQKuJIcb1yO5NUqUCE2lolmTgNJU=" - "cache.prism-2:YwmCm3/s/D+SxrPKN/ETjlpw/219pNUbpnluatp6FKI=" - "hydra.nixos.org-1:CNHJZBh9K4tP3EKF6FkkgeVYsS3ohTl+oS0Qa8bezVs=" - ]; - }; -} - diff --git a/lass/2configs/binary-cache/proxy.nix b/lass/2configs/binary-cache/proxy.nix deleted file mode 100644 index a6ecb044..00000000 --- a/lass/2configs/binary-cache/proxy.nix +++ /dev/null @@ -1,13 +0,0 @@ -{ config, lib, pkgs, ...}: -{ - services.nginx = { - enable = true; - virtualHosts."cache.krebsco.de" = { - enableACME = true; - forceSSL = true; - locations."/".extraConfig = '' - proxy_pass http://cache.neoprism.r/; - ''; - }; - }; -} diff --git a/lass/2configs/binary-cache/server.nix b/lass/2configs/binary-cache/server.nix deleted file mode 100644 index 49060164..00000000 --- a/lass/2configs/binary-cache/server.nix +++ /dev/null @@ -1,31 +0,0 @@ -{ config, lib, pkgs, ...}: -{ - # nixpkgs.config.packageOverrides = p: { - # nix-serve = p.haskellPackages.nix-serve-ng; - # }; - # generate private key with: - # nix-store --generate-binary-cache-key my-secret-key my-public-key - services.nix-serve = { - enable = true; - secretKeyFile = toString + "/nix-serve.key"; - port = 5005; - }; - - services.nginx = { - enable = true; - virtualHosts.nix-serve = { - serverAliases = [ "cache.${config.networking.hostName}.r" ]; - locations."/".extraConfig = '' - proxy_pass http://localhost:${toString config.services.nix-serve.port}; - ''; - locations."= /nix-cache-info".extraConfig = '' - alias ${pkgs.writeText "cache-info" '' - StoreDir: /nix/store - WantMassQuery: 1 - Priority: 42 - ''}; - ''; - }; - }; -} - diff --git a/lass/2configs/bird.nix b/lass/2configs/bird.nix deleted file mode 100644 index 3fc265cd..00000000 --- a/lass/2configs/bird.nix +++ /dev/null @@ -1,13 +0,0 @@ -{ config, ... }: - -{ - config.services.bird = { - enable = true; - config = '' - router id 192.168.122.1; - protocol device { - scan time 10; - } - ''; - }; -} diff --git a/lass/2configs/bitcoin.nix b/lass/2configs/bitcoin.nix deleted file mode 100644 index e9dd055f..00000000 --- a/lass/2configs/bitcoin.nix +++ /dev/null @@ -1,34 +0,0 @@ -{ config, pkgs, ... }: - -let - mainUser = config.users.extraUsers.mainUser; -in { - - users.extraUsers = { - bitcoin = { - name = "bitcoin"; - description = "user for bitcoin stuff"; - home = "/home/bitcoin"; - useDefaultShell = true; - createHome = true; - packages = [ pkgs.electrum ]; - isNormalUser = true; - }; - monero = { - name = "monero"; - description = "user for monero stuff"; - home = "/home/monero"; - useDefaultShell = true; - createHome = true; - packages = [ - pkgs.monero - pkgs.monero-gui - ]; - isNormalUser = true; - }; - }; - security.sudo.extraConfig = '' - ${mainUser.name} ALL=(bitcoin) ALL - ${mainUser.name} ALL=(monero) ALL - ''; -} diff --git a/lass/2configs/bitlbee.nix b/lass/2configs/bitlbee.nix deleted file mode 100644 index 43573d89..00000000 --- a/lass/2configs/bitlbee.nix +++ /dev/null @@ -1,34 +0,0 @@ -with (import ); -{ config, lib, pkgs, ... }: - -{ - services.bitlbee = { - enable = true; - portNumber = 6666; - plugins = [ - pkgs.bitlbee-facebook - pkgs.bitlbee-steam - pkgs.bitlbee-discord - ]; - libpurple_plugins = [ - # pkgs.telegram-purple - # pkgs.tdlib-purple - # pkgs.purple-gowhatsapp - ]; - configDir = "/var/state/bitlbee"; - }; - - systemd.services.bitlbee.serviceConfig = { - ExecStartPre = [ - "+${pkgs.writeDash "setup-bitlbee" '' - ${pkgs.coreutils}/bin/chown bitlbee:bitlbee /var/state/bitlbee || : - ''}" - ]; - ReadWritePaths = [ - "/var/state/bitlbee" - ]; - }; - systemd.tmpfiles.rules = [ - "d /var/state/bitlbee 0700 - - -" - ]; -} diff --git a/lass/2configs/blue-host.nix b/lass/2configs/blue-host.nix deleted file mode 100644 index 532e55fe..00000000 --- a/lass/2configs/blue-host.nix +++ /dev/null @@ -1,116 +0,0 @@ -{ config, lib, pkgs, ... }: -with import ; -let - all_hosts = [ - "icarus" - "shodan" - "daedalus" - "skynet" - "prism" - "littleT" - ]; - remote_hosts = filter (h: h != config.networking.hostName) all_hosts; - -in { - imports = [ - - { #hack for already defined - systemd.services."container@blue".reloadIfChanged = mkForce false; - systemd.services."container@blue".preStart = '' - ${pkgs.mount}/bin/mount | ${pkgs.gnugrep}/bin/grep -q '^encfs on /var/lib/containers/blue' - ''; - systemd.services."container@blue".preStop = '' - /run/wrappers/bin/fusermount -u /var/lib/containers/blue - ''; - } - ]; - - system.activationScripts.containerPermissions = '' - mkdir -p /var/lib/containers - chmod 711 /var/lib/containers - ''; - - containers.blue = { - config = { ... }: { - environment.systemPackages = [ - pkgs.git - pkgs.rxvt-unicode-unwrapped.terminfo - ]; - services.openssh.enable = true; - users.users.root.openssh.authorizedKeys.keys = [ - config.krebs.users.lass.pubkey - ]; - }; - autoStart = false; - enableTun = true; - privateNetwork = true; - hostAddress = "10.233.2.9"; - localAddress = "10.233.2.10"; - }; - - - #systemd.services = builtins.listToAttrs (map (host: - # let - # in nameValuePair "sync-blue-${host}" { - # bindsTo = [ "container@blue.service" ]; - # wantedBy = [ "container@blue.service" ]; - # # ssh needed for rsync - # path = [ pkgs.openssh ]; - # serviceConfig = { - # Restart = "always"; - # RestartSec = 10; - # ExecStart = pkgs.writeDash "sync-blue-${host}" '' - # set -efu - # #make sure blue is running - # /run/wrappers/bin/ping -c1 blue.r > /dev/null - - # #make sure the container is unlocked - # ${pkgs.mount}/bin/mount | ${pkgs.gnugrep}/bin/grep -q '^encfs on /var/lib/containers/blue' - - # #make sure our target is reachable - # ${pkgs.untilport}/bin/untilport ${host}.r 22 2>/dev/null - - # #start sync - # ${pkgs.lsyncd}/bin/lsyncd -log scarce ${pkgs.writeText "lsyncd-config.lua" '' - # settings { - # nodaemon = true, - # inotifyMode = "CloseWrite or Modify", - # } - # sync { - # default.rsyncssh, - # source = "/var/lib/containers/.blue", - # host = "${host}.r", - # targetdir = "/var/lib/containers/.blue", - # rsync = { - # archive = true, - # owner = true, - # group = true, - # }; - # ssh = { - # binary = "${pkgs.openssh}/bin/ssh"; - # identityFile = "/var/lib/containers/blue/home/lass/.ssh/id_rsa", - # }, - # } - # ''} - # ''; - # }; - # unitConfig.ConditionPathExists = "!/var/run/ppp0.pid"; - # } - #) remote_hosts); - - environment.systemPackages = [ - (pkgs.writeDashBin "start-blue" '' - set -ef - if ! $(mount | ${pkgs.gnugrep}/bin/grep -qi '^encfs on /var/lib/containers/blue'); then - ${pkgs.encfs}/bin/encfs --public /var/lib/containers/.blue /var/lib/containers/blue - fi - nixos-container start blue - nixos-container run blue -- nixos-rebuild -I /var/src dry-build - if ping -c1 blue.r >/dev/null; then - echo 'blue is already running. bailing out' - exit 23 - fi - nixos-container run blue -- nixos-rebuild -I /var/src switch - '') - ]; -} diff --git a/lass/2configs/blue.nix b/lass/2configs/blue.nix deleted file mode 100644 index 2698f67e..00000000 --- a/lass/2configs/blue.nix +++ /dev/null @@ -1,33 +0,0 @@ -with (import ); -{ config, lib, pkgs, ... }: - -{ - imports = [ - ./mail.nix - ./pass.nix - ]; - - environment.systemPackages = with pkgs; [ - dic - nmap - git-preview - l-gen-secrets - ]; - - services.tor.enable = true; - services.tor.client.enable = true; - - krebs.iptables.tables.filter.INPUT.rules = [ - { predicate = "-i retiolum -p udp --dport 60000:61000"; target = "ACCEPT";} - { predicate = "-i wiregrill -p udp --dport 60000:61000"; target = "ACCEPT";} - { predicate = "-i retiolum -p tcp --dport 9998:9999"; target = "ACCEPT";} - { predicate = "-i wiregrill -p tcp --dport 9998:9999"; target = "ACCEPT";} - { predicate = "-i retiolum -p tcp --dport imap"; target = "ACCEPT";} - { predicate = "-i wiregrill -p tcp --dport imap"; target = "ACCEPT";} - ]; - - services.dovecot2 = { - enable = true; - mailLocation = "maildir:~/Maildir"; - }; -} diff --git a/lass/2configs/boot/coreboot.nix b/lass/2configs/boot/coreboot.nix deleted file mode 100644 index 1548cbc2..00000000 --- a/lass/2configs/boot/coreboot.nix +++ /dev/null @@ -1,10 +0,0 @@ -{ ... }: - -{ - boot = { - loader.grub.enable = true; - loader.grub.version = 2; - loader.grub.device = "/dev/sda"; - loader.grub.efiSupport = true; - }; -} diff --git a/lass/2configs/boot/stock-x220.nix b/lass/2configs/boot/stock-x220.nix deleted file mode 100644 index 54a382db..00000000 --- a/lass/2configs/boot/stock-x220.nix +++ /dev/null @@ -1,8 +0,0 @@ -{ ... }: - -{ - boot = { - loader.systemd-boot.enable = true; - loader.efi.canTouchEfiVariables = true; - }; -} diff --git a/lass/2configs/boot/universal.nix b/lass/2configs/boot/universal.nix deleted file mode 100644 index 33f4323c..00000000 --- a/lass/2configs/boot/universal.nix +++ /dev/null @@ -1,11 +0,0 @@ -{ ... }: - -{ - boot = { -