{ config, pkgs, ... }: let shack-ip = config.krebs.build.host.nets.shack.ip4.addr; ext-if = "et0"; external-mac = "52:54:b0:0b:af:fe"; in { imports = [ # handle the worlddomination map via coap # drivedroid.shack for shackphone # # Say if muell will be collected # provide muellshack api # provide light control api # send mail if muell was not handled # send mail if muell was not handled # powerraw usb serial to mqtt and raw socket { # do not log to /var/spool/log services.nginx.appendHttpConfig = '' map $request_method $loggable { default 1; GET 0; } log_format vhost '$host $remote_addr - $remote_user ' '[$time_local] "$request" $status ' '$body_bytes_sent "$http_referer" ' '"$http_user_agent"'; error_log stderr; access_log syslog:server=unix:/dev/log vhost; ''; services.journald.rateLimitBurst = 10000; } # create samba share for anonymous usage with the laser and 3d printer pc # mobile.lounge.mpd.shack # hass.shack # connect to git.shackspace.de as group runner for rz # Statistics collection and visualization # # graphiteApi is broken and unused(hopefully) ## Collect data from mqtt.shack and store in graphite database ## Collect radioactive data and put into graphite ## mqtt.shack ## influx.shack ## Collect local statistics via collectd and send to collectd # prometheus.shack # # # grafana.shack # shackdns.shack # replacement for leases.shack and shackles.shack # misc ]; # use your own binary cache, fallback use cache.nixos.org (which is used by # apt-cacher-ng in first place) # local discovery in shackspace nixpkgs.config.packageOverrides = pkgs: { tinc = pkgs.tinc_pre; }; krebs.tinc.retiolum.extraConfig = "TCPOnly = yes"; networking = { firewall.enable = false; firewall.allowedTCPPorts = [ 8088 8086 8083 ]; interfaces."${ext-if}".ipv4.addresses = [ { address = shack-ip; prefixLength = 20; } ]; defaultGateway = "10.42.0.1"; nameservers = [ "10.42.0.100" "10.42.0.200" ]; }; ##################### # uninteresting stuff ##################### krebs.build.host = config.krebs.hosts.wolf; boot.kernel.sysctl = { # Enable IPv6 Privacy Extensions "net.ipv6.conf.all.use_tempaddr" = 2; "net.ipv6.conf.default.use_tempaddr" = 2; }; boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "ehci_pci" "virtio_pci" "virtio_blk" ]; boot.kernelModules = [ ]; boot.extraModulePackages = [ ]; boot.loader.grub.enable = true; boot.loader.grub.version = 2; boot.loader.grub.device = "/dev/vda"; # without it `/nix/store` is not added grub paths boot.loader.grub.copyKernels = true; fileSystems."/" = { device = "/dev/disk/by-label/nixos"; fsType = "ext4"; }; services.udev.extraRules = '' SUBSYSTEM=="net", ATTR{address}=="${external-mac}", NAME="${ext-if}" ''; time.timeZone = "Europe/Berlin"; sound.enable = false; # avahi services.avahi = { enable = true; wideArea = false; }; environment.systemPackages = [ pkgs.avahi ]; }