# # # { config, pkgs, lib, ... }: { imports = [ # hardware-dependent # device ./x13 # ./x230 # Common Hardware Components # # # # # # # # base { programs.adb.enable = true; } { services.openssh.hostKeys = [ { bits = 4096; path = (toString ); type = "rsa";} ]; } #{ # users.users.makefu.packages = with pkgs;[ mpc_cli ncmpcpp ]; # services.ympd.enable = true; # services.mpd = { # enable = true; # extraConfig = '' # log_level "default" # auto_update "yes" # audio_output { # type "httpd" # name "lassulus radio" # encoder "vorbis" # optional # port "8000" # quality "5.0" # do not define if bitrate is defined # # bitrate "128" # do not define if quality is defined # format "44100:16:2" # always_on "yes" # prevent MPD from disconnecting all listeners when playback is stopped. # tags "yes" # httpd supports sending tags to listening streams. # } # ''; # }; #} # { systemd.services.docker.wantedBy = lib.mkForce []; } # # #{ # netboot_server = { # network.wan = "wlp3s0"; # network.lan = "enp0s25"; # }; #} # Restore: # systemctl cat borgbackup-job-state # export BORG_PASSCOMMAND BORG_REPO BORG_RSH # borg list "$BORG_REPO" # mount newroot somewhere && cd somewhere # borg extract "$BORG_REPO::x-state-2019-04-17T01:41:51" --progress # < extract to cwd # # Debugging # # # Testing #{ # services.nginx = { # enable = true; # recommendedProxySettings = true; # virtualHosts.local = { # default = true; # locations."/".proxyPass= "http://localhost:4567"; # }; # }; # services.gollum = { # enable = true; # extraConfig = '' # Gollum::Hook.register(:post_commit, :hook_id) do |committer, sha1| # File.open('/tmp/lol', 'w') { |file| file.write(self.to_s) } # end # ''; # }; #} # # # # # # # # # # # Krebs # # # # applications # # Virtualization # #{ # networking.firewall.allowedTCPPorts = [ 8080 ]; # networking.nat = { # enable = true; # externalInterface = "wlp3s0"; # internalInterfaces = [ "vboxnet0" ]; # }; #} # Services # # # # { nixpkgs.overlays = [ (self: super: super.prefer-remote-fetch self super) ]; } # # Security # # temporary # { services.redis.enable = true; } # { services.mongodb.enable = true; } # { services.elasticsearch.enable = true; } # # # # # # # # { networking.wireguard.interfaces.wg0 = { ips = [ "10.244.0.2/24" ]; privateKeyFile = (toString ) + "/wireguard.key"; allowedIPsAsRoutes = true; peers = [ { # gum endpoint = "${config.krebs.hosts.gum.nets.internet.ip4.addr}:51820"; allowedIPs = [ "10.244.0.0/24" ]; publicKey = "yAKvxTvcEVdn+MeKsmptZkR3XSEue+wSyLxwcjBYxxo="; } #{ # # vbob # allowedIPs = [ "10.244.0.3/32" ]; # publicKey = "Lju7EsCu1OWXhkhdNR7c/uiN60nr0TUPHQ+s8ULPQTw="; #} ]; }; } ]; nixpkgs.config.allowUnfree = true; nixpkgs.config.oraclejdk.accept_license = true; # configure pulseAudio to provide a HDMI sink as well networking.firewall.enable = true; networking.firewall.allowedUDPPorts = [ 665 26061 1514 ]; networking.firewall.trustedInterfaces = [ "vboxnet0" "enp0s25" ]; krebs.build.host = config.krebs.hosts.x; #krebs.tinc.retiolum.connectTo = lib.mkForce [ "gum" ]; #krebs.tinc.retiolum.extraConfig = "AutoConnect = no"; environment.systemPackages = [ pkgs.passwdqc-utils ]; # environment.variables = { GOROOT = [ "${pkgs.go.out}/share/go" ]; }; state = [ "/home/makefu/stockholm" "/home/makefu/.ssh/" "/home/makefu/.zsh_history" "/home/makefu/.bash_history" "/home/makefu/bin" "/home/makefu/.gnupg" "/home/makefu/.imapfilter" "/home/makefu/.mutt" "/home/makefu/docs" "/home/makefu/notes" "/home/makefu/.password-store" "/home/makefu/.secrets-pass" "/home/makefu/.config/syncthing" ]; # services.syncthing.user = lib.mkForce "makefu"; # services.syncthing.dataDir = lib.mkForce "/home/makefu/.config/syncthing/"; }