diff options
| -rw-r--r-- | krebs/5pkgs/simple/internetarchive/default.nix | 33 | ||||
| -rw-r--r-- | makefu/1systems/filepimp/config.nix | 5 | ||||
| -rw-r--r-- | makefu/1systems/gum/config.nix | 27 | ||||
| -rw-r--r-- | makefu/1systems/omo/config.nix | 5 | ||||
| -rw-r--r-- | makefu/1systems/vbob/config.nix | 29 | ||||
| -rw-r--r-- | makefu/5pkgs/gen-oath-safe/default.nix | 5 | 
6 files changed, 77 insertions, 27 deletions
| diff --git a/krebs/5pkgs/simple/internetarchive/default.nix b/krebs/5pkgs/simple/internetarchive/default.nix index f5e1bbff3..2f55e6f42 100644 --- a/krebs/5pkgs/simple/internetarchive/default.nix +++ b/krebs/5pkgs/simple/internetarchive/default.nix @@ -1,38 +1,39 @@ -{ pkgs, fetchFromGitHub, ... }: +{ stdenv, pkgs, fetchPypi, ... }:  with pkgs.python3Packages;  buildPythonPackage rec {    pname = "internetarchive";    version = "1.7.3";    name = "${pname}-${version}"; + +  src = fetchPypi { +    inherit pname version; +    sha256 = "0x3saklabdx7qrr11h5bjfd75hfbih7pw5gvl2784zvvvrqrz45g"; +  }; +    propagatedBuildInputs = [      requests -      jsonpatch -      docopt -      clint -      six -      schema -      backports_csv +    jsonpatch +    docopt +    clint +    six +    schema +    backports_csv    ]; -# check only works when cloned from git repo +  # check only works when cloned from git repo    doCheck = false; +    checkInputs = [      pytest -      responses +    responses    ];    prePatch = ''      sed -i "s/'schema.*'/'schema>=0.4.0'/" setup.py -    ''; - -  src = fetchPypi { -    inherit pname version; -    sha256 = "0x3saklabdx7qrr11h5bjfd75hfbih7pw5gvl2784zvvvrqrz45g"; -  }; +  '';    meta = with stdenv.lib; {      description = "python library and cli for uploading files to internet archive";      license = licenses.agpl3;    }; -  } diff --git a/makefu/1systems/filepimp/config.nix b/makefu/1systems/filepimp/config.nix index e9058ec85..30ba61a9b 100644 --- a/makefu/1systems/filepimp/config.nix +++ b/makefu/1systems/filepimp/config.nix @@ -71,7 +71,10 @@ in {      '') allDisks);    fileSystems = let      xfsmount = name: dev: -      { "/media/${name}" = { device = dev; fsType = "xfs"; }; }; +      { "/media/${name}" = { +        device = dev; fsType = "xfs"; +        options = [ "nofail" ]; +      }; };    in    # (xfsmount "j0" (part1 jDisk0)) //      (xfsmount "j1" (part1 jDisk1)) // diff --git a/makefu/1systems/gum/config.nix b/makefu/1systems/gum/config.nix index 1fe0b62f9..6e5f3c2d4 100644 --- a/makefu/1systems/gum/config.nix +++ b/makefu/1systems/gum/config.nix @@ -108,16 +108,35 @@ in {        #  };        #}        { # wireguard server -        networking.firewall.allowedUDPPorts = [ 51820 ]; + +        # TODO: networking.nat + +        # boot.kernel.sysctl."net.ipv4.ip_forward" = 1; +        # conf.all.proxy_arp =1 +        networking.firewall = { +          allowedUDPPorts = [ 51820 ]; +          extraCommands = '' +            iptables -t nat -A POSTROUTING -s 10.244.0.0/24 -o ${ext-if} -j MASQUERADE +          ''; +        }; +          networking.wireguard.interfaces.wg0 = {            ips = [ "10.244.0.1/24" ]; +          listenPort = 51820;            privateKeyFile = (toString <secrets>) + "/wireguard.key";            allowedIPsAsRoutes = true; -          peers = [{ -            # allowedIPs = [ "0.0.0.0/0" "::/0" ]; +          peers = [ +          { +            # x              allowedIPs = [ "10.244.0.2/32" ];              publicKey = "fe5smvKVy5GAn7EV4w4tav6mqIAKhGWQotm7dRuRt1g="; -          }]; +          } +          { +            # vbob +            allowedIPs = [ "10.244.0.3/32" ]; +            publicKey = "Lju7EsCu1OWXhkhdNR7c/uiN60nr0TUPHQ+s8ULPQTw="; +          } +          ];          };        } diff --git a/makefu/1systems/omo/config.nix b/makefu/1systems/omo/config.nix index aaecebadc..ce3ffbcf3 100644 --- a/makefu/1systems/omo/config.nix +++ b/makefu/1systems/omo/config.nix @@ -143,7 +143,10 @@ in {    ];    fileSystems = let      cryptMount = name: -      { "/media/${name}" = { device = "/dev/mapper/${name}"; fsType = "xfs"; };}; +      { "/media/${name}" = { +        device = "/dev/mapper/${name}"; fsType = "xfs"; +        options = [ "nofail" ]; +      };};    in   cryptMount "crypt0"      // cryptMount "crypt1"      // cryptMount "crypt2" diff --git a/makefu/1systems/vbob/config.nix b/makefu/1systems/vbob/config.nix index f318c0e61..d4b80c90e 100644 --- a/makefu/1systems/vbob/config.nix +++ b/makefu/1systems/vbob/config.nix @@ -7,7 +7,8 @@        <stockholm/makefu>        {          imports = [<stockholm/makefu/2configs/fs/single-partition-ext4.nix> ]; -        boot.loader.grub.device = "/dev/vda"; +        boot.loader.grub.device = "/dev/sda"; +        virtualisation.virtualbox.guest.enable = true;        }        # {        #   imports = [ @@ -49,6 +50,30 @@        # environment        <stockholm/makefu/2configs/tinc/retiolum.nix> +      (let +        gum-ip = config.krebs.hosts.gum.nets.internet.ip4.addr; +        Gateway = "10.0.2.2"; +      in { +        networking.localCommands = '' +          ip route add ${gum-ip} via ${Gateway} +        ''; + +        networking.wireguard.interfaces.wg0 = { +          ips = [ "10.244.0.3/24" ]; +          privateKeyFile = (toString <secrets>) + "/wireguard.key"; +          allowedIPsAsRoutes = true; +          # explicit route via eth0 to gum +          peers = [ +          { +            # gum +            endpoint = "${gum-ip}:51820"; +            # allowedIPs = [ "10.244.0.0/24" ]; +            allowedIPs = [ "0.0.0.0/0" ]; +            publicKey = "yAKvxTvcEVdn+MeKsmptZkR3XSEue+wSyLxwcjBYxxo="; +          } +          ]; +        }; +      })      ];    networking.extraHosts = import (toString <secrets/extra-hosts.nix>); @@ -90,5 +115,5 @@      8010    ]; - +  systemd.services."serial-getty@ttyS0".enable = true;  } diff --git a/makefu/5pkgs/gen-oath-safe/default.nix b/makefu/5pkgs/gen-oath-safe/default.nix index 344dc1a02..bad4b08a8 100644 --- a/makefu/5pkgs/gen-oath-safe/default.nix +++ b/makefu/5pkgs/gen-oath-safe/default.nix @@ -1,7 +1,6 @@  { coreutils, makeWrapper, openssl, libcaca, qrencode, fetchFromGitHub, yubikey-manager, python, stdenv, ... }: -builtins.trace "Warning: HTOP mode of gen-oath-safe is currently broken" -  stdenv.mkDerivation { +stdenv.mkDerivation {    name = "gen-oath-safe-2017-06-30";    src = fetchFromGitHub {      owner = "mcepl"; @@ -24,7 +23,7 @@ builtins.trace "Warning: HTOP mode of gen-oath-safe is currently broken"          coreutils          openssl          qrencode -        #yubikey-manager +        yubikey-manager          libcaca          python        ]; | 
