{ config, lib, pkgs, ... }: with import <stockholm/lib>; let external-ip = config.krebs.build.host.nets.internet.ip4.addr; ext-if = config.makefu.server.primary-itf; allDisks = [ "/dev/sda" "/dev/sdb" ]; in { imports = [ <stockholm/makefu> ./hetznercloud { users.users.lass = { uid = 19002; isNormalUser = true; createHome = true; useDefaultShell = true; openssh.authorizedKeys.keys = with config.krebs.users; [ lass.pubkey makefu.pubkey ]; }; } <stockholm/makefu/2configs/nur.nix> <stockholm/makefu/2configs/support-nixos.nix> <stockholm/makefu/2configs/nix-community/supervision.nix> <stockholm/makefu/2configs/home-manager> <stockholm/makefu/2configs/home-manager/cli.nix> # <stockholm/makefu/2configs/stats/client.nix> <stockholm/makefu/2configs/share> <stockholm/makefu/2configs/share/hetzner-client.nix> # <stockholm/makefu/2configs/stats/netdata-server.nix> <stockholm/makefu/2configs/headless.nix> # Security <stockholm/makefu/2configs/sshd-totp.nix> # Tools <stockholm/makefu/2configs/tools/core.nix> <stockholm/makefu/2configs/tools/dev.nix> <stockholm/makefu/2configs/tools/sec.nix> #<stockholm/makefu/2configs/tools/desktop.nix> <stockholm/makefu/2configs/zsh-user.nix> <stockholm/makefu/2configs/mosh.nix> <stockholm/makefu/2configs/storj/forward-port.nix> # <stockholm/makefu/2configs/gui/xpra.nix> # networking # <stockholm/makefu/2configs/vpn/vpnws/server.nix> #<stockholm/makefu/2configs/dnscrypt/server.nix> # <stockholm/makefu/2configs/iodined.nix> # <stockholm/makefu/2configs/backup.nix> <stockholm/makefu/2configs/tinc/retiolum.nix> { # bonus retiolum config for connecting more hosts krebs.tinc.retiolum = { #extraConfig = lib.mkForce '' # ListenAddress = ${external-ip} 53 # ListenAddress = ${external-ip} 655 # ListenAddress = ${external-ip} 21031 # StrictSubnets = yes # LocalDiscovery = no #''; connectTo = [ "prism" "ni" "enklave" "eve" "dishfire" ]; }; networking.firewall = { allowedTCPPorts = [ 53 655 21031 ]; allowedUDPPorts = [ 53 655 21031 ]; }; } # ci # <stockholm/makefu/2configs/exim-retiolum.nix> <stockholm/makefu/2configs/git/cgit-retiolum.nix> ### systemdUltras ### <stockholm/makefu/2configs/systemdultras/ircbot.nix> ###### Shack ##### # <stockholm/makefu/2configs/shack/events-publisher> # <stockholm/makefu/2configs/shack/gitlab-runner> <stockholm/makefu/2configs/remote-build/slave.nix> <stockholm/makefu/2configs/remote-build/aarch64-community.nix> <stockholm/makefu/2configs/taskd.nix> # services <stockholm/makefu/2configs/bitlbee.nix> # postgres backend # <stockholm/makefu/2configs/sabnzbd.nix> # <stockholm/makefu/2configs/mail/mail.euer.nix> { krebs.exim.enable = mkDefault true; } # sharing <stockholm/makefu/2configs/share/gum.nix> # samba sahre <stockholm/makefu/2configs/torrent/rtorrent.nix> # <stockholm/makefu/2configs/sickbeard> { nixpkgs.config.allowUnfree = true; } #<stockholm/makefu/2configs/retroshare.nix> ## <stockholm/makefu/2configs/ipfs.nix> #<stockholm/makefu/2configs/syncthing.nix> # <stockholm/makefu/2configs/sync> # <stockholm/makefu/2configs/opentracker.nix> ## network # <stockholm/makefu/2configs/vpn/openvpn-server.nix> # <stockholm/makefu/2configs/vpn/vpnws/server.nix> <stockholm/makefu/2configs/binary-cache/server.nix> { makefu.backup.server.repo = "/var/backup/borg"; } <stockholm/makefu/2configs/backup/server.nix> <stockholm/makefu/2configs/backup/state.nix> <stockholm/makefu/2configs/wireguard/server.nix> # <stockholm/makefu/2configs/wireguard/wiregrill.nix> { # recent changes mediawiki bot networking.firewall.allowedUDPPorts = [ 5005 5006 ]; } # Removed until move: no extra mails # <stockholm/makefu/2configs/urlwatch> # Removed until move: avoid letsencrypt ban ### Web <stockholm/makefu/2configs/bitwarden.nix> # postgres backend <stockholm/makefu/2configs/deployment/rss/rss.euer.krebsco.de.nix> # postgres backend <stockholm/makefu/2configs/deployment/rss/ratt.nix> <stockholm/makefu/2configs/deployment/owncloud.nix> #postgres backend ### Moving owncloud data dir to /media/cloud/nextcloud-data { users.users.nextcloud.extraGroups = [ "download" ]; # nextcloud-setup fails as it cannot set permissions for nextcloud systemd.services.nextcloud-setup.serviceConfig.SuccessExitStatus = "0 1"; systemd.tmpfiles.rules = [ "L /var/lib/nextcloud/data - - - - /media/cloud/nextcloud-data" "L /var/backup - - - - /media/cloud/gum-backup" ]; #fileSystems."/var/lib/nextcloud/data" = { # device = "/media/cloud/nextcloud-data"; # options = [ "bind" ]; #}; #fileSystems."/var/backup" = { # device = "/media/cloud/gum-backup"; # options = [ "bind" ]; #}; } <stockholm/makefu/2configs/nginx/dl.euer.krebsco.de.nix> #<stockholm/makefu/2configs/nginx/euer.test.nix> <stockholm/makefu/2configs/nginx/euer.mon.nix> <stockholm/makefu/2configs/nginx/euer.wiki.nix> <stockholm/makefu/2configs/nginx/euer.blog.nix> <stockholm/makefu/2configs/nginx/music.euer.nix> ## <stockholm/makefu/2configs/nginx/gum.krebsco.de.nix> #<stockholm/makefu/2configs/nginx/public_html.nix> #<stockholm/makefu/2configs/nginx/update.connector.one.nix> <stockholm/makefu/2configs/nginx/misa-felix-hochzeit.ml.nix> # <stockholm/makefu/2configs/nginx/gold.krebsco.de.nix> # <stockholm/makefu/2configs/nginx/iso.euer.nix> # <stockholm/makefu/2configs/deployment/photostore.krebsco.de.nix> <stockholm/makefu/2configs/deployment/graphs.nix> #<stockholm/makefu/2configs/deployment/owncloud.nix> # <stockholm/makefu/2configs/deployment/board.euer.krebsco.de.nix> #<stockholm/makefu/2configs/deployment/feed.euer.krebsco.de> <stockholm/makefu/2configs/deployment/boot-euer.nix> <stockholm/makefu/2configs/deployment/gecloudpad> #<stockholm/makefu/2configs/deployment/docker/archiveteam-warrior.nix> <stockholm/makefu/2configs/deployment/mediengewitter.de.nix> <stockholm/makefu/2configs/bgt/etherpad.euer.krebsco.de.nix> # <stockholm/makefu/2configs/deployment/systemdultras-rss.nix> # <stockholm/makefu/2configs/shiori.nix> #<stockholm/makefu/2configs/workadventure> <stockholm/makefu/2configs/bgt/download.binaergewitter.de.nix> <stockholm/makefu/2configs/bgt/hidden_service.nix> <stockholm/makefu/2configs/bgt/backup.nix> # <stockholm/makefu/2configs/bgt/social-to-irc.nix> # <stockholm/makefu/2configs/logging/client.nix> # sharing <stockholm/makefu/2configs/dcpp/airdcpp.nix> { krebs.airdcpp.dcpp.shares = { download.path = config.makefu.dl-dir + "/finished"; sorted.path = config.makefu.dl-dir + "/sorted"; }; } <stockholm/makefu/2configs/dcpp/hub.nix> ## Temporary: # <stockholm/makefu/2configs/temp/rst-issue.nix> # <stockholm/makefu/2configs/virtualisation/docker.nix> #<stockholm/makefu/2configs/virtualisation/libvirt.nix> # krebs infrastructure services # <stockholm/makefu/2configs/stats/server.nix> ]; # makefu.dl-dir = "/var/download"; makefu.dl-dir = "/media/cloud/download/finished"; services.openssh.hostKeys = lib.mkForce [ { bits = 4096; path = (toString <secrets/ssh_host_rsa_key>); type = "rsa"; } { path = (toString <secrets/ssh_host_ed25519_key>); type = "ed25519"; } ]; ###### stable security.acme.certs."cgit.euer.krebsco.de" = { email = "letsencrypt@syntax-fehler.de"; webroot = "/var/lib/acme/acme-challenge"; group = "nginx"; }; services.nginx.virtualHosts."cgit" = { serverAliases = [ "cgit.euer.krebsco.de" ]; addSSL = true; sslCertificate = "/var/lib/acme/cgit.euer.krebsco.de/fullchain.pem"; sslCertificateKey = "/var/lib/acme/cgit.euer.krebsco.de/key.pem"; locations."/.well-known/acme-challenge".extraConfig = '' root /var/lib/acme/acme-challenge; ''; }; krebs.build.host = config.krebs.hosts.gum; # Network networking = { firewall = { allowedTCPPorts = [ 80 443 28967 # storj ]; allowPing = true; logRefusedConnections = false; }; nameservers = [ "8.8.8.8" ]; }; users.users.makefu.extraGroups = [ "download" "nginx" ]; state = [ "/home/makefu/.weechat" ]; }