diff options
| -rw-r--r-- | 0make/lass/cloudkrebs.makefile | 4 | ||||
| -rw-r--r-- | 2configs/lass/git-repos.nix | 140 | ||||
| -rw-r--r-- | 3modules/krebs/default.nix | 91 | ||||
| -rw-r--r-- | lass/1systems/cloudkrebs.nix | 45 | ||||
| -rw-r--r-- | lass/1systems/mors.nix (renamed from 1systems/lass/mors.nix) | 63 | ||||
| -rw-r--r-- | lass/1systems/uriel.nix (renamed from 1systems/lass/uriel.nix) | 68 | ||||
| -rw-r--r-- | lass/2configs/base.nix (renamed from 2configs/lass/base.nix) | 75 | ||||
| -rw-r--r-- | lass/2configs/binary-caches.nix (renamed from 2configs/lass/binary-caches.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/bird.nix (renamed from 2configs/lass/bird.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/bitcoin.nix (renamed from 2configs/lass/bitcoin.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/browsers.nix (renamed from 2configs/lass/browsers.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/chromium-patched.nix (renamed from 2configs/lass/chromium-patched.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/desktop-base.nix (renamed from 2configs/lass/desktop-base.nix) | 6 | ||||
| -rw-r--r-- | lass/2configs/elster.nix (renamed from 2configs/lass/elster.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/fastpoke-pages.nix | 97 | ||||
| -rw-r--r-- | lass/2configs/games.nix (renamed from 2configs/lass/games.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/gitolite-base.nix (renamed from 2configs/lass/gitolite-base.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/identity.nix | 48 | ||||
| -rw-r--r-- | lass/2configs/ircd.nix (renamed from 2configs/lass/ircd.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/mors/repos.nix (renamed from 2configs/lass/mors/repos.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/mors/retiolum.nix (renamed from 2configs/lass/mors/retiolum.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/new-repos.nix | 77 | ||||
| -rw-r--r-- | lass/2configs/pass.nix (renamed from 2configs/lass/pass.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/programs.nix (renamed from 2configs/lass/programs.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/retiolum.nix | 28 | ||||
| -rw-r--r-- | lass/2configs/sshkeys.nix (renamed from 2configs/lass/sshkeys.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/steam.nix (renamed from 2configs/lass/steam.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/texlive.nix (renamed from 2configs/lass/texlive.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/urxvt.nix (renamed from 2configs/lass/urxvt.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/vim.nix (renamed from 2configs/lass/vim.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/virtualbox.nix (renamed from 2configs/lass/virtualbox.nix) | 0 | ||||
| -rw-r--r-- | lass/2configs/wine.nix (renamed from 2configs/lass/wine.nix) | 0 | ||||
| -rw-r--r-- | lass/3modules/default.nix | 8 | ||||
| -rw-r--r-- | lass/3modules/iptables.nix (renamed from 3modules/lass/iptables.nix) | 2 | ||||
| -rw-r--r-- | lass/3modules/sshkeys.nix (renamed from 3modules/lass/sshkeys.nix) | 0 | ||||
| -rw-r--r-- | lass/3modules/urxvtd.nix (renamed from 3modules/lass/urxvtd.nix) | 0 | ||||
| -rw-r--r-- | lass/3modules/xresources.nix (renamed from 3modules/lass/xresources.nix) | 0 | 
37 files changed, 496 insertions, 256 deletions
diff --git a/0make/lass/cloudkrebs.makefile b/0make/lass/cloudkrebs.makefile new file mode 100644 index 000000000..baf7660b4 --- /dev/null +++ b/0make/lass/cloudkrebs.makefile @@ -0,0 +1,4 @@ +deploy_host := root@cloudkrebs +nixpkgs_url := https://github.com/Lassulus/nixpkgs +nixpkgs_rev := 1879a011925c561f0a7fd4043da0768bbff41d0b +secrets_dir := /home/lass/secrets/cloudkrebs diff --git a/2configs/lass/git-repos.nix b/2configs/lass/git-repos.nix deleted file mode 100644 index c0c305b85..000000000 --- a/2configs/lass/git-repos.nix +++ /dev/null @@ -1,140 +0,0 @@ -{ config, lib, pkgs, ... }: - -let -  inherit (builtins) map readFile; -  inherit (lib) concatMap listToAttrs; -  # TODO lib should already include our stuff -  inherit (import ../../4lib/tv { inherit lib pkgs; }) addNames git; - -  x-repos = [ -    (krebs-private "brain") - -    (public "painload") -    (public "shitment") -    (public "wai-middleware-time") -    (public "web-routes-wai-custom") - -    (secret "pass") - -    (tv-lass "emse-drywall") -    (tv-lass "emse-hsdb") -  ]; - -  users = addNames { -    tv = { pubkey = readFile ../../Zpubkeys/tv_wu.ssh.pub; }; -    lass = { pubkey = readFile ../../Zpubkeys/lass.ssh.pub; }; -    uriel = { pubkey = readFile ../../Zpubkeys/uriel.ssh.pub; }; -    makefu = { pubkey = readFile ../../Zpubkeys/makefu.ssh.pub; }; -  }; - -  repos = listToAttrs (map ({ repo, ... }: { name = repo.name; value = repo; }) x-repos); - -  rules = concatMap ({ rules, ... }: rules) x-repos; - -  krebs-private = repo-name: -    rec { -      repo = { -        name = repo-name; -        hooks = { -          post-receive = git.irc-announce { -            nick = config.networking.hostName; # TODO make this the default -            channel = "#retiolum"; -            server = "ire.retiolum"; -          }; -        }; -      }; -      rules = with git; with users; [ -        { user = lass; -          repo = [ repo ]; -          perm = push "refs/*" [ non-fast-forward create delete merge ]; -        } -        { user = [ tv makefu uriel ]; -          repo = [ repo ]; -          perm = fetch; -        } -      ]; -    }; - -  public = repo-name: -    rec { -      repo = { -        name = repo-name; -        hooks = { -          post-receive = git.irc-announce { -            nick = config.networking.hostName; # TODO make this the default -            channel = "#retiolum"; -            server = "ire.retiolum"; -          }; -        }; -        public = true; -      }; -      rules = with git; with users; [ -        { user = lass; -          repo = [ repo ]; -          perm = push "refs/*" [ non-fast-forward create delete merge ]; -        } -        { user = [ tv makefu uriel ]; -          repo = [ repo ]; -          perm = fetch; -        } -      ]; -    }; - -  secret = repo-name: -    rec { -      repo = { -        name = repo-name; -        hooks = {}; -      }; -      rules = with git; with users; [ -        { user = lass; -          repo = [ repo ]; -          perm = push "refs/*" [ non-fast-forward create delete merge ]; -        } -        { user = [ uriel ]; -          repo = [ repo ]; -          perm = fetch; -        } -      ]; -    }; - -  tv-lass = repo-name: -    rec { -      repo = { -        name = repo-name; -        hooks = {}; -      }; -      rules = with git; with users; [ -        { user = lass; -          repo = [ repo ]; -          perm = push "refs/*" [ non-fast-forward create delete merge ]; -        } -        { user = [ tv ]; -          repo = [ repo ]; -          perm = fetch; -        } -      ]; -    }; - -in - -{ -  imports = [ -    ../../3modules/tv/git.nix -    ../../3modules/lass/iptables.nix -  ]; - -  tv.git = { -    enable = true; -    inherit repos rules users; -  }; - -  lass.iptables = { -    tables = { -      filter.INPUT.rules = [ -        { predicate = "-i retiolum -p tcp --dport 80"; target = "ACCEPT"; } -      ]; -    }; -  }; - -} diff --git a/3modules/krebs/default.nix b/3modules/krebs/default.nix index 9e25df0bf..a53597fbe 100644 --- a/3modules/krebs/default.nix +++ b/3modules/krebs/default.nix @@ -167,6 +167,11 @@ let          de.krebsco = "ovh";          internet = "hosts";          retiolum = "hosts"; +        de.habsys = "hosts"; +        de.pixelpocket = "hosts"; +        de.karlaskop = "hosts"; +        de.ubikmedia = "hosts"; +        de.apanowicz = "hosts";        };        # XXX This overlaps with krebs.retiolum @@ -188,6 +193,92 @@ let    lass-imp = {      hosts = addNames { +      cloudkrebs = { +        cores = 1; +        dc = "lass"; #dc = "cac"; +        nets = rec { +          internet = { +            addrs4 = ["104.167.113.104"]; +            aliases = [ +              "cloudkrebs.internet" +            ]; +          }; +          retiolum = { +            via = internet; +            addrs4 = ["10.243.206.102"]; +            addrs6 = ["42:941e:2816:35f4:5c5e:206b:3f0b:f762"]; +            aliases = [ +              "cloudkrebs.retiolum" +              "cgit.cloudkrebs.retiolum" +              "habsys.de" +              "pixelpocket.de" +              "karlaskop.de" +              "ubikmedia.de" +              "apanowicz.de" +            ]; +            tinc.pubkey = '' +              -----BEGIN RSA PUBLIC KEY----- +              MIIBCgKCAQEAttUygCu7G6lIA9y+9rfTpLKIy2UgNDglUVoKZYLs8JPjtAtQVbtA +              OcWwwPc8ijLQvwJWa8e/shqSzSIrtOe+HJbRGdXLdBLtOuLKpz+ZFHcS+95RS5aF +              QTehg+QY7pvhbrrwKX936tkMR568suTQG6C8qNC/5jWYO/wIxFMhnQ2iRRKQOq1v +              3aGGPC16KeXKVioY9KoV98S3n1rZW1JK07CIsZU4qb5txtLlW6FplJ7UmhVku1WC +              sgOOj9yi6Zk1t8R2Pwv9gxa3Hc270voj5U+I2hgLV/LjheE8yhQgYHEA4vXerPdO +              TGSATlSmMtE2NYGrKsLM7pKn286aSpXinwIDAQAB +              -----END RSA PUBLIC KEY----- +            ''; +          }; +        }; +      }; +      uriel = { +        cores = 1; +        dc = "lass"; +        nets = rec { +          retiolum = { +            addrs4 = ["10.243.81.176"]; +            addrs6 = ["42:dc25:60cf:94ef:759b:d2b6:98a9:2e56"]; +            aliases = [ +              "uriel.retiolum" +              "cgit.uriel.retiolum" +            ]; +            tinc.pubkey = '' +              -----BEGIN RSA PUBLIC KEY----- +              MIIBCgKCAQEAzw0pvoEmqeqiZrzSOPH0IT99gr1rrvMZbvabXoU4MAiVgGoGrkmR +              duJkk8Fj12ftMc+Of1gnwDkFhRcfAKOeH1RSc4CTircWVq99WyecTwEZoaR/goQb +              MND022kIBoG6NQNxv1Y5I1B/h7hfloMFEPym9oFtOAXoGhBY2vVl4g64NNz+RLME +              m1RipLXKANAh6LRNPGPQCUYX4TVY2ZJVxM3CM1XdomUAdOYXJmWFyUg9NcIKaacx +              uRrmuy7J9yFBcihZX5Y7NV361kINrpRmZYxJRf9cr0hb5EkJJ7bMIKQMEFQ5RnYo +              u7MPGKD7aNHa6hLLCeIfJ5u0igVmSLh3pwIDAQAB +              -----END RSA PUBLIC KEY----- +            ''; +          }; +        }; +      }; +      mors = { +        cores = 2; +        dc = "lass"; +        nets = rec { +          retiolum = { +            addrs4 = ["10.243.0.2"]; +            addrs6 = ["42:0:0:0:0:0:0:dea7"]; +            aliases = [ +              "mors.retiolum" +              "cgit.mors.retiolum" +            ]; +            tinc.pubkey = '' +              -----BEGIN RSA PUBLIC KEY----- +              MIIBCgKCAQEAsj1PCibKOfF68gmFQ+wwyfhUWpqKqpznrJX1dZ+daae7l7nBHvsE +              H0QwkiMmk3aZy1beq3quM6gX13aT+/wMfWnLyuvT11T5C9JEf/IS91STpM2BRN+R +              +P/DhbuDcW4UsdEe6uwQDGEJbXRN5ZA7GI0bmcYcwHJ9SQmW5v7P9Z3oZ+09hMD+ +              1cZ3HkPN7weSdMLMPpUpmzCsI92cXGW0xRC4iBEt1ZeBwjkLCRsBFBGcUMuKWwVa +              9sovca0q3DUar+kikEKVrVy26rZUlGuBLobMetDGioSawWkRSxVlfZvTHjAK5JzU +              O6y6hj0yQ1sp6W2JjU8ntDHf63aM71dB9QIDAQAB +              -----END RSA PUBLIC KEY----- +            ''; +          }; +        }; +        secure = true; +      }; +      };      users = addNames {        lass = { diff --git a/lass/1systems/cloudkrebs.nix b/lass/1systems/cloudkrebs.nix new file mode 100644 index 000000000..30a7fb51c --- /dev/null +++ b/lass/1systems/cloudkrebs.nix @@ -0,0 +1,45 @@ +{ config, pkgs, ... }: + +{ +  imports = [ +    ../../2configs/tv/CAC-Developer-2.nix +    ../../2configs/tv/CAC-CentOS-7-64bit.nix +    ../../2configs/lass/base.nix +    ../../2configs/lass/retiolum.nix +    ../../2configs/lass/fastpoke-pages.nix +    ../../2configs/lass/new-repos.nix +    { +      networking.interfaces.enp2s1.ip4 = [ +        { +          address = "104.167.113.104"; +          prefixLength = 24; +        } +      ]; +      networking.defaultGateway = "104.167.113.1"; +      networking.nameservers = [ +        "8.8.8.8" +      ]; + +    } +  ]; + +  krebs.build = { +    target = "root@cloudkrebs"; +    host = config.krebs.hosts.cloudkrebs; +    deps = { +      nixpkgs = { +        url = https://github.com/Lassulus/nixpkgs; +        rev = "1879a011925c561f0a7fd4043da0768bbff41d0b"; +      }; +      secrets = { +        url = "/home/lass/secrets/${config.krebs.build.host.name}"; +      }; +      stockholm = { +        url = toString ../..; +      }; +    }; +  }; + +  networking.hostName = "cloudkrebs"; + +} diff --git a/1systems/lass/mors.nix b/lass/1systems/mors.nix index 940dc4fdb..3519bff66 100644 --- a/1systems/lass/mors.nix +++ b/lass/1systems/mors.nix @@ -8,7 +8,6 @@      ../../2configs/lass/browsers.nix      ../../2configs/lass/games.nix      ../../2configs/lass/pass.nix -    ../../2configs/lass/vim.nix      ../../2configs/lass/virtualbox.nix      ../../2configs/lass/elster.nix      ../../2configs/lass/urxvt.nix @@ -18,28 +17,27 @@      ../../2configs/lass/binary-caches.nix      ../../2configs/lass/ircd.nix      ../../2configs/lass/chromium-patched.nix -    ../../2configs/lass/git-repos.nix -    ../../2configs/tv/synaptics.nix -    ../../2configs/tv/exim-retiolum.nix -    { -      imports = [ ../../3modules/tv/retiolum.nix ]; -      tv.retiolum = { -        enable = true; -        hosts = ../../Zhosts; -        connectTo = [ -          "fastpoke" -          "gum" -          "pigstarter" -        ]; +    ../../2configs/lass/new-repos.nix +    #../../2configs/tv/synaptics.nix +    ../../2configs/lass/retiolum.nix +  ]; + +  krebs.build = { +    target = "root@mors"; +    host = config.krebs.hosts.mors; +    deps = { +      nixpkgs = { +        url = https://github.com/Lassulus/nixpkgs; +        rev = "1879a011925c561f0a7fd4043da0768bbff41d0b";        }; -    } -    { -      imports = [ ../../3modules/tv/identity.nix ]; -      tv.identity = { -        enable = true; +      secrets = { +        url = "/home/lass/secrets/${config.krebs.build.host.name}";        }; -    } -  ]; +      stockholm = { +        url = toString ../..; +      }; +    }; +  };    networking.hostName = "mors";    networking.wireless.enable = true; @@ -168,21 +166,6 @@      '';    }; -  users.extraUsers = { -    #main user -    mainUser = { -      uid = 1337; -      name = "lass"; -      #isNormalUser = true; -      group = "users"; -      createHome = true; -      home = "/home/lass"; -      useDefaultShell = true; -      isSystemUser = false; -      extraGroups = [ "wheel" "audio" ]; -    }; -  }; -    environment.systemPackages = with pkgs; [    ]; @@ -217,4 +200,12 @@    services.mongodb = {      enable = true;    }; + +  lass.iptables = { +    tables = { +      filter.INPUT.rules = [ +        { predicate = "-p tcp --dport 8000"; target = "ACCEPT"; precedence = 9001; } +      ]; +    }; +  };  } diff --git a/1systems/lass/uriel.nix b/lass/1systems/uriel.nix index 25745d055..8984004e1 100644 --- a/1systems/lass/uriel.nix +++ b/lass/1systems/uriel.nix @@ -1,38 +1,47 @@  { config, pkgs, ... }: +with builtins;  {    imports = [      ../../2configs/lass/desktop-base.nix      ../../2configs/lass/browsers.nix      ../../2configs/lass/games.nix      ../../2configs/lass/pass.nix -    ../../2configs/lass/vim.nix      ../../2configs/lass/urxvt.nix      ../../2configs/lass/bird.nix -    ../../2configs/lass/git-repos.nix +    ../../2configs/lass/new-repos.nix      ../../2configs/lass/chromium-patched.nix -    ../../2configs/tv/exim-retiolum.nix +    ../../2configs/lass/retiolum.nix      { -      imports = [ ../../3modules/tv/retiolum.nix ]; -      tv.retiolum = { -        enable = true; -        hosts = ../../Zhosts; -        connectTo = [ -          "fastpoke" -          "gum" -          "pigstarter" -        ]; -      }; -    } -    { -      imports = [ ../../3modules/tv/identity.nix ]; -      tv.identity = { -        enable = true; +      users.extraUsers = { +        root = { +          openssh.authorizedKeys.keys = map readFile [ +            ../../Zpubkeys/uriel.ssh.pub +          ]; +        };        };      }    ]; +  krebs.build = { +    target = "root@uriel"; +    host = config.krebs.hosts.uriel; +    deps = { +      nixpkgs = { +        url = https://github.com/Lassulus/nixpkgs; +        rev = "961fcbabd7643171ea74bd550fee1ce5c13c2e90"; +      }; +      secrets = { +        url = "/home/lass/secrets/${config.krebs.build.host.name}"; +      }; +      stockholm = { +        url = toString ../..; +      }; +    }; +  }; +    networking.hostName = "uriel"; +    networking.wireless.enable = true;    nix.maxJobs = 2; @@ -87,29 +96,6 @@      '';    }; -  users.extraUsers = { -    root = { -      openssh.authorizedKeys.keys = [ -        config.sshKeys.lass.pub -      ]; -    }; -    mainUser = { -      uid = 1337; -      name = "lass"; -      #isNormalUser = true; -      group = "users"; -      createHome = true; -      home = "/home/lass"; -      useDefaultShell = true; -      isSystemUser = false; -      description = "lassulus"; -      extraGroups = [ "wheel" "audio" ]; -      openssh.authorizedKeys.keys = [ -        config.sshKeys.lass.pub -      ]; -    }; -  }; -    environment.systemPackages = with pkgs; [    ]; diff --git a/2configs/lass/base.nix b/lass/2configs/base.nix index 5e5b8a7b1..8d4a9c896 100644 --- a/2configs/lass/base.nix +++ b/lass/2configs/base.nix @@ -3,16 +3,44 @@  with lib;  {    imports = [ -    ./sshkeys.nix      ../../3modules/lass/iptables.nix +    ../../2configs/lass/vim.nix      {        users.extraUsers =          mapAttrs (_: h: { hashedPassword = h; })                   (import /root/src/secrets/hashedPasswords.nix);      } - +    { +      users.extraUsers = { +        root = { +          openssh.authorizedKeys.keys = map readFile [ +            ../../Zpubkeys/lass.ssh.pub +          ]; +        }; +        mainUser = { +          name = "lass"; +          uid = 1337; +          home = "/home/lass"; +          group = "users"; +          createHome = true; +          useDefaultShell = true; +          extraGroups = [ +            "audio" +            "wheel" +          ]; +          openssh.authorizedKeys.keys = map readFile [ +            ../../Zpubkeys/lass.ssh.pub +          ]; +        }; +      }; +    }    ]; +  krebs = { +    enable = true; +    search-domain = "retiolum"; +  }; +    nix.useChroot = true;    users.mutableUsers = false; @@ -30,6 +58,8 @@ with lib;    '';    environment.systemPackages = with pkgs; [ +    nmap +      git      most      rxvt_unicode.terminfo @@ -77,11 +107,11 @@ with lib;      "sendmail"    ]; -  services.gitolite = { -    enable = true; -    dataDir = "/home/gitolite"; -    adminPubkey = config.sshKeys.lass.pub; -  }; +  #services.gitolite = { +  #  enable = true; +  #  dataDir = "/home/gitolite"; +  #  adminPubkey = config.sshKeys.lass.pub; +  #};    services.openssh = {      enable = true; @@ -102,35 +132,12 @@ with lib;        filter.INPUT.policy = "DROP";        filter.FORWARD.policy = "DROP";        filter.INPUT.rules = [ -        { predicate = "-i lo"; target = "ACCEPT"; } -        { predicate = "-m conntrack --ctstate RELATED,ESTABLISHED"; target = "ACCEPT"; } -        { predicate = "-p icmp"; target = "ACCEPT"; } -        { predicate = "-p tcp --dport 22"; target = "ACCEPT"; } +        { predicate = "-m conntrack --ctstate RELATED,ESTABLISHED"; target = "ACCEPT"; precedence = 10001; } +        { predicate = "-p icmp"; target = "ACCEPT"; precedence = 10000; } +        { predicate = "-i lo"; target = "ACCEPT"; precedence = 9999; } +        { predicate = "-p tcp --dport 22"; target = "ACCEPT"; precedence = 9998; }        ];      };    }; -  #Networking.firewall = { -  #  enable = true; - -  #  allowedTCPPorts = [ -  #    22 -  #  ]; - -  #  extraCommands = '' -  #    iptables -A INPUT -j ACCEPT -m conntrack --ctstate RELATED,ESTABLISHED -  #    iptables -A INPUT -j ACCEPT -i lo -  #    #http://serverfault.com/questions/84963/why-not-block-icmp -  #    iptables -A INPUT -j ACCEPT -p icmp - -  #    #TODO: fix Retiolum firewall -  #    #iptables -N RETIOLUM -  #    #iptables -A INPUT -j RETIOLUM -i retiolum -  #    #iptables -A RETIOLUM -j ACCEPT -m conntrack --ctstate RELATED,ESTABLISHED -  #    #iptables -A RETIOLUM -j REJECT -p tcp --reject-with tcp-reset -  #    #iptables -A RETIOLUM -j REJECT -p udp --reject-with icmp-port-unreachable -  #    #iptables -A RETIOLUM -j REJECT        --reject-with icmp-proto-unreachable -  #    #iptables -A RETIOLUM -j REJECT -  #  ''; -  #};  } diff --git a/2configs/lass/binary-caches.nix b/lass/2configs/binary-caches.nix index c2727520d..c2727520d 100644 --- a/2configs/lass/binary-caches.nix +++ b/lass/2configs/binary-caches.nix diff --git a/2configs/lass/bird.nix b/lass/2configs/bird.nix index 3fc265cd7..3fc265cd7 100644 --- a/2configs/lass/bird.nix +++ b/lass/2configs/bird.nix diff --git a/2configs/lass/bitcoin.nix b/lass/2configs/bitcoin.nix index d3bccbf5c..d3bccbf5c 100644 --- a/2configs/lass/bitcoin.nix +++ b/lass/2configs/bitcoin.nix diff --git a/2configs/lass/browsers.nix b/lass/2configs/browsers.nix index 8aecea925..8aecea925 100644 --- a/2configs/lass/browsers.nix +++ b/lass/2configs/browsers.nix diff --git a/2configs/lass/chromium-patched.nix b/lass/2configs/chromium-patched.nix index 715181778..715181778 100644 --- a/2configs/lass/chromium-patched.nix +++ b/lass/2configs/chromium-patched.nix diff --git a/2configs/lass/desktop-base.nix b/lass/2configs/desktop-base.nix index ee7a94bc9..9b98e4a8b 100644 --- a/2configs/lass/desktop-base.nix +++ b/lass/2configs/desktop-base.nix @@ -55,11 +55,9 @@ in {      displayManager.auto.enable = true;      displayManager.auto.user = mainUser.name; -    layout = "us,de"; +    layout = "us";      xkbModel = "evdev"; -    xkbVariant = "altgr-intl,nodeadkeys"; -    xkbOptions = "grp:caps_toggle"; - +    xkbVariant = "altgr-intl";    };  } diff --git a/2configs/lass/elster.nix b/lass/2configs/elster.nix index 1edd01896..1edd01896 100644 --- a/2configs/lass/elster.nix +++ b/lass/2configs/elster.nix diff --git a/lass/2configs/fastpoke-pages.nix b/lass/2configs/fastpoke-pages.nix new file mode 100644 index 000000000..74e92ccc3 --- /dev/null +++ b/lass/2configs/fastpoke-pages.nix @@ -0,0 +1,97 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let +  createStaticPage = domain: +    { +      krebs.nginx.servers."${domain}" = { +        server-names = [ +          "${domain}" +          "www.${domain}" +        ]; +        locations = [ +          (nameValuePair "/" '' +            root /var/lib/http/${domain}; +          '') +        ]; +      }; +      #networking.extraHosts = '' +      #  10.243.206.102 ${domain} +      #''; +    }; + +in { +  imports = [ +    ../../3modules/lass/iptables.nix +  ] ++ map createStaticPage [ +    "habsys.de" +    "pixelpocket.de" +    "karlaskop.de" +    "ubikmedia.de" +    "apanowicz.de" +  ]; + +  lass.iptables = { +    tables = { +      filter.INPUT.rules = [ +        { predicate = "-p tcp --dport http"; target = "ACCEPT"; } +      ]; +    }; +  }; + + +  krebs.nginx = { +    enable = true; +    servers = { + +      #"habsys.de" = { +      #  server-names = [ +      #    "habsys.de" +      #    "www.habsys.de" +      #  ]; +      #  locations = [ +      #    (nameValuePair "/" '' +      #      root /var/lib/http/habsys.de; +      #    '') +      #  ]; +      #}; + +      #"karlaskop.de" = { +      #  server-names = [ +      #    "karlaskop.de" +      #    "www.karlaskop.de" +      #  ]; +      #  locations = [ +      #    (nameValuePair "/" '' +      #      root /var/lib/http/karlaskop.de; +      #    '') +      #  ]; +      #}; + +      #"pixelpocket.de" = { +      #  server-names = [ +      #    "pixelpocket.de" +      #    "www.karlaskop.de" +      #  ];  | 
