{ config, lib, pkgs, ... }: with import ; let external-ip = config.krebs.build.host.nets.internet.ip4.addr; ext-if = config.makefu.server.primary-itf; allDisks = [ "/dev/sda" "/dev/sdb" ]; in { imports = [ ./hardware-config.nix { users.users.lass = { uid = 19002; isNormalUser = true; createHome = true; useDefaultShell = true; openssh.authorizedKeys.keys = with config.krebs.users; [ lass.pubkey makefu.pubkey ]; }; } # # { services.smartd.devices = builtins.map (x: { device = x; }) allDisks; } # Security # Tools # # networking # # # { # bonus retiolum config for connecting more hosts krebs.tinc.retiolum = { extraConfig = '' ListenAddress = ${external-ip} 53 ListenAddress = ${external-ip} 655 ListenAddress = ${external-ip} 21031 ''; connectTo = [ "prism" "ni" "enklave" "eve" "archprism" ]; }; networking.firewall = { allowedTCPPorts = [ 53 655 21031 ]; allowedUDPPorts = [ 53 655 21031 ]; }; } # ci # # # services # # { krebs.exim.enable = mkDefault true; } # sharing { nixpkgs.config.allowUnfree = true; } # ## # # ## network # # Removed until move: no extra mails # # Removed until move: avoid letsencrypt ban ### Web # ## # # # # # # # sharing { krebs.airdcpp.dcpp.shares = { download.path = config.makefu.dl-dir + "/finished"; sorted.path = config.makefu.dl-dir + "/sorted"; }; } ## Temporary: # # krebs infrastructure services ]; makefu.dl-dir = "/var/download"; services.openssh.hostKeys = lib.mkForce [ { bits = 4096; path = (toString ); type = "rsa"; } { path = (toString ); type = "ed25519"; } ]; ###### stable services.nginx.virtualHosts."cgit.euer.krebsco.de" = { forceSSL = true; enableACME = true; locations."/".proxyPass = "http://localhost/"; locations."/".extraConfig = ''proxy_set_header Host cgit;''; }; krebs.build.host = config.krebs.hosts.gum; # Network networking = { firewall = { allowPing = true; logRefusedConnections = false; }; nameservers = [ "8.8.8.8" ]; }; users.users.makefu.extraGroups = [ "download" "nginx" ]; state = [ "/home/makefu/.weechat" ]; }