Compare commits
1 Commits
wip/sway2
...
wip/tokodo
Author | SHA1 | Date | |
---|---|---|---|
42cb2c7239 |
147
flake.lock
generated
147
flake.lock
generated
@@ -22,11 +22,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1667907331,
|
"lastModified": 1665996265,
|
||||||
"narHash": "sha256-bHkAwkYlBjkupPUFcQjimNS8gxWSWjOTevEuwdnp5m0=",
|
"narHash": "sha256-/k9og6LDBQwT+f/tJ5ClcWiUl8kCX5m6ognhsAxOiCY=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "6639e3a837fc5deb6f99554072789724997bc8e5",
|
"rev": "b81e128fc053ab3159d7b464d9b7dedc9d6a6891",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -36,14 +36,29 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"impermanence": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1661933071,
|
||||||
|
"narHash": "sha256-RFgfzldpbCvS+H2qwH+EvNejvqs+NhPVD5j1I7HQQPY=",
|
||||||
|
"owner": "nix-community",
|
||||||
|
"repo": "impermanence",
|
||||||
|
"rev": "def994adbdfc28974e87b0e4c949e776207d5557",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "nix-community",
|
||||||
|
"repo": "impermanence",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"mobile-nixos": {
|
"mobile-nixos": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1674779092,
|
"lastModified": 1666573922,
|
||||||
"narHash": "sha256-mFBD0Dvjf8tuxWtJhsCQ+8VYqI4fQeWjd/vfWsZiRRo=",
|
"narHash": "sha256-CqB8Y5HajptSFE8Em990dcYZIHJWBiO9zd1us4Mzx8M=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "mobile-nixos",
|
"repo": "mobile-nixos",
|
||||||
"rev": "80ece5a61738fbf3b96fdda402ab2dfc74ee5cee",
|
"rev": "1351091d2537040454fa232d8b94e745ab0eb5a3",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -53,79 +68,77 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"inputs": {
|
|
||||||
"nixpkgs": [
|
|
||||||
"nixpkgs-unpatched"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1,
|
"lastModified": 1666447894,
|
||||||
"narHash": "sha256-5pNu9Ph1LIBj5q9RWLV3r7daANjmd4u5y+MVq8vlfS4=",
|
"narHash": "sha256-i9WHX4w/et4qPMzEXd9POmnO0/bthjr7R4cblKNHGms=",
|
||||||
"path": "/nix/store/bjzsgw8zn4av0dv4sqyj7vxhi43na16y-source/nixpatches",
|
"owner": "NixOS",
|
||||||
"type": "path"
|
"repo": "nixpkgs",
|
||||||
|
"rev": "95aeaf83c247b8f5aa561684317ecd860476fcd6",
|
||||||
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"path": "/nix/store/bjzsgw8zn4av0dv4sqyj7vxhi43na16y-source/nixpatches",
|
"id": "nixpkgs",
|
||||||
"type": "path"
|
"ref": "nixos-unstable",
|
||||||
|
"type": "indirect"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nixpkgs-22_05": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1666488099,
|
||||||
|
"narHash": "sha256-DANs2epN5QgvxWzH7xF3dzb4WE0lEuMLrMEu/vPmQxw=",
|
||||||
|
"owner": "NixOS",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "f9115594149ebcb409a42e303bec4956814a8419",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "NixOS",
|
||||||
|
"ref": "release-22.05",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs-stable": {
|
"nixpkgs-stable": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1674692158,
|
"lastModified": 1666401273,
|
||||||
"narHash": "sha256-oqGpwVg4D+eMSgF7Th5Ve1ysCiH3H3g85vGJ3nvJsZQ=",
|
"narHash": "sha256-AG3MoIjcWwz1SPjJ2nymWu4NmeVj9P40OpB1lsmxFtg=",
|
||||||
"owner": "nixos",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"rev": "def9e420d27c951026d57dc96ce0218c3131f412",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "nixos",
|
|
||||||
"ref": "nixos-22.11",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"nixpkgs-stable_2": {
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1674352297,
|
|
||||||
"narHash": "sha256-OkAnJPrauEcUCrst4/3DKoQfUn2gXKuU6CFvhtMrLgg=",
|
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "918b760070bb8f48cb511300fcd7e02e13058a2e",
|
"rev": "3933d8bb9120573c0d8d49dc5e890cb211681490",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "NixOS",
|
"id": "nixpkgs",
|
||||||
"ref": "release-22.11",
|
"ref": "nixos-22.05",
|
||||||
"repo": "nixpkgs",
|
"type": "indirect"
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"nixpkgs-unpatched": {
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1674641431,
|
|
||||||
"narHash": "sha256-qfo19qVZBP4qn5M5gXc/h1MDgAtPA5VxJm9s8RUAkVk=",
|
|
||||||
"owner": "nixos",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"rev": "9b97ad7b4330aacda9b2343396eb3df8a853b4fc",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "nixos",
|
|
||||||
"ref": "nixos-unstable",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"type": "github"
|
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"root": {
|
"root": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"home-manager": "home-manager",
|
"home-manager": "home-manager",
|
||||||
|
"impermanence": "impermanence",
|
||||||
"mobile-nixos": "mobile-nixos",
|
"mobile-nixos": "mobile-nixos",
|
||||||
"nixpkgs": "nixpkgs",
|
"nixpkgs": "nixpkgs",
|
||||||
"nixpkgs-stable": "nixpkgs-stable",
|
"nixpkgs-stable": "nixpkgs-stable",
|
||||||
"nixpkgs-unpatched": "nixpkgs-unpatched",
|
"rycee": "rycee",
|
||||||
"sops-nix": "sops-nix",
|
"sops-nix": "sops-nix",
|
||||||
"uninsane-dot-org": "uninsane-dot-org"
|
"uninsane": "uninsane"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"rycee": {
|
||||||
|
"flake": false,
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1666843362,
|
||||||
|
"narHash": "sha256-xn2bW9/MT0u8Ptlk+f323p46Q/ktZkzMp7oj5SlYDxU=",
|
||||||
|
"owner": "rycee",
|
||||||
|
"repo": "nur-expressions",
|
||||||
|
"rev": "43d3a363c126968db46585b88b8eb97dd32634ad",
|
||||||
|
"type": "gitlab"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "rycee",
|
||||||
|
"repo": "nur-expressions",
|
||||||
|
"type": "gitlab"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"sops-nix": {
|
"sops-nix": {
|
||||||
@@ -133,14 +146,14 @@
|
|||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"nixpkgs"
|
"nixpkgs"
|
||||||
],
|
],
|
||||||
"nixpkgs-stable": "nixpkgs-stable_2"
|
"nixpkgs-22_05": "nixpkgs-22_05"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1674546403,
|
"lastModified": 1666499473,
|
||||||
"narHash": "sha256-vkyNv0xzXuEnu9v52TUtRugNmQWIti8c2RhYnbLG71w=",
|
"narHash": "sha256-q1eFnBFL0kHgcnUPeKagw3BfbE/5sMJNGL2E2AR+a2M=",
|
||||||
"owner": "Mic92",
|
"owner": "Mic92",
|
||||||
"repo": "sops-nix",
|
"repo": "sops-nix",
|
||||||
"rev": "b6ab3c61e2ca5e07d1f4eb1b67304e2670ea230c",
|
"rev": "1b5f9512a265f0c9687dbff47893180f777f4809",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -149,7 +162,7 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"uninsane-dot-org": {
|
"uninsane": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"flake-utils": "flake-utils",
|
"flake-utils": "flake-utils",
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
@@ -157,11 +170,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1666870107,
|
"lastModified": 1665758541,
|
||||||
"narHash": "sha256-b9eXZxSwhzdJI5uQgfrMhu4SY2POrPkinUg7F5gQVYo=",
|
"narHash": "sha256-ibR8bPwHlDjavri5cNVnoo5FmFk1IfNMmQXxat5biqs=",
|
||||||
"ref": "refs/heads/master",
|
"ref": "refs/heads/master",
|
||||||
"rev": "80c6ec95bd430e29d231cf745f19279bb76fb382",
|
"rev": "4ad1801f6cecd678bbeae5dfe5933448dd7b3360",
|
||||||
"revCount": 164,
|
"revCount": 163,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "https://git.uninsane.org/colin/uninsane"
|
"url": "https://git.uninsane.org/colin/uninsane"
|
||||||
},
|
},
|
||||||
|
232
flake.nix
232
flake.nix
@@ -1,48 +1,29 @@
|
|||||||
# FLAKE FEEDBACK:
|
# docs:
|
||||||
# - if flake inputs are meant to be human-readable, a human should be able to easily track them down given the URL.
|
# - <https://nixos.wiki/wiki/Flakes>
|
||||||
# - this is not the case with registry URLs, like `nixpkgs/nixos-22.11`.
|
|
||||||
# - this is marginally the case with schemes like `github:nixos/nixpkgs`.
|
|
||||||
# - given the *existing* `git+https://` scheme, i propose expressing github URLs similarly:
|
|
||||||
# - `github+https://github.com/nixos/nixpkgs/tree/nixos-22.11`
|
|
||||||
# - need some way to apply local patches to inputs.
|
|
||||||
#
|
|
||||||
#
|
|
||||||
# DEVELOPMENT DOCS:
|
|
||||||
# - Flake docs: <https://nixos.wiki/wiki/Flakes>
|
|
||||||
# - Flake RFC: <https://github.com/tweag/rfcs/blob/flakes/rfcs/0049-flakes.md>
|
|
||||||
# - Discussion: <https://github.com/NixOS/rfcs/pull/49>
|
|
||||||
# - <https://serokell.io/blog/practical-nix-flakes>
|
# - <https://serokell.io/blog/practical-nix-flakes>
|
||||||
|
|
||||||
{
|
{
|
||||||
# XXX: use the `github:` scheme instead of the more readable git+https: because it's *way* more efficient
|
|
||||||
# preferably, i would rewrite the human-readable https URLs to nix-specific github: URLs with a helper,
|
|
||||||
# but `inputs` is required to be a strict attrset: not an expression.
|
|
||||||
inputs = {
|
inputs = {
|
||||||
# <https://github.com/nixos/nixpkgs/tree/nixos-22.11>
|
nixpkgs-stable.url = "nixpkgs/nixos-22.05";
|
||||||
nixpkgs-stable.url = "github:nixos/nixpkgs?ref=nixos-22.11";
|
nixpkgs.url = "nixpkgs/nixos-unstable";
|
||||||
|
|
||||||
# <https://github.com/nixos/nixpkgs/tree/nixos-unstable>
|
|
||||||
nixpkgs-unpatched.url = "github:nixos/nixpkgs?ref=nixos-unstable";
|
|
||||||
nixpkgs = {
|
|
||||||
url = "./nixpatches";
|
|
||||||
inputs.nixpkgs.follows = "nixpkgs-unpatched";
|
|
||||||
};
|
|
||||||
mobile-nixos = {
|
mobile-nixos = {
|
||||||
# <https://github.com/nixos/mobile-nixos>
|
|
||||||
url = "github:nixos/mobile-nixos";
|
url = "github:nixos/mobile-nixos";
|
||||||
flake = false;
|
flake = false;
|
||||||
};
|
};
|
||||||
home-manager = {
|
home-manager = {
|
||||||
# <https://github.com/nix-community/home-manager/tree/release-22.05>
|
url = "github:nix-community/home-manager/release-22.05";
|
||||||
url = "github:nix-community/home-manager?ref=release-22.05";
|
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
|
rycee = {
|
||||||
|
url = "gitlab:rycee/nur-expressions";
|
||||||
|
flake = false;
|
||||||
|
};
|
||||||
sops-nix = {
|
sops-nix = {
|
||||||
# <https://github.com/Mic92/sops-nix>
|
|
||||||
url = "github:Mic92/sops-nix";
|
url = "github:Mic92/sops-nix";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
uninsane-dot-org = {
|
impermanence.url = "github:nix-community/impermanence";
|
||||||
|
uninsane = {
|
||||||
url = "git+https://git.uninsane.org/colin/uninsane";
|
url = "git+https://git.uninsane.org/colin/uninsane";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
@@ -52,56 +33,59 @@
|
|||||||
self,
|
self,
|
||||||
nixpkgs,
|
nixpkgs,
|
||||||
nixpkgs-stable,
|
nixpkgs-stable,
|
||||||
nixpkgs-unpatched,
|
|
||||||
mobile-nixos,
|
mobile-nixos,
|
||||||
home-manager,
|
home-manager,
|
||||||
|
rycee,
|
||||||
sops-nix,
|
sops-nix,
|
||||||
uninsane-dot-org
|
impermanence,
|
||||||
}:
|
uninsane
|
||||||
|
}: let
|
||||||
|
patchedPkgs = system: nixpkgs.legacyPackages.${system}.applyPatches {
|
||||||
|
name = "nixpkgs-patched-uninsane";
|
||||||
|
src = nixpkgs;
|
||||||
|
patches = import ./nixpatches/list.nix nixpkgs.legacyPackages.${system}.fetchpatch;
|
||||||
|
};
|
||||||
|
# return something which behaves like `pkgs`, for the provided system
|
||||||
|
# `local` = architecture of builder. `target` = architecture of the system beying deployed to
|
||||||
|
nixpkgsFor = local: target: import (patchedPkgs target) { crossSystem = target; localSystem = local; };
|
||||||
|
# evaluate ONLY our overlay, for the provided system
|
||||||
|
customPackagesFor = local: target: import ./pkgs/overlay.nix (nixpkgsFor local target) (nixpkgsFor local target);
|
||||||
|
decl-machine = { name, local, target }:
|
||||||
let
|
let
|
||||||
nixpkgsCompiledBy = local: nixpkgs.legacyPackages."${local}";
|
nixosSystem = import ((patchedPkgs target) + "/nixos/lib/eval-config.nix");
|
||||||
|
in (nixosSystem {
|
||||||
|
# by default the local system is the same as the target, employing emulation when they differ
|
||||||
|
system = target;
|
||||||
|
specialArgs = { inherit mobile-nixos home-manager impermanence; };
|
||||||
|
modules = [
|
||||||
|
./modules
|
||||||
|
(import ./machines/instantiate.nix name)
|
||||||
|
home-manager.nixosModule
|
||||||
|
impermanence.nixosModule
|
||||||
|
sops-nix.nixosModules.sops
|
||||||
|
{
|
||||||
|
nixpkgs.overlays = [
|
||||||
|
(import "${mobile-nixos}/overlay/overlay.nix")
|
||||||
|
(import "${rycee}/overlay.nix")
|
||||||
|
uninsane.overlay
|
||||||
|
(import ./pkgs/overlay.nix)
|
||||||
|
(next: prev: rec {
|
||||||
|
# non-emulated packages build *from* local *for* target.
|
||||||
|
# for large packages like the linux kernel which are expensive to build under emulation,
|
||||||
|
# the config can explicitly pull such packages from `pkgs.cross` to do more efficient cross-compilation.
|
||||||
|
cross = (nixpkgsFor local target) // (customPackagesFor local target);
|
||||||
|
stable = import nixpkgs-stable { system = target; };
|
||||||
|
# pinned packages:
|
||||||
|
electrum = stable.electrum; # 2022-10-10: build break
|
||||||
|
sequoia = stable.sequoia; # 2022-10-13: build break
|
||||||
|
})
|
||||||
|
];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
});
|
||||||
|
|
||||||
evalHost = { name, local, target }:
|
decl-bootable-machine = { name, local, target }: rec {
|
||||||
let
|
nixosConfiguration = decl-machine { inherit name local target; };
|
||||||
# XXX: we'd prefer to use `nixosSystem = (nixpkgsCompiledBy target).nixos`
|
|
||||||
# but it doesn't propagate config to the underlying pkgs, meaning it doesn't let you use
|
|
||||||
# non-free packages even after setting nixpkgs.allowUnfree.
|
|
||||||
# XXX: patch using the target -- not local -- otherwise the target will
|
|
||||||
# need to emulate the host in order to rebuild!
|
|
||||||
nixosSystem = import ((nixpkgsCompiledBy target).path + "/nixos/lib/eval-config.nix");
|
|
||||||
in
|
|
||||||
(nixosSystem {
|
|
||||||
# we use pkgs built for and *by* the target, i.e. emulation, by default.
|
|
||||||
# cross compilation only happens on explicit access to `pkgs.cross`
|
|
||||||
system = target;
|
|
||||||
modules = [
|
|
||||||
(import ./hosts/instantiate.nix { localSystem = local; hostName = name; })
|
|
||||||
self.nixosModules.default
|
|
||||||
self.nixosModules.passthru
|
|
||||||
{
|
|
||||||
nixpkgs.overlays = [
|
|
||||||
self.overlays.default
|
|
||||||
self.overlays.passthru
|
|
||||||
self.overlays.pins
|
|
||||||
];
|
|
||||||
}
|
|
||||||
];
|
|
||||||
});
|
|
||||||
in {
|
|
||||||
nixosConfigurations = {
|
|
||||||
servo = evalHost { name = "servo"; local = "x86_64-linux"; target = "x86_64-linux"; };
|
|
||||||
desko = evalHost { name = "desko"; local = "x86_64-linux"; target = "x86_64-linux"; };
|
|
||||||
lappy = evalHost { name = "lappy"; local = "x86_64-linux"; target = "x86_64-linux"; };
|
|
||||||
moby = evalHost { name = "moby"; local = "aarch64-linux"; target = "aarch64-linux"; };
|
|
||||||
# special cross-compiled variant, to speed up deploys from an x86 box to the arm target
|
|
||||||
# note that these *do* produce different store paths, because the closure for the tools used to cross compile
|
|
||||||
# v.s. emulate differ.
|
|
||||||
# so deploying foo-cross and then foo incurs some rebuilding.
|
|
||||||
moby-cross = evalHost { name = "moby"; local = "x86_64-linux"; target = "aarch64-linux"; };
|
|
||||||
rescue = evalHost { name = "rescue"; local = "x86_64-linux"; target = "x86_64-linux"; };
|
|
||||||
};
|
|
||||||
|
|
||||||
# unofficial output
|
|
||||||
# this produces a EFI-bootable .img file (GPT with a /boot partition and a system (/ or /nix) partition).
|
# this produces a EFI-bootable .img file (GPT with a /boot partition and a system (/ or /nix) partition).
|
||||||
# after building this:
|
# after building this:
|
||||||
# - flash it to a bootable medium (SD card, flash drive, HDD)
|
# - flash it to a bootable medium (SD card, flash drive, HDD)
|
||||||
@@ -114,78 +98,32 @@
|
|||||||
# - boot
|
# - boot
|
||||||
# - if fs wasn't resized automatically, then `sudo btrfs filesystem resize max /`
|
# - if fs wasn't resized automatically, then `sudo btrfs filesystem resize max /`
|
||||||
# - checkout this flake into /etc/nixos AND UPDATE THE FS UUIDS.
|
# - checkout this flake into /etc/nixos AND UPDATE THE FS UUIDS.
|
||||||
# - `nixos-rebuild --flake './#<host>' switch`
|
# - `nixos-rebuild --flake './#<machine>' switch`
|
||||||
imgs = builtins.mapAttrs (_: host-dfn: host-dfn.config.system.build.img) self.nixosConfigurations;
|
img = nixosConfiguration.config.system.build.img;
|
||||||
|
|
||||||
overlays = rec {
|
|
||||||
default = pkgs;
|
|
||||||
pkgs = import ./overlays/pkgs.nix;
|
|
||||||
pins = import ./overlays/pins.nix; # TODO: move to `nixpatches/` input
|
|
||||||
passthru =
|
|
||||||
let
|
|
||||||
stable = next: prev: {
|
|
||||||
stable = nixpkgs-stable.legacyPackages."${prev.stdenv.hostPlatform.system}";
|
|
||||||
};
|
|
||||||
mobile = (import "${mobile-nixos}/overlay/overlay.nix");
|
|
||||||
uninsane = uninsane-dot-org.overlay;
|
|
||||||
in
|
|
||||||
next: prev:
|
|
||||||
(stable next prev) // (mobile next prev) // (uninsane next prev);
|
|
||||||
};
|
|
||||||
|
|
||||||
nixosModules = rec {
|
|
||||||
default = sane;
|
|
||||||
sane = import ./modules;
|
|
||||||
passthru = { ... }: {
|
|
||||||
imports = [
|
|
||||||
home-manager.nixosModule
|
|
||||||
sops-nix.nixosModules.sops
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# this includes both our native packages and all the nixpkgs packages.
|
|
||||||
legacyPackages =
|
|
||||||
let
|
|
||||||
allPkgsFor = sys: (nixpkgsCompiledBy sys).appendOverlays [
|
|
||||||
self.overlays.passthru self.overlays.pkgs
|
|
||||||
];
|
|
||||||
in {
|
|
||||||
x86_64-linux = allPkgsFor "x86_64-linux";
|
|
||||||
aarch64-linux = allPkgsFor "aarch64-linux";
|
|
||||||
};
|
|
||||||
|
|
||||||
# extract only our own packages from the full set
|
|
||||||
packages = builtins.mapAttrs
|
|
||||||
(_: full: full.sane // { inherit (full) sane uninsane-dot-org; })
|
|
||||||
self.legacyPackages;
|
|
||||||
|
|
||||||
apps."x86_64-linux" =
|
|
||||||
let
|
|
||||||
pkgs = self.legacyPackages."x86_64-linux";
|
|
||||||
in {
|
|
||||||
update-feeds = {
|
|
||||||
type = "app";
|
|
||||||
program = "${pkgs.feeds.passthru.updateScript}";
|
|
||||||
};
|
|
||||||
|
|
||||||
init-feed = {
|
|
||||||
# use like `nix run '.#init-feed' uninsane.org`
|
|
||||||
type = "app";
|
|
||||||
program = "${pkgs.feeds.passthru.initFeedScript}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
templates = {
|
|
||||||
python-data = {
|
|
||||||
# initialize with:
|
|
||||||
# - `nix flake init -t '/home/colin/dev/nixos/#python-data'`
|
|
||||||
# then enter with:
|
|
||||||
# - `nix develop`
|
|
||||||
path = ./templates/python-data;
|
|
||||||
description = "python environment for data processing";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
machines.servo = decl-bootable-machine { name = "servo"; local = "aarch64-linux"; target = "aarch64-linux"; };
|
||||||
|
machines.desko = decl-bootable-machine { name = "desko"; local = "x86_64-linux"; target = "x86_64-linux"; };
|
||||||
|
machines.lappy = decl-bootable-machine { name = "lappy"; local = "x86_64-linux"; target = "x86_64-linux"; };
|
||||||
|
machines.moby = decl-bootable-machine { name = "moby"; local = "aarch64-linux"; target = "aarch64-linux"; };
|
||||||
|
# special cross-compiled variant, to speed up deploys from an x86 box to the arm target
|
||||||
|
# note that these *do* produce different store paths, because the closure for the tools used to cross compile
|
||||||
|
# v.s. emulate differ.
|
||||||
|
# so deploying moby-cross and then moby incurs some rebuilding.
|
||||||
|
machines.moby-cross = decl-bootable-machine { name = "moby"; local = "x86_64-linux"; target = "aarch64-linux"; };
|
||||||
|
machines.rescue = decl-bootable-machine { name = "rescue"; local = "x86_64-linux"; target = "x86_64-linux"; };
|
||||||
|
in {
|
||||||
|
nixosConfigurations = builtins.mapAttrs (name: value: value.nixosConfiguration) machines;
|
||||||
|
imgs = builtins.mapAttrs (name: value: value.img) machines;
|
||||||
|
packages = let
|
||||||
|
allPkgsFor = sys: (customPackagesFor sys sys) // {
|
||||||
|
nixpkgs = nixpkgsFor sys sys;
|
||||||
|
uninsane = uninsane.packages."${sys}";
|
||||||
|
rycee = (import "${rycee}/default.nix" { pkgs = nixpkgsFor sys sys; });
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
x86_64-linux = allPkgsFor "x86_64-linux";
|
||||||
|
aarch64-linux = allPkgsFor "aarch64-linux";
|
||||||
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -1,93 +0,0 @@
|
|||||||
{ ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
sane.persist.root-on-tmpfs = true;
|
|
||||||
# we need a /tmp for building large nix things
|
|
||||||
fileSystems."/tmp" = {
|
|
||||||
device = "none";
|
|
||||||
fsType = "tmpfs";
|
|
||||||
options = [
|
|
||||||
"mode=777"
|
|
||||||
"defaults"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
|
|
||||||
fileSystems."/nix" = {
|
|
||||||
device = "/dev/disk/by-uuid/cc81cca0-3cc7-4d82-a00c-6243af3e7776";
|
|
||||||
fsType = "btrfs";
|
|
||||||
options = [
|
|
||||||
"compress=zstd"
|
|
||||||
"defaults"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
|
|
||||||
fileSystems."/boot" = {
|
|
||||||
device = "/dev/disk/by-uuid/6EE3-4171";
|
|
||||||
fsType = "vfat";
|
|
||||||
};
|
|
||||||
|
|
||||||
# slow, external storage (for archiving, etc)
|
|
||||||
fileSystems."/mnt/persist/ext" = {
|
|
||||||
device = "/dev/disk/by-uuid/aa272cff-0fcc-498e-a4cb-0d95fb60631b";
|
|
||||||
fsType = "btrfs";
|
|
||||||
options = [
|
|
||||||
"compress=zstd"
|
|
||||||
"defaults"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.persist.stores."ext" = {
|
|
||||||
origin = "/mnt/persist/ext/persist";
|
|
||||||
storeDescription = "external HDD storage";
|
|
||||||
};
|
|
||||||
sane.fs."/mnt/persist/ext".mount = {};
|
|
||||||
|
|
||||||
sane.persist.sys.plaintext = [
|
|
||||||
# TODO: this is overly broad; only need media and share directories to be persisted
|
|
||||||
{ user = "colin"; group = "users"; directory = "/var/lib/uninsane"; }
|
|
||||||
];
|
|
||||||
# make sure large media is stored to the HDD
|
|
||||||
sane.persist.sys.ext = [
|
|
||||||
{
|
|
||||||
user = "colin";
|
|
||||||
group = "users";
|
|
||||||
mode = "0777";
|
|
||||||
directory = "/var/lib/uninsane/media/Videos";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
user = "colin";
|
|
||||||
group = "users";
|
|
||||||
mode = "0777";
|
|
||||||
directory = "/var/lib/uninsane/media/freeleech";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
|
|
||||||
# in-memory compressed RAM (seems to be dynamically sized)
|
|
||||||
# zramSwap = {
|
|
||||||
# enable = true;
|
|
||||||
# };
|
|
||||||
|
|
||||||
# btrfs doesn't easily support swapfiles
|
|
||||||
# swapDevices = [
|
|
||||||
# { device = "/nix/persist/swapfile"; size = 4096; }
|
|
||||||
# ];
|
|
||||||
|
|
||||||
# this can be a partition. create with:
|
|
||||||
# fdisk <dev>
|
|
||||||
# n
|
|
||||||
# <default partno>
|
|
||||||
# <start>
|
|
||||||
# <end>
|
|
||||||
# t
|
|
||||||
# <partno>
|
|
||||||
# 19 # set part type to Linux swap
|
|
||||||
# w # write changes
|
|
||||||
# mkswap -L swap <part>
|
|
||||||
# swapDevices = [
|
|
||||||
# {
|
|
||||||
# label = "swap";
|
|
||||||
# # TODO: randomEncryption.enable = true;
|
|
||||||
# }
|
|
||||||
# ];
|
|
||||||
}
|
|
||||||
|
|
@@ -1,209 +0,0 @@
|
|||||||
{ config, pkgs, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
networking.domain = "uninsane.org";
|
|
||||||
|
|
||||||
# The global useDHCP flag is deprecated, therefore explicitly set to false here.
|
|
||||||
# Per-interface useDHCP will be mandatory in the future, so this generated config
|
|
||||||
# replicates the default behaviour.
|
|
||||||
networking.useDHCP = false;
|
|
||||||
networking.interfaces.eth0.useDHCP = true;
|
|
||||||
# XXX colin: probably don't need this. wlan0 won't be populated unless i touch a value in networking.interfaces.wlan0
|
|
||||||
networking.wireless.enable = false;
|
|
||||||
|
|
||||||
# networking.firewall.enable = false;
|
|
||||||
networking.firewall.enable = true;
|
|
||||||
|
|
||||||
# this is needed to forward packets from the VPN to the host
|
|
||||||
boot.kernel.sysctl."net.ipv4.ip_forward" = 1;
|
|
||||||
|
|
||||||
# unless we add interface-specific settings for each VPN, we have to define nameservers globally.
|
|
||||||
# networking.nameservers = [
|
|
||||||
# "1.1.1.1"
|
|
||||||
# "9.9.9.9"
|
|
||||||
# ];
|
|
||||||
|
|
||||||
# use systemd's stub resolver.
|
|
||||||
# /etc/resolv.conf isn't sophisticated enough to use different servers per net namespace (or link).
|
|
||||||
# instead, running the stub resolver on a known address in the root ns lets us rewrite packets
|
|
||||||
# in the ovnps namespace to use the provider's DNS resolvers.
|
|
||||||
# a weakness is we can only query 1 NS at a time (unless we were to clone the packets?)
|
|
||||||
# there also seems to be some cache somewhere that's shared between the two namespaces.
|
|
||||||
# i think this is a libc thing. might need to leverage proper cgroups to _really_ kill it.
|
|
||||||
# - getent ahostsv4 www.google.com
|
|
||||||
# - try fix: <https://serverfault.com/questions/765989/connect-to-3rd-party-vpn-server-but-dont-use-it-as-the-default-route/766290#766290>
|
|
||||||
services.resolved.enable = true;
|
|
||||||
networking.nameservers = [
|
|
||||||
# use systemd-resolved resolver
|
|
||||||
# full resolver (which understands /etc/hosts) lives on 127.0.0.53
|
|
||||||
# stub resolver (just forwards upstream) lives on 127.0.0.54
|
|
||||||
"127.0.0.53"
|
|
||||||
];
|
|
||||||
|
|
||||||
# nscd -- the Name Service Caching Daemon -- caches DNS query responses
|
|
||||||
# in a way that's unaware of my VPN routing, so routes are frequently poor against
|
|
||||||
# services which advertise different IPs based on geolocation.
|
|
||||||
# nscd claims to be usable without a cache, but in practice i can't get it to not cache!
|
|
||||||
# nsncd is the Name Service NON-Caching Daemon. it's a drop-in that doesn't cache;
|
|
||||||
# this is OK on the host -- because systemd-resolved caches. it's probably sub-optimal
|
|
||||||
# in the netns and we query upstream DNS more often than needed. hm.
|
|
||||||
# TODO: run a separate recursive resolver in each namespace.
|
|
||||||
services.nscd.enableNsncd = true;
|
|
||||||
|
|
||||||
# services.resolved.extraConfig = ''
|
|
||||||
# # docs: `man resolved.conf`
|
|
||||||
# # DNS servers to use via the `wg-ovpns` interface.
|
|
||||||
# # i hope that from the root ns, these aren't visible.
|
|
||||||
# DNS=46.227.67.134%wg-ovpns 192.165.9.158%wg-ovpns
|
|
||||||
# FallbackDNS=1.1.1.1 9.9.9.9
|
|
||||||
# '';
|
|
||||||
|
|
||||||
# OVPN CONFIG (https://www.ovpn.com):
|
|
||||||
# DOCS: https://nixos.wiki/wiki/WireGuard
|
|
||||||
# if you `systemctl restart wireguard-wg-ovpns`, make sure to also restart any other services in `NetworkNamespacePath = .../ovpns`.
|
|
||||||
# TODO: why not create the namespace as a seperate operation (nix config for that?)
|
|
||||||
networking.wireguard.enable = true;
|
|
||||||
networking.wireguard.interfaces.wg-ovpns = let
|
|
||||||
ip = "${pkgs.iproute2}/bin/ip";
|
|
||||||
in-ns = "${ip} netns exec ovpns";
|
|
||||||
iptables = "${pkgs.iptables}/bin/iptables";
|
|
||||||
veth-host-ip = "10.0.1.5";
|
|
||||||
veth-local-ip = "10.0.1.6";
|
|
||||||
vpn-ip = "185.157.162.178";
|
|
||||||
# DNS = 46.227.67.134, 192.165.9.158, 2a07:a880:4601:10f0:cd45::1, 2001:67c:750:1:cafe:cd45::1
|
|
||||||
vpn-dns = "46.227.67.134";
|
|
||||||
in {
|
|
||||||
privateKeyFile = config.sops.secrets.wg_ovpns_privkey.path;
|
|
||||||
# wg is active only in this namespace.
|
|
||||||
# run e.g. ip netns exec ovpns <some command like ping/curl/etc, it'll go through wg>
|
|
||||||
# sudo ip netns exec ovpns ping www.google.com
|
|
||||||
interfaceNamespace = "ovpns";
|
|
||||||
ips = [
|
|
||||||
"185.157.162.178/32"
|
|
||||||
];
|
|
||||||
peers = [
|
|
||||||
{
|
|
||||||
publicKey = "SkkEZDCBde22KTs/Hc7FWvDBfdOCQA4YtBEuC3n5KGs=";
|
|
||||||
endpoint = "185.157.162.10:9930";
|
|
||||||
# alternatively: use hostname, but that presents bootstrapping issues (e.g. if host net flakes)
|
|
||||||
# endpoint = "vpn36.prd.amsterdam.ovpn.com:9930";
|
|
||||||
allowedIPs = [ "0.0.0.0/0" ];
|
|
||||||
# nixOS says this is important for keeping NATs active
|
|
||||||
persistentKeepalive = 25;
|
|
||||||
# re-executes wg this often. docs hint that this might help wg notice DNS/hostname changes.
|
|
||||||
# so, maybe that helps if we specify endpoint as a domain name
|
|
||||||
# dynamicEndpointRefreshSeconds = 30;
|
|
||||||
# when refresh fails, try it again after this period instead.
|
|
||||||
# TODO: not avail until nixpkgs upgrade
|
|
||||||
# dynamicEndpointRefreshRestartSeconds = 5;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
preSetup = "" + ''
|
|
||||||
${ip} netns add ovpns || echo "ovpns already exists"
|
|
||||||
'';
|
|
||||||
postShutdown = "" + ''
|
|
||||||
${in-ns} ip link del ovpns-veth-b || echo "couldn't delete ovpns-veth-b"
|
|
||||||
${ip} link del ovpns-veth-a || echo "couldn't delete ovpns-veth-a"
|
|
||||||
${ip} netns delete ovpns || echo "couldn't delete ovpns"
|
|
||||||
# restore rules/routes
|
|
||||||
${ip} rule del from ${veth-host-ip} lookup ovpns pref 50 || echo "couldn't delete init -> ovpns rule"
|
|
||||||
${ip} route del default via ${veth-local-ip} dev ovpns-veth-a proto kernel src ${veth-host-ip} metric 1002 table ovpns || echo "couldn't delete init -> ovpns route"
|
|
||||||
${ip} rule add from all lookup local pref 0
|
|
||||||
${ip} rule del from all lookup local pref 100
|
|
||||||
'';
|
|
||||||
postSetup = "" + ''
|
|
||||||
# DOCS:
|
|
||||||
# - some of this approach is described here: <https://josephmuia.ca/2018-05-16-net-namespaces-veth-nat/>
|
|
||||||
# - iptables primer: <https://danielmiessler.com/study/iptables/>
|
|
||||||
# create veth pair
|
|
||||||
${ip} link add ovpns-veth-a type veth peer name ovpns-veth-b
|
|
||||||
${ip} addr add ${veth-host-ip}/24 dev ovpns-veth-a
|
|
||||||
${ip} link set ovpns-veth-a up
|
|
||||||
|
|
||||||
# mv veth-b into the ovpns namespace
|
|
||||||
${ip} link set ovpns-veth-b netns ovpns
|
|
||||||
${in-ns} ip addr add ${veth-local-ip}/24 dev ovpns-veth-b
|
|
||||||
${in-ns} ip link set ovpns-veth-b up
|
|
||||||
|
|
||||||
# make it so traffic originating from the host side of the veth
|
|
||||||
# is sent over the veth no matter its destination.
|
|
||||||
${ip} rule add from ${veth-host-ip} lookup ovpns pref 50
|
|
||||||
# for traffic originating at the host veth to the WAN, use the veth as our gateway
|
|
||||||
# not sure if the metric 1002 matters.
|
|
||||||
${ip} route add default via ${veth-local-ip} dev ovpns-veth-a proto kernel src ${veth-host-ip} metric 1002 table ovpns
|
|
||||||
# give the default route lower priority
|
|
||||||
${ip} rule add from all lookup local pref 100
|
|
||||||
${ip} rule del from all lookup local pref 0
|
|
||||||
|
|
||||||
# bridge HTTP traffic:
|
|
||||||
# any external port-80 request sent to the VPN addr will be forwarded to the rootns.
|
|
||||||
# this exists so LetsEncrypt can procure a cert for the MX over http.
|
|
||||||
# TODO: we could use _acme_challence.mx.uninsane.org CNAME to avoid this forwarding
|
|
||||||
# - <https://community.letsencrypt.org/t/where-does-letsencrypt-resolve-dns-from/37607/8>
|
|
||||||
${in-ns} ${iptables} -A PREROUTING -t nat -p tcp --dport 80 -m iprange --dst-range ${vpn-ip} \
|
|
||||||
-j DNAT --to-destination ${veth-host-ip}:80
|
|
||||||
|
|
||||||
# we also bridge DNS traffic
|
|
||||||
${in-ns} ${iptables} -A PREROUTING -t nat -p udp --dport 53 -m iprange --dst-range ${vpn-ip} \
|
|
||||||
-j DNAT --to-destination ${veth-host-ip}:53
|
|
||||||
${in-ns} ${iptables} -A PREROUTING -t nat -p tcp --dport 53 -m iprange --dst-range ${vpn-ip} \
|
|
||||||
-j DNAT --to-destination ${veth-host-ip}:53
|
|
||||||
|
|
||||||
# in order to access DNS in this netns, we need to route it to the VPN's nameservers
|
|
||||||
# - alternatively, we could fix DNS servers like 1.1.1.1.
|
|
||||||
${in-ns} ${iptables} -A OUTPUT -t nat -p udp --dport 53 -m iprange --dst-range 127.0.0.53 \
|
|
||||||
-j DNAT --to-destination ${vpn-dns}:53
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
# create a new routing table that we can use to proxy traffic out of the root namespace
|
|
||||||
# through the ovpns namespace, and to the WAN via VPN.
|
|
||||||
networking.iproute2.rttablesExtraConfig = ''
|
|
||||||
5 ovpns
|
|
||||||
'';
|
|
||||||
networking.iproute2.enable = true;
|
|
||||||
|
|
||||||
|
|
||||||
# HURRICANE ELECTRIC CONFIG:
|
|
||||||
# networking.sits = {
|
|
||||||
# hurricane = {
|
|
||||||
# remote = "216.218.226.238";
|
|
||||||
# local = "192.168.0.5";
|
|
||||||
# # local = "10.0.0.5";
|
|
||||||
# # remote = "10.0.0.1";
|
|
||||||
# # local = "10.0.0.22";
|
|
||||||
# dev = "eth0";
|
|
||||||
# ttl = 255;
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
# networking.interfaces."hurricane".ipv6 = {
|
|
||||||
# addresses = [
|
|
||||||
# # mx.uninsane.org (publically routed /64)
|
|
||||||
# {
|
|
||||||
# address = "2001:470:b:465::1";
|
|
||||||
# prefixLength = 128;
|
|
||||||
# }
|
|
||||||
# # client addr
|
|
||||||
# # {
|
|
||||||
# # address = "2001:470:a:466::2";
|
|
||||||
# # prefixLength = 64;
|
|
||||||
# # }
|
|
||||||
# ];
|
|
||||||
# routes = [
|
|
||||||
# {
|
|
||||||
# address = "::";
|
|
||||||
# prefixLength = 0;
|
|
||||||
# # via = "2001:470:a:466::1";
|
|
||||||
# }
|
|
||||||
# ];
|
|
||||||
# };
|
|
||||||
|
|
||||||
# # after configuration, we want the hurricane device to look like this:
|
|
||||||
# # hurricane: flags=209<UP,POINTOPOINT,RUNNING,NOARP> mtu 1480
|
|
||||||
# # inet6 2001:470:a:450::2 prefixlen 64 scopeid 0x0<global>
|
|
||||||
# # inet6 fe80::c0a8:16 prefixlen 64 scopeid 0x20<link>
|
|
||||||
# # sit txqueuelen 1000 (IPv6-in-IPv4)
|
|
||||||
# # test with:
|
|
||||||
# # curl --interface hurricane http://[2607:f8b0:400a:80b::2004]
|
|
||||||
# # ping 2607:f8b0:400a:80b::2004
|
|
||||||
}
|
|
@@ -1,41 +0,0 @@
|
|||||||
{ ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
sops.secrets."ddns_afraid" = {
|
|
||||||
sopsFile = ../../../secrets/servo.yaml;
|
|
||||||
};
|
|
||||||
sops.secrets."ddns_he" = {
|
|
||||||
sopsFile = ../../../secrets/servo.yaml;
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets."dovecot_passwd" = {
|
|
||||||
sopsFile = ../../../secrets/servo.yaml;
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets."duplicity_passphrase" = {
|
|
||||||
sopsFile = ../../../secrets/servo.yaml;
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets."freshrss_passwd" = {
|
|
||||||
sopsFile = ../../../secrets/servo.yaml;
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets."matrix_synapse_secrets" = {
|
|
||||||
sopsFile = ../../../secrets/servo.yaml;
|
|
||||||
};
|
|
||||||
sops.secrets."mautrix_signal_env" = {
|
|
||||||
sopsFile = ../../../secrets/servo/mautrix_signal_env.bin;
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets."mediawiki_pw" = {
|
|
||||||
sopsFile = ../../../secrets/servo.yaml;
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets."pleroma_secrets" = {
|
|
||||||
sopsFile = ../../../secrets/servo.yaml;
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets."wg_ovpns_privkey" = {
|
|
||||||
sopsFile = ../../../secrets/servo.yaml;
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,27 +0,0 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
|
||||||
|
|
||||||
# using manual ddns now
|
|
||||||
lib.mkIf false
|
|
||||||
{
|
|
||||||
systemd.services.ddns-afraid = {
|
|
||||||
description = "update dynamic DNS entries for freedns.afraid.org";
|
|
||||||
serviceConfig = {
|
|
||||||
EnvironmentFile = config.sops.secrets.ddns_afraid.path;
|
|
||||||
# TODO: ProtectSystem = "strict";
|
|
||||||
# TODO: ProtectHome = "full";
|
|
||||||
# TODO: PrivateTmp = true;
|
|
||||||
};
|
|
||||||
script = let
|
|
||||||
curl = "${pkgs.curl}/bin/curl -4";
|
|
||||||
in ''
|
|
||||||
${curl} "https://freedns.afraid.org/dynamic/update.php?$AFRAID_KEY"
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
systemd.timers.ddns-afraid = {
|
|
||||||
wantedBy = [ "multi-user.target" ];
|
|
||||||
timerConfig = {
|
|
||||||
OnStartupSec = "2min";
|
|
||||||
OnUnitActiveSec = "10min";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,395 +0,0 @@
|
|||||||
# docs:
|
|
||||||
# - <https://docs.ejabberd.im/admin/configuration/basic>
|
|
||||||
# example configs:
|
|
||||||
# - <https://github.com/vkleen/machines/blob/138a2586ce185d7cf201d4e1fe898c83c4af52eb/hosts/europium/ejabberd.nix>
|
|
||||||
# - <https://github.com/Mic92/stockholm/blob/675ef0088624c9de1cb531f318446316884a9d3d/tv/3modules/ejabberd/default.nix>
|
|
||||||
# - <https://github.com/buffet/tararice/blob/master/programs/ejabberd.nix>
|
|
||||||
# - enables STUN and TURN
|
|
||||||
# - only over UDP 3478, not firewall-forwarding any TURN port range
|
|
||||||
# - uses stun_disco module (but with no options)
|
|
||||||
# - <https://github.com/leo60228/dotfiles/blob/39b3abba3009bdc31413d4757ca2f882a33eec8b/files/ejabberd.yml>
|
|
||||||
# - <https://github.com/Mic92/dotfiles/blob/ddf0f4821f554f7667fc803344657367c55fb9e6/nixos/eve/modules/ejabberd.nix>
|
|
||||||
# - <nixpkgs:nixos/tests/xmpp/ejabberd.nix>
|
|
||||||
# - 2013: <https://github.com/processone/ejabberd/blob/master/ejabberd.yml.example>
|
|
||||||
#
|
|
||||||
# compliance tests:
|
|
||||||
# - <https://compliance.conversations.im/server/uninsane.org/#xep0352>
|
|
||||||
{ config, lib, pkgs, ... }:
|
|
||||||
|
|
||||||
# XXX: avatar support works in MUCs but not DMs
|
|
||||||
# lib.mkIf false
|
|
||||||
{
|
|
||||||
sane.persist.sys.plaintext = [
|
|
||||||
{ user = "ejabberd"; group = "ejabberd"; directory = "/var/lib/ejabberd"; }
|
|
||||||
];
|
|
||||||
networking.firewall.allowedTCPPorts = [
|
|
||||||
3478 # STUN/TURN
|
|
||||||
5222 # XMPP client -> server
|
|
||||||
5223 # XMPPS client -> server (XMPP over TLS)
|
|
||||||
5269 # XMPP server -> server
|
|
||||||
5270 # XMPPS server -> server (XMPP over TLS)
|
|
||||||
5280 # bosh
|
|
||||||
5281 # bosh (https) ??
|
|
||||||
5349 # STUN/TURN (TLS)
|
|
||||||
5443 # web services (file uploads, websockets, admin)
|
|
||||||
];
|
|
||||||
networking.firewall.allowedUDPPorts = [
|
|
||||||
3478 # STUN/TURN
|
|
||||||
];
|
|
||||||
networking.firewall.allowedTCPPortRanges = [{
|
|
||||||
from = 49152; # TURN
|
|
||||||
to = 65535;
|
|
||||||
}];
|
|
||||||
networking.firewall.allowedUDPPortRanges = [{
|
|
||||||
from = 49152; # TURN
|
|
||||||
to = 65535;
|
|
||||||
}];
|
|
||||||
|
|
||||||
# provide access to certs
|
|
||||||
# TODO: this should just be `acme`. then we also add nginx to the `acme` group.
|
|
||||||
# why is /var/lib/acme/* owned by `nginx` group??
|
|
||||||
users.users.ejabberd.extraGroups = [ "nginx" ];
|
|
||||||
|
|
||||||
security.acme.certs."uninsane.org".extraDomainNames = [
|
|
||||||
"xmpp.uninsane.org"
|
|
||||||
"muc.xmpp.uninsane.org"
|
|
||||||
"pubsub.xmpp.uninsane.org"
|
|
||||||
"upload.xmpp.uninsane.org"
|
|
||||||
"vjid.xmpp.uninsane.org"
|
|
||||||
];
|
|
||||||
|
|
||||||
# exists so the XMPP server's cert can obtain altNames for all its resources
|
|
||||||
services.nginx.virtualHosts."xmpp.uninsane.org" = {
|
|
||||||
useACMEHost = "uninsane.org";
|
|
||||||
};
|
|
||||||
services.nginx.virtualHosts."muc.xmpp.uninsane.org" = {
|
|
||||||
useACMEHost = "uninsane.org";
|
|
||||||
};
|
|
||||||
services.nginx.virtualHosts."pubsub.xmpp.uninsane.org" = {
|
|
||||||
useACMEHost = "uninsane.org";
|
|
||||||
};
|
|
||||||
services.nginx.virtualHosts."upload.xmpp.uninsane.org" = {
|
|
||||||
useACMEHost = "uninsane.org";
|
|
||||||
};
|
|
||||||
services.nginx.virtualHosts."vjid.xmpp.uninsane.org" = {
|
|
||||||
useACMEHost = "uninsane.org";
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet = {
|
|
||||||
# XXX: SRV records have to point to something with a A/AAAA record; no CNAMEs
|
|
||||||
A."xmpp" = "%NATIVE%";
|
|
||||||
CNAME."muc.xmpp" = "xmpp";
|
|
||||||
CNAME."pubsub.xmpp" = "xmpp";
|
|
||||||
CNAME."upload.xmpp" = "xmpp";
|
|
||||||
CNAME."vjid.xmpp" = "xmpp";
|
|
||||||
|
|
||||||
# _Service._Proto.Name TTL Class SRV Priority Weight Port Target
|
|
||||||
# - <https://xmpp.org/extensions/xep-0368.html>
|
|
||||||
# something's requesting the SRV records for muc.xmpp, so let's include it
|
|
||||||
# nothing seems to request XMPP SRVs for the other records (except @)
|
|
||||||
# lower numerical priority field tells clients to prefer this method
|
|
||||||
SRV."_xmpps-client._tcp.muc.xmpp" = "3 50 5223 xmpp";
|
|
||||||
SRV."_xmpps-server._tcp.muc.xmpp" = "3 50 5270 xmpp";
|
|
||||||
SRV."_xmpp-client._tcp.muc.xmpp" = "5 50 5222 xmpp";
|
|
||||||
SRV."_xmpp-server._tcp.muc.xmpp" = "5 50 5269 xmpp";
|
|
||||||
|
|
||||||
SRV."_xmpps-client._tcp" = "3 50 5223 xmpp";
|
|
||||||
SRV."_xmpps-server._tcp" = "3 50 5270 xmpp";
|
|
||||||
SRV."_xmpp-client._tcp" = "5 50 5222 xmpp";
|
|
||||||
SRV."_xmpp-server._tcp" = "5 50 5269 xmpp";
|
|
||||||
|
|
||||||
SRV."_stun._udp" = "5 50 3478 xmpp";
|
|
||||||
SRV."_stun._tcp" = "5 50 3478 xmpp";
|
|
||||||
SRV."_stuns._tcp" = "5 50 5349 xmpp";
|
|
||||||
SRV."_turn._udp" = "5 50 3478 xmpp";
|
|
||||||
SRV."_turn._tcp" = "5 50 3478 xmpp";
|
|
||||||
SRV."_turns._tcp" = "5 50 5349 xmpp";
|
|
||||||
};
|
|
||||||
|
|
||||||
# TODO: allocate UIDs/GIDs ?
|
|
||||||
services.ejabberd.enable = true;
|
|
||||||
services.ejabberd.configFile = "/var/lib/ejabberd/ejabberd.yaml";
|
|
||||||
systemd.services.ejabberd.preStart = let
|
|
||||||
config-in = pkgs.writeTextFile {
|
|
||||||
name = "ejabberd.yaml.in";
|
|
||||||
text = ''
|
|
||||||
hosts:
|
|
||||||
- uninsane.org
|
|
||||||
|
|
||||||
# none | emergency | alert | critical | error | warning | notice | info | debug
|
|
||||||
loglevel: debug
|
|
||||||
# loglevel: info
|
|
||||||
# loglevel: notice
|
|
||||||
|
|
||||||
acme:
|
|
||||||
auto: false
|
|
||||||
certfiles:
|
|
||||||
- /var/lib/acme/uninsane.org/full.pem
|
|
||||||
# ca_file: ${pkgs.cacert.unbundled}/etc/ssl/certs/
|
|
||||||
# ca_file: ${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt
|
|
||||||
|
|
||||||
pam_userinfotype: jid
|
|
||||||
|
|
||||||
acl:
|
|
||||||
admin:
|
|
||||||
user:
|
|
||||||
- "colin@uninsane.org"
|
|
||||||
local:
|
|
||||||
user_regexp: ""
|
|
||||||
loopback:
|
|
||||||
ip:
|
|
||||||
- 127.0.0.0/8
|
|
||||||
- ::1/128
|
|
||||||
|
|
||||||
access_rules:
|
|
||||||
local:
|
|
||||||
allow: local
|
|
||||||
c2s_access:
|
|
||||||
allow: all
|
|
||||||
announce:
|
|
||||||
allow: admin
|
|
||||||
configure:
|
|
||||||
allow: admin
|
|
||||||
muc_create:
|
|
||||||
allow: local
|
|
||||||
pubsub_createnode_access:
|
|
||||||
allow: all
|
|
||||||
trusted_network:
|
|
||||||
allow: loopback
|
|
||||||
|
|
||||||
# docs: <https://docs.ejabberd.im/admin/configuration/basic/#shaper-rules>
|
|
||||||
shaper_rules:
|
|
||||||
# setting this to above 1 may break outgoing messages
|
|
||||||
# - maybe some servers rate limit? or just don't understand simultaneous connections?
|
|
||||||
max_s2s_connections: 1
|
|
||||||
max_user_sessions: 10
|
|
||||||
max_user_offline_messages: 5000
|
|
||||||
c2s_shaper:
|
|
||||||
fast: all
|
|
||||||
s2s_shaper:
|
|
||||||
med: all
|
|
||||||
|
|
||||||
# docs: <https://docs.ejabberd.im/admin/configuration/basic/#shapers>
|
|
||||||
# this limits the bytes/sec.
|
|
||||||
# for example, burst: 3_000_000 and rate: 100_000 means:
|
|
||||||
# - each client has a BW budget that accumulates 100kB/sec and is capped at 3 MB
|
|
||||||
shaper:
|
|
||||||
fast: 1000000
|
|
||||||
med: 500000
|
|
||||||
# fast:
|
|
||||||
# - rate: 1000000
|
|
||||||
# - burst_size: 10000000
|
|
||||||
# med:
|
|
||||||
# - rate: 500000
|
|
||||||
# - burst_size: 5000000
|
|
||||||
|
|
||||||
# see: <https://docs.ejabberd.im/admin/configuration/listen/>
|
|
||||||
# s2s_use_starttls: true
|
|
||||||
s2s_use_starttls: optional
|
|
||||||
# lessens 504: remote-server-timeout errors
|
|
||||||
# see: <https://github.com/processone/ejabberd/issues/3105#issuecomment-562182967>
|
|
||||||
negotiation_timeout: 60
|
|
||||||
|
|
||||||
listen:
|
|
||||||
-
|
|
||||||
port: 5222
|
|
||||||
module: ejabberd_c2s
|
|
||||||
shaper: c2s_shaper
|
|
||||||
starttls: true
|
|
||||||
access: c2s_access
|
|
||||||
-
|
|
||||||
port: 5223
|
|
||||||
module: ejabberd_c2s
|
|
||||||
shaper: c2s_shaper
|
|
||||||
tls: true
|
|
||||||
access: c2s_access
|
|
||||||
-
|
|
||||||
port: 5269
|
|
||||||
module: ejabberd_s2s_in
|
|
||||||
shaper: s2s_shaper
|
|
||||||
-
|
|
||||||
port: 5270
|
|
||||||
module: ejabberd_s2s_in
|
|
||||||
shaper: s2s_shaper
|
|
||||||
tls: true
|
|
||||||
-
|
|
||||||
port: 5443
|
|
||||||
module: ejabberd_http
|
|
||||||
tls: true
|
|
||||||
request_handlers:
|
|
||||||
/admin: ejabberd_web_admin # TODO: ensure this actually works
|
|
||||||
/api: mod_http_api # ejabberd API endpoint (to control server)
|
|
||||||
/bosh: mod_bosh
|
|
||||||
/upload: mod_http_upload
|
|
||||||
/ws: ejabberd_http_ws
|
|
||||||
# /.well-known/host-meta: mod_host_meta
|
|
||||||
# /.well-known/host-meta.json: mod_host_meta
|
|
||||||
-
|
|
||||||
# STUN+TURN TCP
|
|
||||||
# note that the full port range should be forwarded ("not NAT'd")
|
|
||||||
# `use_turn=true` enables both TURN *and* STUN
|
|
||||||
port: 3478
|
|
||||||
module: ejabberd_stun
|
|
||||||
transport: tcp
|
|
||||||
use_turn: true
|
|
||||||
turn_min_port: 49152
|
|
||||||
turn_max_port: 65535
|
|
||||||
turn_ipv4_address: %NATIVE%
|
|
||||||
-
|
|
||||||
# STUN+TURN UDP
|
|
||||||
port: 3478
|
|
||||||
module: ejabberd_stun
|
|
||||||
transport: udp
|
|
||||||
use_turn: true
|
|
||||||
turn_min_port: 49152
|
|
||||||
turn_max_port: 65535
|
|
||||||
turn_ipv4_address: %NATIVE%
|
|
||||||
-
|
|
||||||
# STUN+TURN TLS over TCP
|
|
||||||
port: 5349
|
|
||||||
module: ejabberd_stun
|
|
||||||
transport: tcp
|
|
||||||
tls: true
|
|
||||||
certfile: /var/lib/acme/uninsane.org/full.pem
|
|
||||||
use_turn: true
|
|
||||||
turn_min_port: 49152
|
|
||||||
turn_max_port: 65535
|
|
||||||
turn_ipv4_address: %NATIVE%
|
|
||||||
|
|
||||||
# TODO: enable mod_fail2ban
|
|
||||||
# TODO(low): look into mod_http_fileserver for serving macros?
|
|
||||||
modules:
|
|
||||||
# mod_adhoc: {}
|
|
||||||
# mod_announce:
|
|
||||||
# access: admin
|
|
||||||
# allows users to set avatars in vCard
|
|
||||||
# - <https://docs.ejabberd.im/admin/configuration/modules/#mod-avatar>
|
|
||||||
mod_avatar: {}
|
|
||||||
mod_caps: {} # for mod_pubsub
|
|
||||||
mod_carboncopy: {} # allows multiple clients to receive a user's message
|
|
||||||
# queues messages when recipient is offline, including PEP and presence messages.
|
|
||||||
# compliance test suggests this be enabled
|
|
||||||
mod_client_state: {}
|
|
||||||
# mod_conversejs: TODO: enable once on 21.12
|
|
||||||
# allows clients like Dino to discover where to upload files
|
|
||||||
mod_disco:
|
|
||||||
server_info:
|
|
||||||
-
|
|
||||||
modules: all
|
|
||||||
name: abuse-addresses
|
|
||||||
urls:
|
|
||||||
- "mailto:admin.xmpp@uninsane.org"
|
|
||||||
- "xmpp:colin@uninsane.org"
|
|
||||||
-
|
|
||||||
modules: all
|
|
||||||
name: admin-addresses
|
|
||||||
urls:
|
|
||||||
- "mailto:admin.xmpp@uninsane.org"
|
|
||||||
- "xmpp:colin@uninsane.org"
|
|
||||||
mod_http_upload:
|
|
||||||
host: upload.xmpp.uninsane.org
|
|
||||||
hosts:
|
|
||||||
- upload.xmpp.uninsane.org
|
|
||||||
put_url: "https://@HOST@:5443/upload"
|
|
||||||
dir_mode: "0750"
|
|
||||||
file_mode: "0750"
|
|
||||||
rm_on_unregister: false
|
|
||||||
# allow discoverability of BOSH and websocket endpoints
|
|
||||||
# TODO: enable once on ejabberd 22.05 (presently 21.04)
|
|
||||||
# mod_host_meta: {}
|
|
||||||
mod_jidprep: {} # probably not needed: lets clients normalize jids
|
|
||||||
mod_last: {} # allow other users to know when i was last online
|
|
||||||
mod_mam:
|
|
||||||
# Mnesia is limited to 2GB, better to use an SQL backend
|
|
||||||
# For small servers SQLite is a good fit and is very easy
|
|
||||||
# to configure. Uncomment this when you have SQL configured:
|
|
||||||
# db_type: sql
|
|
||||||
assume_mam_usage: true
|
|
||||||
default: always
|
|
||||||
mod_muc:
|
|
||||||
access:
|
|
||||||
- allow
|
|
||||||
access_admin:
|
|
||||||
- allow: admin
|
|
||||||
access_create: muc_create
|
|
||||||
access_persistent: muc_create
|
|
||||||
access_mam:
|
|
||||||
- allow
|
|
||||||
history_size: 100 # messages to show new participants
|
|
||||||
host: muc.xmpp.uninsane.org
|
|
||||||
hosts:
|
|
||||||
- muc.xmpp.uninsane.org
|
|
||||||
default_room_options:
|
|
||||||
anonymous: false
|
|
||||||
lang: en
|
|
||||||
persistent: true
|
|
||||||
mam: true
|
|
||||||
mod_muc_admin: {}
|
|
||||||
mod_offline: # store messages for a user when they're offline (TODO: understand multi-client workflow?)
|
|
||||||
access_max_user_messages: max_user_offline_messages
|
|
||||||
store_groupchat: true
|
|
||||||
mod_ping: {}
|
|
||||||
mod_privacy: {} # deprecated, but required for `ejabberctl export_piefxis`
|
|
||||||
mod_private: {} # allow local clients to persist arbitrary data on my server
|
|
||||||
# push notifications to services integrated with e.g. Apple/Android.
|
|
||||||
# default is for a maximum amount of PII to be withheld, since these push notifs
|
|
||||||
# generally traverse 3rd party services. can opt to include message body, etc, though.
|
|
||||||
mod_push: {}
|
|
||||||
# i don't fully understand what this does, but it seems aimed at making push notifs more reliable.
|
|
||||||
mod_push_keepalive: {}
|
|
||||||
mod_roster:
|
|
||||||
versioning: true
|
|
||||||
# docs: <https://docs.ejabberd.im/admin/configuration/modules/#mod-s2s-dialback>
|
|
||||||
# s2s dialback to verify inbound messages
|
|
||||||
# unclear to what degree the XMPP network requires this
|
|
||||||
mod_s2s_dialback: {}
|
|
||||||
mod_shared_roster: {} # creates groups for @all, @online, and anything manually administered?
|
|
||||||
mod_stream_mgmt:
|
|
||||||
resend_on_timeout: if_offline # resend undelivered messages if the origin client is offline
|
|
||||||
# fallback for when DNS-based STUN discovery is unsupported.
|
|
||||||
# - see: <https://xmpp.org/extensions/xep-0215.html>
|
|
||||||
# docs: <https://docs.ejabberd.im/admin/configuration/modules/#mod-stun-disco>
|
|
||||||
# people say to just keep this defaulted (i guess ejabberd knows to return its `host` option of uninsane.org?)
|
|
||||||
mod_stun_disco: {}
|
|
||||||
# docs: <https://docs.ejabberd.im/admin/configuration/modules/#mod-vcard>
|
|
||||||
mod_vcard:
|
|
||||||
allow_return_all: true # all users are discoverable (?)
|
|
||||||
host: vjid.xmpp.uninsane.org
|
|
||||||
hosts:
|
|
||||||
- vjid.xmpp.uninsane.org
|
|
||||||
search: true
|
|
||||||
mod_vcard_xupdate: {} # needed for avatars
|
|
||||||
# docs: <https://docs.ejabberd.im/admin/configuration/modules/#mod-pubsub>
|
|
||||||
mod_pubsub: # needed for avatars
|
|
||||||
access_createnode: pubsub_createnode_access
|
|
||||||
host: pubsub.xmpp.uninsane.org
|
|
||||||
hosts:
|
|
||||||
- pubsub.xmpp.uninsane.org
|
|
||||||
ignore_pep_from_offline: false
|
|
||||||
last_item_cache: true
|
|
||||||
plugins:
|
|
||||||
- pep
|
|
||||||
- flat
|
|
||||||
force_node_config:
|
|
||||||
# ensure client bookmarks are private
|
|
||||||
storage:bookmarks:
|
|
||||||
access_model: whitelist
|
|
||||||
urn:xmpp:avatar:data:
|
|
||||||
access_model: open
|
|
||||||
urn:xmpp:avatar:metadata:
|
|
||||||
access_model: open
|
|
||||||
mod_version: {}
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
sed = "${pkgs.gnused}/bin/sed";
|
|
||||||
in ''
|
|
||||||
ip=$(cat '${config.sane.services.dyn-dns.ipPath}')
|
|
||||||
# config is 444 (not 644), so we want to write out-of-place and then atomically move
|
|
||||||
# TODO: factor this out into `sane-woop` helper?
|
|
||||||
rm -f /var/lib/ejabberd/ejabberd.yaml.new
|
|
||||||
${sed} "s/%NATIVE%/$ip/" ${config-in} > /var/lib/ejabberd/ejabberd.yaml.new
|
|
||||||
mv /var/lib/ejabberd/ejabberd.yaml{.new,}
|
|
||||||
'';
|
|
||||||
|
|
||||||
sane.services.dyn-dns.restartOnChange = [ "ejabberd.service" ];
|
|
||||||
}
|
|
@@ -1,67 +0,0 @@
|
|||||||
{ config, lib, ... }:
|
|
||||||
|
|
||||||
# TODO: re-enable after migrating media dir to /var/lib/uninsane/media
|
|
||||||
# else it's too spammy
|
|
||||||
lib.mkIf false
|
|
||||||
{
|
|
||||||
networking.firewall.allowedUDPPorts = [
|
|
||||||
1900 7359 # DLNA: https://jellyfin.org/docs/general/networking/index.html
|
|
||||||
];
|
|
||||||
sane.persist.sys.plaintext = [
|
|
||||||
# TODO: mode? could be more granular
|
|
||||||
{ user = "jellyfin"; group = "jellyfin"; directory = "/var/lib/jellyfin"; }
|
|
||||||
];
|
|
||||||
|
|
||||||
# Jellyfin multimedia server
|
|
||||||
# this is mostly taken from the official jellfin.org docs
|
|
||||||
services.nginx.virtualHosts."jelly.uninsane.org" = {
|
|
||||||
addSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
# inherit kTLS;
|
|
||||||
|
|
||||||
locations."/" = {
|
|
||||||
proxyPass = "http://127.0.0.1:8096";
|
|
||||||
extraConfig = ''
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
||||||
proxy_set_header X-Forwarded-Proto $scheme;
|
|
||||||
proxy_set_header X-Forwarded-Protocol $scheme;
|
|
||||||
proxy_set_header X-Forwarded-Host $http_host;
|
|
||||||
|
|
||||||
# Disable buffering when the nginx proxy gets very resource heavy upon streaming
|
|
||||||
proxy_buffering off;
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
# locations."/web/" = {
|
|
||||||
# proxyPass = "http://127.0.0.1:8096/web/index.html";
|
|
||||||
# extraConfig = ''
|
|
||||||
# proxy_set_header Host $host;
|
|
||||||
# proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
||||||
# proxy_set_header X-Forwarded-Proto $scheme;
|
|
||||||
# proxy_set_header X-Forwarded-Protocol $scheme;
|
|
||||||
# proxy_set_header X-Forwarded-Host $http_host;
|
|
||||||
# '';
|
|
||||||
# };
|
|
||||||
locations."/socket" = {
|
|
||||||
proxyPass = "http://127.0.0.1:8096";
|
|
||||||
extraConfig = ''
|
|
||||||
proxy_http_version 1.1;
|
|
||||||
proxy_set_header Upgrade $http_upgrade;
|
|
||||||
proxy_set_header Connection "upgrade";
|
|
||||||
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
||||||
proxy_set_header X-Forwarded-Proto $scheme;
|
|
||||||
proxy_set_header X-Forwarded-Protocol $scheme;
|
|
||||||
proxy_set_header X-Forwarded-Host $http_host;
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet.CNAME."jelly" = "native";
|
|
||||||
|
|
||||||
services.jellyfin.enable = true;
|
|
||||||
}
|
|
@@ -1,17 +0,0 @@
|
|||||||
{ ... }:
|
|
||||||
{
|
|
||||||
sane.services.kiwix-serve = {
|
|
||||||
enable = true;
|
|
||||||
port = 8013;
|
|
||||||
zimPaths = [ "/var/lib/uninsane/www-archive/wikipedia_en_all_maxi_2022-05.zim" ];
|
|
||||||
};
|
|
||||||
|
|
||||||
services.nginx.virtualHosts."w.uninsane.org" = {
|
|
||||||
forceSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
# inherit kTLS;
|
|
||||||
locations."/".proxyPass = "http://127.0.0.1:8013";
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet.CNAME."w" = "native";
|
|
||||||
}
|
|
@@ -1,35 +0,0 @@
|
|||||||
# config options:
|
|
||||||
# - <https://github.com/mautrix/signal/blob/master/mautrix_signal/example-config.yaml>
|
|
||||||
{ config, pkgs, ... }:
|
|
||||||
{
|
|
||||||
sane.persist.sys.plaintext = [
|
|
||||||
{ user = "mautrix-signal"; group = "mautrix-signal"; directory = "/var/lib/mautrix-signal"; }
|
|
||||||
{ user = "signald"; group = "signald"; directory = "/var/lib/signald"; }
|
|
||||||
];
|
|
||||||
|
|
||||||
services.signald.enable = true;
|
|
||||||
services.mautrix-signal.enable = true;
|
|
||||||
services.mautrix-signal.environmentFile =
|
|
||||||
config.sops.secrets.mautrix_signal_env.path;
|
|
||||||
|
|
||||||
services.mautrix-signal.settings.signal.socket_path = "/run/signald/signald.sock";
|
|
||||||
services.mautrix-signal.settings.homeserver.domain = "uninsane.org";
|
|
||||||
services.mautrix-signal.settings.bridge.permissions."@colin:uninsane.org" = "admin";
|
|
||||||
services.matrix-synapse.settings.app_service_config_files = [
|
|
||||||
# auto-created by mautrix-signal service
|
|
||||||
"/var/lib/mautrix-signal/signal-registration.yaml"
|
|
||||||
];
|
|
||||||
|
|
||||||
systemd.services.mautrix-signal.serviceConfig = {
|
|
||||||
# allow communication to signald
|
|
||||||
SupplementaryGroups = [ "signald" ];
|
|
||||||
ReadWritePaths = [ "/run/signald" ];
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets."mautrix_signal_env" = {
|
|
||||||
format = "binary";
|
|
||||||
mode = "0440";
|
|
||||||
owner = config.users.users.mautrix-signal.name;
|
|
||||||
group = config.users.users.matrix-synapse.name;
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,40 +0,0 @@
|
|||||||
{ lib, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
sane.persist.sys.plaintext = [
|
|
||||||
{ user = "navidrome"; group = "navidrome"; directory = "/var/lib/navidrome"; }
|
|
||||||
];
|
|
||||||
services.navidrome.enable = true;
|
|
||||||
services.navidrome.settings = {
|
|
||||||
# docs: https://www.navidrome.org/docs/usage/configuration-options/
|
|
||||||
Address = "127.0.0.1";
|
|
||||||
Port = 4533;
|
|
||||||
MusicFolder = "/var/lib/uninsane/media/Music";
|
|
||||||
CovertArtPriority = "*.jpg, *.JPG, *.png, *.PNG, embedded";
|
|
||||||
AutoImportPlaylists = false;
|
|
||||||
ScanSchedule = "@every 1h";
|
|
||||||
};
|
|
||||||
|
|
||||||
systemd.services.navidrome.serviceConfig = {
|
|
||||||
# fix to use a normal user so we can configure perms correctly
|
|
||||||
DynamicUser = lib.mkForce false;
|
|
||||||
User = "navidrome";
|
|
||||||
Group = "navidrome";
|
|
||||||
};
|
|
||||||
|
|
||||||
users.groups.navidrome = {};
|
|
||||||
|
|
||||||
users.users.navidrome = {
|
|
||||||
group = "navidrome";
|
|
||||||
isSystemUser = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
services.nginx.virtualHosts."music.uninsane.org" = {
|
|
||||||
forceSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
# inherit kTLS;
|
|
||||||
locations."/".proxyPass = "http://127.0.0.1:4533";
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet.CNAME."music" = "native";
|
|
||||||
}
|
|
@@ -1,166 +0,0 @@
|
|||||||
# docs: https://nixos.wiki/wiki/Nginx
|
|
||||||
{ config, lib, pkgs, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
# make the logs for this host "public" so that they show up in e.g. metrics
|
|
||||||
publog = vhost: lib.attrsets.unionOfDisjoint vhost {
|
|
||||||
extraConfig = (vhost.extraConfig or "") + ''
|
|
||||||
access_log /var/log/nginx/public.log vcombined;
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
# kTLS = true; # in-kernel TLS for better perf
|
|
||||||
in
|
|
||||||
{
|
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 80 443 ];
|
|
||||||
|
|
||||||
services.nginx.enable = true;
|
|
||||||
services.nginx.appendConfig = ''
|
|
||||||
# use 1 process per core.
|
|
||||||
# may want to increase worker_connections too, but `ulimit -n` must be increased first.
|
|
||||||
worker_processes auto;
|
|
||||||
'';
|
|
||||||
|
|
||||||
# this is the standard `combined` log format, with the addition of $host
|
|
||||||
# so that we have the virtualHost in the log.
|
|
||||||
# KEEP IN SYNC WITH GOACCESS
|
|
||||||
# goaccess calls this VCOMBINED:
|
|
||||||
# - <https://gist.github.com/jyap808/10570005>
|
|
||||||
services.nginx.commonHttpConfig = ''
|
|
||||||
log_format vcombined '$host:$server_port $remote_addr - $remote_user [$time_local] "$request" $status $body_bytes_sent "$http_referrer" "$http_user_agent"';
|
|
||||||
access_log /var/log/nginx/private.log vcombined;
|
|
||||||
'';
|
|
||||||
# sets gzip_comp_level = 5
|
|
||||||
services.nginx.recommendedGzipSettings = true;
|
|
||||||
# enables OCSP stapling (so clients don't need contact the OCSP server -- i do instead)
|
|
||||||
# - doesn't seem to, actually: <https://www.ssllabs.com/ssltest/analyze.html?d=uninsane.org>
|
|
||||||
# caches TLS sessions for 10m
|
|
||||||
services.nginx.recommendedTlsSettings = true;
|
|
||||||
# enables sendfile, tcp_nopush, tcp_nodelay, keepalive_timeout 65
|
|
||||||
services.nginx.recommendedOptimisation = true;
|
|
||||||
|
|
||||||
# web blog/personal site
|
|
||||||
services.nginx.virtualHosts."uninsane.org" = publog {
|
|
||||||
root = "${pkgs.uninsane-dot-org}/share/uninsane-dot-org";
|
|
||||||
# a lot of places hardcode https://uninsane.org,
|
|
||||||
# and then when we mix http + non-https, we get CORS violations
|
|
||||||
# and things don't look right. so force SSL.
|
|
||||||
forceSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
# inherit kTLS;
|
|
||||||
# for OCSP stapling
|
|
||||||
sslTrustedCertificate = "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt";
|
|
||||||
|
|
||||||
# uninsane.org/share/foo => /var/lib/uninsane/root/share/foo.
|
|
||||||
# yes, nginx does not strip the prefix when evaluating against the root.
|
|
||||||
locations."/share".root = "/var/lib/uninsane/root";
|
|
||||||
|
|
||||||
# allow matrix users to discover that @user:uninsane.org is reachable via matrix.uninsane.org
|
|
||||||
locations."= /.well-known/matrix/server".extraConfig =
|
|
||||||
let
|
|
||||||
# use 443 instead of the default 8448 port to unite
|
|
||||||
# the client-server and server-server port for simplicity
|
|
||||||
server = { "m.server" = "matrix.uninsane.org:443"; };
|
|
||||||
in ''
|
|
||||||
add_header Content-Type application/json;
|
|
||||||
return 200 '${builtins.toJSON server}';
|
|
||||||
'';
|
|
||||||
locations."= /.well-known/matrix/client".extraConfig =
|
|
||||||
let
|
|
||||||
client = {
|
|
||||||
"m.homeserver" = { "base_url" = "https://matrix.uninsane.org"; };
|
|
||||||
"m.identity_server" = { "base_url" = "https://vector.im"; };
|
|
||||||
};
|
|
||||||
# ACAO required to allow element-web on any URL to request this json file
|
|
||||||
in ''
|
|
||||||
add_header Content-Type application/json;
|
|
||||||
add_header Access-Control-Allow-Origin *;
|
|
||||||
return 200 '${builtins.toJSON client}';
|
|
||||||
'';
|
|
||||||
|
|
||||||
# static URLs might not be aware of .well-known (e.g. registration confirmation URLs),
|
|
||||||
# so hack around that.
|
|
||||||
locations."/_matrix" = {
|
|
||||||
proxyPass = "http://127.0.0.1:8008";
|
|
||||||
};
|
|
||||||
locations."/_synapse" = {
|
|
||||||
proxyPass = "http://127.0.0.1:8008";
|
|
||||||
};
|
|
||||||
|
|
||||||
# allow ActivityPub clients to discover how to reach @user@uninsane.org
|
|
||||||
# TODO: waiting on https://git.pleroma.social/pleroma/pleroma/-/merge_requests/3361/
|
|
||||||
# locations."/.well-known/nodeinfo" = {
|
|
||||||
# proxyPass = "http://127.0.0.1:4000";
|
|
||||||
# extraConfig = pleromaExtraConfig;
|
|
||||||
# };
|
|
||||||
};
|
|
||||||
|
|
||||||
|
|
||||||
# serve any site not listed above, if it's static.
|
|
||||||
# because we define it dynamically, SSL isn't trivial. support only http
|
|
||||||
# documented <https://nginx.org/en/docs/http/ngx_http_core_module.html#server_name>
|
|
||||||
services.nginx.virtualHosts."~^(?<domain>.+)$" = {
|
|
||||||
default = true;
|
|
||||||
addSSL = true;
|
|
||||||
enableACME = false;
|
|
||||||
sslCertificate = "/var/www/certs/wildcard/cert.pem";
|
|
||||||
sslCertificateKey = "/var/www/certs/wildcard/key.pem";
|
|
||||||
# sslCertificate = "/var/lib/acme/.minica/cert.pem";
|
|
||||||
# sslCertificateKey = "/var/lib/acme/.minica/key.pem";
|
|
||||||
# serverName = null;
|
|
||||||
locations."/" = {
|
|
||||||
# somehow this doesn't escape -- i get error 400 if i:
|
|
||||||
# curl 'http://..' --resolve '..:80:127.0.0.1'
|
|
||||||
root = "/var/www/sites/$domain";
|
|
||||||
# tryFiles = "$domain/$uri $domain/$uri/ =404";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
security.acme.acceptTerms = true;
|
|
||||||
security.acme.defaults.email = "admin.acme@uninsane.org";
|
|
||||||
|
|
||||||
sane.persist.sys.plaintext = [
|
|
||||||
# TODO: mode?
|
|
||||||
{ user = "acme"; group = "acme"; directory = "/var/lib/acme"; }
|
|
||||||
{ user = "colin"; group = "users"; directory = "/var/www/sites"; }
|
|
||||||
];
|
|
||||||
|
|
||||||
# let's encrypt default chain looks like:
|
|
||||||
# - End-entity certificate ← R3 ← ISRG Root X1 ← DST Root CA X3
|
|
||||||
# - <https://community.letsencrypt.org/t/production-chain-changes/150739>
|
|
||||||
# DST Root CA X3 expired in 2021 (?)
|
|
||||||
# the alternative chain is:
|
|
||||||
# - End-entity certificate ← R3 ← ISRG Root X1 (self-signed)
|
|
||||||
# using this alternative chain grants more compatibility for services like ejabberd
|
|
||||||
# but might decrease compatibility with very old clients that don't get updates (e.g. old android, iphone <= 4).
|
|
||||||
# security.acme.defaults.extraLegoFlags = [
|
|
||||||
security.acme.certs."uninsane.org" = rec {
|
|
||||||
# ISRG Root X1 results in lets encrypt sending the same chain as default,
|
|
||||||
# just without the final ISRG Root X1 ← DST Root CA X3 link.
|
|
||||||
# i.e. we could alternative clip the last item and achieve the exact same thing.
|
|
||||||
extraLegoRunFlags = [
|
|
||||||
"--preferred-chain" "ISRG Root X1"
|
|
||||||
];
|
|
||||||
extraLegoRenewFlags = extraLegoRunFlags;
|
|
||||||
};
|
|
||||||
# TODO: alternatively, we could clip the last cert IF it's expired,
|
|
||||||
# optionally outputting that to a new cert file.
|
|
||||||
# security.acme.defaults.postRun = "";
|
|
||||||
|
|
||||||
# create a self-signed SSL certificate for use with literally any domain.
|
|
||||||
# browsers will reject this, but proxies and local testing tools can be configured
|
|
||||||
# to accept it.
|
|
||||||
system.activationScripts.generate-x509-self-signed.text = ''
|
|
||||||
mkdir -p /var/www/certs/wildcard
|
|
||||||
test -f /var/www/certs/wildcard/key.pem || ${pkgs.openssl}/bin/openssl \
|
|
||||||
req -x509 -newkey rsa:4096 \
|
|
||||||
-keyout /var/www/certs/wildcard/key.pem \
|
|
||||||
-out /var/www/certs/wildcard/cert.pem \
|
|
||||||
-sha256 -nodes -days 3650 \
|
|
||||||
-addext 'subjectAltName=DNS:*' \
|
|
||||||
-subj '/CN=self-signed'
|
|
||||||
chmod 640 /var/www/certs/wildcard/{key,cert}.pem
|
|
||||||
chown root:nginx /var/www/certs/wildcard /var/www/certs/wildcard/{key,cert}.pem
|
|
||||||
'';
|
|
||||||
}
|
|
@@ -1,21 +0,0 @@
|
|||||||
{ config, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
services.nginx.virtualHosts."nixcache.uninsane.org" = {
|
|
||||||
addSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
# inherit kTLS;
|
|
||||||
# serverAliases = [ "nixcache" ];
|
|
||||||
locations."/".extraConfig = ''
|
|
||||||
proxy_pass http://localhost:${toString config.services.nix-serve.port};
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet.CNAME."nixcache" = "native";
|
|
||||||
|
|
||||||
sane.services.nixserve.enable = true;
|
|
||||||
sane.services.nixserve.sopsFile = ../../../../secrets/servo.yaml;
|
|
||||||
}
|
|
@@ -1,64 +0,0 @@
|
|||||||
# example configs:
|
|
||||||
# - <https://github.com/kittywitch/nixfiles/blob/main/services/prosody.nix>
|
|
||||||
# create users with:
|
|
||||||
# - `sudo -u prosody prosodyctl adduser colin@uninsane.org`
|
|
||||||
|
|
||||||
{ lib, ... }:
|
|
||||||
|
|
||||||
# XXX disabled: doesn't send messages to nixnet.social (only receives them).
|
|
||||||
# nixnet runs ejabberd, so revisiting that.
|
|
||||||
lib.mkIf false
|
|
||||||
{
|
|
||||||
sane.persist.sys.plaintext = [
|
|
||||||
{ user = "prosody"; group = "prosody"; directory = "/var/lib/prosody"; }
|
|
||||||
];
|
|
||||||
networking.firewall.allowedTCPPorts = [
|
|
||||||
5222 # XMPP client -> server
|
|
||||||
5269 # XMPP server -> server
|
|
||||||
5280 # bosh
|
|
||||||
5281 # Prosody HTTPS port (necessary?)
|
|
||||||
];
|
|
||||||
|
|
||||||
# provide access to certs
|
|
||||||
users.users.prosody.extraGroups = [ "nginx" ];
|
|
||||||
|
|
||||||
security.acme.certs."uninsane.org".extraDomainNames = [
|
|
||||||
"conference.xmpp.uninsane.org"
|
|
||||||
"upload.xmpp.uninsane.org"
|
|
||||||
];
|
|
||||||
|
|
||||||
services.prosody = {
|
|
||||||
enable = true;
|
|
||||||
admins = [ "colin@uninsane.org" ];
|
|
||||||
# allowRegistration = false;
|
|
||||||
# extraConfig = ''
|
|
||||||
# s2s_require_encryption = true
|
|
||||||
# c2s_require_encryption = true
|
|
||||||
# '';
|
|
||||||
|
|
||||||
extraModules = [ "private" "vcard" "privacy" "compression" "component" "muc" "pep" "adhoc" "lastactivity" "admin_adhoc" "blocklist"];
|
|
||||||
|
|
||||||
ssl.cert = "/var/lib/acme/uninsane.org/fullchain.pem";
|
|
||||||
ssl.key = "/var/lib/acme/uninsane.org/key.pem";
|
|
||||||
|
|
||||||
muc = [
|
|
||||||
{
|
|
||||||
domain = "conference.xmpp.uninsane.org";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
uploadHttp.domain = "upload.xmpp.uninsane.org";
|
|
||||||
|
|
||||||
virtualHosts = {
|
|
||||||
localhost = {
|
|
||||||
domain = "localhost";
|
|
||||||
enabled = true;
|
|
||||||
};
|
|
||||||
"xmpp.uninsane.org" = {
|
|
||||||
domain = "uninsane.org";
|
|
||||||
enabled = true;
|
|
||||||
ssl.cert = "/var/lib/acme/uninsane.org/fullchain.pem";
|
|
||||||
ssl.key = "/var/lib/acme/uninsane.org/key.pem";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,67 +0,0 @@
|
|||||||
{ config, pkgs, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
sane.services.trust-dns.enable = true;
|
|
||||||
|
|
||||||
sane.services.trust-dns.listenAddrsIPv4 = [
|
|
||||||
# specify each address explicitly, instead of using "*".
|
|
||||||
# this ensures responses are sent from the address at which the request was received.
|
|
||||||
"192.168.0.5"
|
|
||||||
"10.0.1.5"
|
|
||||||
];
|
|
||||||
sane.services.trust-dns.quiet = true;
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".TTL = 900;
|
|
||||||
|
|
||||||
# SOA record structure: <https://en.wikipedia.org/wiki/SOA_record#Structure>
|
|
||||||
# SOA MNAME RNAME (... rest)
|
|
||||||
# MNAME = Master name server for this zone. this is where update requests should be sent.
|
|
||||||
# RNAME = admin contact (encoded email address)
|
|
||||||
# Serial = YYYYMMDDNN, where N is incremented every time this file changes, to trigger secondary NS to re-fetch it.
|
|
||||||
# Refresh = how frequently secondary NS should query master
|
|
||||||
# Retry = how long secondary NS should wait until re-querying master after a failure (must be < Refresh)
|
|
||||||
# Expire = how long secondary NS should continue to reply to queries after master fails (> Refresh + Retry)
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet = {
|
|
||||||
SOA."@" = ''
|
|
||||||
ns1.uninsane.org. admin-dns.uninsane.org. (
|
|
||||||
2022122101 ; Serial
|
|
||||||
4h ; Refresh
|
|
||||||
30m ; Retry
|
|
||||||
7d ; Expire
|
|
||||||
5m) ; Negative response TTL
|
|
||||||
'';
|
|
||||||
TXT."rev" = "2022122101";
|
|
||||||
|
|
||||||
# XXX NS records must also not be CNAME
|
|
||||||
# it's best that we keep this identical, or a superset of, what org. lists as our NS.
|
|
||||||
# so, org. can specify ns2/ns3 as being to the VPN, with no mention of ns1. we provide ns1 here.
|
|
||||||
A."ns1" = "%NATIVE%";
|
|
||||||
A."ns2" = "185.157.162.178";
|
|
||||||
A."ns3" = "185.157.162.178";
|
|
||||||
A."ovpns" = "185.157.162.178";
|
|
||||||
A."native" = "%NATIVE%";
|
|
||||||
A."@" = "%NATIVE%";
|
|
||||||
NS."@" = [
|
|
||||||
"ns1.uninsane.org."
|
|
||||||
"ns2.uninsane.org."
|
|
||||||
"ns3.uninsane.org."
|
|
||||||
];
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".file =
|
|
||||||
"/var/lib/trust-dns/uninsane.org.zone";
|
|
||||||
|
|
||||||
systemd.services.trust-dns.preStart = let
|
|
||||||
sed = "${pkgs.gnused}/bin/sed";
|
|
||||||
zone-dir = "/var/lib/trust-dns";
|
|
||||||
zone-out = "${zone-dir}/uninsane.org.zone";
|
|
||||||
zone-template = pkgs.writeText "uninsane.org.zone.in" config.sane.services.trust-dns.generatedZones."uninsane.org";
|
|
||||||
in ''
|
|
||||||
# make WAN records available to trust-dns
|
|
||||||
mkdir -p ${zone-dir}
|
|
||||||
ip=$(cat '${config.sane.services.dyn-dns.ipPath}')
|
|
||||||
${sed} s/%NATIVE%/$ip/ ${zone-template} > ${zone-out}
|
|
||||||
'';
|
|
||||||
|
|
||||||
sane.services.dyn-dns.restartOnChange = [ "trust-dns.service" ];
|
|
||||||
}
|
|
@@ -1,30 +0,0 @@
|
|||||||
# docs: <https://nixos.wiki/wiki/MediaWiki>
|
|
||||||
{ config, lib, ... }:
|
|
||||||
|
|
||||||
# XXX: working to host wikipedia with kiwix instead of mediawiki
|
|
||||||
# mediawiki does more than i need and isn't obviously superior in any way
|
|
||||||
# except that the dumps are more frequent/up-to-date.
|
|
||||||
lib.mkIf false
|
|
||||||
{
|
|
||||||
sops.secrets."mediawiki_pw" = {
|
|
||||||
owner = config.users.users.mediawiki.name;
|
|
||||||
};
|
|
||||||
|
|
||||||
services.mediawiki.enable = true;
|
|
||||||
services.mediawiki.name = "Uninsane Wiki";
|
|
||||||
services.mediawiki.passwordFile = config.sops.secrets.mediawiki_pw.path;
|
|
||||||
services.mediawiki.extraConfig = ''
|
|
||||||
# Disable anonymous editing
|
|
||||||
$wgGroupPermissions['*']['edit'] = false;
|
|
||||||
'';
|
|
||||||
services.mediawiki.virtualHost.listen = [
|
|
||||||
{
|
|
||||||
ip = "127.0.0.1";
|
|
||||||
port = 8013;
|
|
||||||
ssl = false;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
services.mediawiki.virtualHost.hostName = "w.uninsane.org";
|
|
||||||
services.mediawiki.virtualHost.adminAddr = "admin+mediawiki@uninsane.org";
|
|
||||||
# services.mediawiki.extensions = TODO: wikipedia sync extension?
|
|
||||||
}
|
|
@@ -1,22 +0,0 @@
|
|||||||
{ config, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
mkCrossFrom = localSystem: pkgs: import pkgs.path {
|
|
||||||
inherit localSystem;
|
|
||||||
crossSystem = pkgs.stdenv.hostPlatform.system;
|
|
||||||
inherit (config.nixpkgs) config overlays;
|
|
||||||
};
|
|
||||||
in
|
|
||||||
{
|
|
||||||
# the configuration of which specific package set `pkgs.cross` refers to happens elsewhere;
|
|
||||||
# here we just define them all.
|
|
||||||
nixpkgs.overlays = [
|
|
||||||
(next: prev: {
|
|
||||||
# non-emulated packages build *from* local *for* target.
|
|
||||||
# for large packages like the linux kernel which are expensive to build under emulation,
|
|
||||||
# the config can explicitly pull such packages from `pkgs.cross` to do more efficient cross-compilation.
|
|
||||||
crossFrom."x86_64-linux" = mkCrossFrom "x86_64-linux" next;
|
|
||||||
crossFrom."aarch64-linux" = mkCrossFrom "aarch64-linux" next;
|
|
||||||
})
|
|
||||||
];
|
|
||||||
}
|
|
@@ -1,84 +0,0 @@
|
|||||||
{ pkgs, ... }:
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
./cross.nix
|
|
||||||
./feeds.nix
|
|
||||||
./fs.nix
|
|
||||||
./hardware.nix
|
|
||||||
./home
|
|
||||||
./i2p.nix
|
|
||||||
./ids.nix
|
|
||||||
./machine-id.nix
|
|
||||||
./net.nix
|
|
||||||
./secrets.nix
|
|
||||||
./ssh.nix
|
|
||||||
./users.nix
|
|
||||||
./vpn.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
sane.home-manager.enable = true;
|
|
||||||
sane.nixcache.enable-trusted-keys = true;
|
|
||||||
sane.packages.enableConsolePkgs = true;
|
|
||||||
sane.packages.enableSystemPkgs = true;
|
|
||||||
|
|
||||||
sane.persist.sys.plaintext = [
|
|
||||||
"/var/log"
|
|
||||||
"/var/backup" # for e.g. postgres dumps
|
|
||||||
# TODO: move elsewhere
|
|
||||||
"/var/lib/alsa" # preserve output levels, default devices
|
|
||||||
"/var/lib/colord" # preserve color calibrations (?)
|
|
||||||
"/var/lib/machines" # maybe not needed, but would be painful to add a VM and forget.
|
|
||||||
];
|
|
||||||
|
|
||||||
# some services which use private directories error if the parent (/var/lib/private) isn't 700.
|
|
||||||
sane.fs."/var/lib/private".dir.acl.mode = "0700";
|
|
||||||
|
|
||||||
nixpkgs.config.allowUnfree = true;
|
|
||||||
|
|
||||||
# time.timeZone = "America/Los_Angeles";
|
|
||||||
time.timeZone = "Etc/UTC"; # DST is too confusing for me => use a stable timezone
|
|
||||||
|
|
||||||
# allow `nix flake ...` command
|
|
||||||
nix.extraOptions = ''
|
|
||||||
experimental-features = nix-command flakes
|
|
||||||
'';
|
|
||||||
# allow `nix-shell` (and probably nix-index?) to locate our patched and custom packages
|
|
||||||
nix.nixPath = [
|
|
||||||
"nixpkgs=${pkgs.path}"
|
|
||||||
"nixpkgs-overlays=${../..}/overlays"
|
|
||||||
];
|
|
||||||
|
|
||||||
fonts = {
|
|
||||||
enableDefaultFonts = true;
|
|
||||||
fonts = with pkgs; [ font-awesome twitter-color-emoji hack-font ];
|
|
||||||
fontconfig.enable = true;
|
|
||||||
fontconfig.defaultFonts = {
|
|
||||||
emoji = [ "Font Awesome 6 Free" "Twitter Color Emoji" ];
|
|
||||||
monospace = [ "Hack" ];
|
|
||||||
serif = [ "DejaVu Serif" ];
|
|
||||||
sansSerif = [ "DejaVu Sans" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# disable non-required packages like nano, perl, rsync, strace
|
|
||||||
environment.defaultPackages = [];
|
|
||||||
|
|
||||||
# programs.vim.defaultEditor = true;
|
|
||||||
environment.variables = {
|
|
||||||
EDITOR = "vim";
|
|
||||||
# git claims it should use EDITOR, but it doesn't!
|
|
||||||
GIT_EDITOR = "vim";
|
|
||||||
# TODO: these should be moved to `home.sessionVariables` (home-manager)
|
|
||||||
# Electron apps should use native wayland backend:
|
|
||||||
# https://nixos.wiki/wiki/Slack#Wayland
|
|
||||||
# Discord under sway crashes with this.
|
|
||||||
# NIXOS_OZONE_WL = "1";
|
|
||||||
# LIBGL_ALWAYS_SOFTWARE = "1";
|
|
||||||
};
|
|
||||||
# enable zsh completions
|
|
||||||
environment.pathsToLink = [ "/share/zsh" ];
|
|
||||||
|
|
||||||
# link debug symbols into /run/current-system/sw/lib/debug
|
|
||||||
# hopefully picked up by gdb automatically?
|
|
||||||
environment.enableDebugInfo = true;
|
|
||||||
}
|
|
@@ -1,203 +0,0 @@
|
|||||||
{ lib, sane-data, ... }:
|
|
||||||
let
|
|
||||||
hourly = { freq = "hourly"; };
|
|
||||||
daily = { freq = "daily"; };
|
|
||||||
weekly = { freq = "weekly"; };
|
|
||||||
infrequent = { freq = "infrequent"; };
|
|
||||||
|
|
||||||
art = { cat = "art"; };
|
|
||||||
humor = { cat = "humor"; };
|
|
||||||
pol = { cat = "pol"; }; # or maybe just "social"
|
|
||||||
rat = { cat = "rat"; };
|
|
||||||
tech = { cat = "tech"; };
|
|
||||||
uncat = { cat = "uncat"; };
|
|
||||||
|
|
||||||
text = { format = "text"; };
|
|
||||||
img = { format = "image"; };
|
|
||||||
|
|
||||||
mkRss = format: url: { inherit url format; } // uncat // infrequent;
|
|
||||||
# format-specific helpers
|
|
||||||
mkText = mkRss "text";
|
|
||||||
mkImg = mkRss "image";
|
|
||||||
mkPod = mkRss "podcast";
|
|
||||||
|
|
||||||
# host-specific helpers
|
|
||||||
mkSubstack = subdomain: { substack = subdomain; };
|
|
||||||
|
|
||||||
fromDb = name:
|
|
||||||
let
|
|
||||||
raw = sane-data.feeds."${name}";
|
|
||||||
in {
|
|
||||||
url = raw.url;
|
|
||||||
# not sure the exact mapping with velocity here: entries per day?
|
|
||||||
freq = lib.mkIf (raw.velocity or 0 != 0) (lib.mkDefault (
|
|
||||||
if raw.velocity > 2 then
|
|
||||||
"hourly"
|
|
||||||
else if raw.velocity > 0.5 then
|
|
||||||
"daily"
|
|
||||||
else if raw.velocity > 0.1 then
|
|
||||||
"weekly"
|
|
||||||
else
|
|
||||||
"infrequent"
|
|
||||||
));
|
|
||||||
} // lib.optionalAttrs (raw.is_podcast or false) {
|
|
||||||
format = "podcast";
|
|
||||||
} // lib.optionalAttrs (raw.title or "" != "") {
|
|
||||||
title = lib.mkDefault raw.title;
|
|
||||||
};
|
|
||||||
|
|
||||||
podcasts = [
|
|
||||||
(fromDb "lexfridman.com/podcast" // rat)
|
|
||||||
## Astral Codex Ten
|
|
||||||
(fromDb "sscpodcast.libsyn.com" // rat)
|
|
||||||
## Econ Talk
|
|
||||||
(fromDb "feeds.simplecast.com/wgl4xEgL" // rat)
|
|
||||||
## Cory Doctorow -- both podcast & text entries
|
|
||||||
(fromDb "craphound.com" // pol)
|
|
||||||
(fromDb "congressionaldish.libsyn.com" // pol)
|
|
||||||
## Civboot -- https://anchor.fm/civboot
|
|
||||||
(fromDb "anchor.fm/s/34c7232c/podcast/rss" // tech)
|
|
||||||
## Emerge: making sense of what's next -- <https://www.whatisemerging.com/emergepodcast>
|
|
||||||
(mkPod "https://anchor.fm/s/21bc734/podcast/rss" // pol // infrequent)
|
|
||||||
(fromDb "feeds.feedburner.com/80000HoursPodcast" // rat)
|
|
||||||
(fromDb "allinchamathjason.libsyn.com" // pol)
|
|
||||||
(fromDb "acquired.libsyn.com" // tech)
|
|
||||||
# The Intercept - Deconstructed; also available: <rss.acast.com/deconstructed>
|
|
||||||
(fromDb "rss.prod.firstlook.media/deconstructed/podcast.rss" // pol)
|
|
||||||
## The Daily
|
|
||||||
(mkPod "https://feeds.simplecast.com/54nAGcIl" // pol // daily)
|
|
||||||
# The Intercept - Intercepted; also available: <https://rss.acast.com/intercepted-with-jeremy-scahill>
|
|
||||||
(fromDb "rss.prod.firstlook.media/intercepted/podcast.rss" // pol)
|
|
||||||
(fromDb "podcast.posttv.com/itunes/post-reports.xml" // pol)
|
|
||||||
## Eric Weinstein
|
|
||||||
(fromDb "rss.art19.com/the-portal" // rat)
|
|
||||||
(fromDb "darknetdiaries.com" // tech)
|
|
||||||
## Radiolab -- also available here, but ONLY OVER HTTP: <http://feeds.wnyc.org/radiolab>
|
|
||||||
(fromDb "feeds.feedburner.com/radiolab" // pol)
|
|
||||||
## Sam Harris
|
|
||||||
(fromDb "wakingup.libsyn.com" // pol)
|
|
||||||
## 99% Invisible -- also available here: <https://feeds.simplecast.com/BqbsxVfO>
|
|
||||||
(fromDb "feeds.99percentinvisible.org/99percentinvisible" // pol)
|
|
||||||
(fromDb "rss.acast.com/ft-tech-tonic" // tech)
|
|
||||||
(fromDb "feeds.feedburner.com/dancarlin/history" // rat)
|
|
||||||
(fromDb "rss.art19.com/60-minutes" // pol)
|
|
||||||
## The Verge - Decoder
|
|
||||||
(fromDb "feeds.megaphone.fm/recodedecode" // tech)
|
|
||||||
## Matrix (chat) Live
|
|
||||||
(fromDb "feed.podbean.com/matrixlive/feed.xml" // tech)
|
|
||||||
## Michael Malice - Your Welcome -- also available here: <https://origin.podcastone.com/podcast?categoryID2=2232>
|
|
||||||
(fromDb "rss.art19.com/your-welcome" // pol)
|
|
||||||
(fromDb "seattlenice.buzzsprout.com" // pol)
|
|
||||||
## Sci-Fi? has Peter Watts; author of No Moods, Ads or Cutesy Fucking Icons (rifters.com)
|
|
||||||
(fromDb "talesfromthebridge.buzzsprout.com" // tech)
|
|
||||||
];
|
|
||||||
|
|
||||||
texts = [
|
|
||||||
# AGGREGATORS (> 1 post/day)
|
|
||||||
(fromDb "lwn.net" // tech)
|
|
||||||
(fromDb "lesswrong.com" // rat)
|
|
||||||
(fromDb "econlib.org" // pol)
|
|
||||||
|
|
||||||
# AGGREGATORS (< 1 post/day)
|
|
||||||
(fromDb "palladiummag.com" // uncat)
|
|
||||||
(fromDb "profectusmag.com" // uncat)
|
|
||||||
(fromDb "semiaccurate.com" // tech)
|
|
||||||
(mkText "https://linuxphoneapps.org/blog/atom.xml" // tech // infrequent)
|
|
||||||
(fromDb "spectrum.ieee.org" // tech)
|
|
||||||
## n.b.: quality RSS list here: <https://forum.merveilles.town/thread/57/share-your-rss-feeds%21-6/>
|
|
||||||
(mkText "https://forum.merveilles.town/rss.xml" // pol // infrequent)
|
|
||||||
|
|
||||||
## No Moods, Ads or Cutesy Fucking Icons
|
|
||||||
(fromDb "rifters.com/crawl" // uncat)
|
|
||||||
|
|
||||||
# DEVELOPERS
|
|
||||||
(fromDb "uninsane.org" // tech)
|
|
||||||
(fromDb "mg.lol" // tech)
|
|
||||||
(fromDb "drewdevault.com" // tech)
|
|
||||||
## Ken Shirriff
|
|
||||||
(fromDb "righto.com" // tech)
|
|
||||||
## shared blog by a few NixOS devs, notably onny
|
|
||||||
(fromDb "project-insanity.org" // tech)
|
|
||||||
## Vitalik Buterin
|
|
||||||
(fromDb "vitalik.ca" // tech)
|
|
||||||
## ian (Sanctuary)
|
|
||||||
(fromDb "sagacioussuricata.com" // tech)
|
|
||||||
## Bunnie Juang
|
|
||||||
(fromDb "bunniestudios.com" // tech)
|
|
||||||
(fromDb "blog.danieljanus.pl" // tech)
|
|
||||||
(fromDb "ianthehenry.com" // tech)
|
|
||||||
(fromDb "bitbashing.io" // tech)
|
|
||||||
(fromDb "idiomdrottning.org" // uncat)
|
|
||||||
(mkText "https://anish.lakhwara.com/home.html" // tech // weekly)
|
|
||||||
(fromDb "jefftk.com" // tech)
|
|
||||||
(fromDb "pomeroyb.com" // tech)
|
|
||||||
|
|
||||||
# (TECH; POL) COMMENTATORS
|
|
||||||
## Matt Webb -- engineering-ish, but dreamy
|
|
||||||
(fromDb "interconnected.org/home/feed" // rat)
|
|
||||||
(fromDb "edwardsnowden.substack.com" // pol // text)
|
|
||||||
## Julia Evans
|
|
||||||
(mkText "https://jvns.ca/atom.xml" // tech // weekly)
|
|
||||||
(mkText "http://benjaminrosshoffman.com/feed" // pol // weekly)
|
|
||||||
## Ben Thompson
|
|
||||||
(mkText "https://www.stratechery.com/rss" // pol // weekly)
|
|
||||||
## Balaji
|
|
||||||
(fromDb "balajis.com" // pol)
|
|
||||||
(fromDb "ben-evans.com/benedictevans" // pol)
|
|
||||||
(fromDb "lynalden.com" // pol)
|
|
||||||
(fromDb "austinvernon.site" // tech)
|
|
||||||
(mkSubstack "oversharing" // pol // daily)
|
|
||||||
(mkSubstack "doomberg" // tech // weekly)
|
|
||||||
## David Rosenthal
|
|
||||||
(fromDb "blog.dshr.org" // pol)
|
|
||||||
## Matt Levine
|
|
||||||
(mkText "https://www.bloomberg.com/opinion/authors/ARbTQlRLRjE/matthew-s-levine.rss" // pol // weekly)
|
|
||||||
(fromDb "stpeter.im/atom.xml" // pol)
|
|
||||||
## Peter Saint-Andre -- side project of stpeter.im
|
|
||||||
(fromDb "philosopher.coach" // rat)
|
|
||||||
|
|
||||||
# RATIONALITY/PHILOSOPHY/ETC
|
|
||||||
(mkSubstack "samkriss" // humor // infrequent)
|
|
||||||
(fromDb "unintendedconsequenc.es" // rat)
|
|
||||||
(fromDb "applieddivinitystudies.com" // rat)
|
|
||||||
(fromDb "slimemoldtimemold.com" // rat)
|
|
||||||
(fromDb "richardcarrier.info" // rat)
|
|
||||||
(fromDb "gwern.net" // rat)
|
|
||||||
## Jason Crawford
|
|
||||||
(fromDb "rootsofprogress.org" // rat)
|
|
||||||
## Robin Hanson
|
|
||||||
(fromDb "overcomingbias.com" // rat)
|
|
||||||
## Scott Alexander
|
|
||||||
(mkSubstack "astralcodexten" // rat // daily)
|
|
||||||
## Paul Christiano
|
|
||||||
(fromDb "sideways-view.com" // rat)
|
|
||||||
## Sean Carroll
|
|
||||||
(fromDb "preposterousuniverse.com" // rat)
|
|
||||||
|
|
||||||
## mostly dating topics. not advice, or humor, but looking through a social lens
|
|
||||||
(fromDb "putanumonit.com" // rat)
|
|
||||||
|
|
||||||
# CODE
|
|
||||||
# (mkText "https://github.com/Kaiteki-Fedi/Kaiteki/commits/master.atom" // tech // infrequent)
|
|
||||||
];
|
|
||||||
|
|
||||||
images = [
|
|
||||||
(fromDb "smbc-comics.com" // img // humor)
|
|
||||||
(fromDb "xkcd.com" // img // humor)
|
|
||||||
(fromDb "pbfcomics.com" // img // humor)
|
|
||||||
# (mkImg "http://dilbert.com/feed" // humor // daily)
|
|
||||||
|
|
||||||
# ART
|
|
||||||
(fromDb "miniature-calendar.com" // img // art // daily)
|
|
||||||
];
|
|
||||||
in
|
|
||||||
{
|
|
||||||
sane.feeds = texts ++ images ++ podcasts;
|
|
||||||
|
|
||||||
assertions = builtins.map
|
|
||||||
(p: {
|
|
||||||
assertion = p.format or "unknown" == "podcast";
|
|
||||||
message = ''${p.url} is not a podcast: ${p.format or "unknown"}'';
|
|
||||||
})
|
|
||||||
podcasts;
|
|
||||||
}
|
|
@@ -1,12 +0,0 @@
|
|||||||
# Terminal UI mail client
|
|
||||||
{ config, lib, sane-lib, ... }:
|
|
||||||
|
|
||||||
lib.mkIf config.sane.home-manager.enable
|
|
||||||
{
|
|
||||||
sops.secrets."aerc_accounts" = {
|
|
||||||
owner = config.users.users.colin.name;
|
|
||||||
sopsFile = ../../../secrets/universal/aerc_accounts.conf;
|
|
||||||
format = "binary";
|
|
||||||
};
|
|
||||||
sane.fs."/home/colin/.config/aerc/accounts.conf" = sane-lib.fs.wantedSymlinkTo config.sops.secrets.aerc_accounts.path;
|
|
||||||
}
|
|
@@ -1,23 +0,0 @@
|
|||||||
{ ... }:
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
./aerc.nix
|
|
||||||
./firefox.nix
|
|
||||||
./gfeeds.nix
|
|
||||||
./git.nix
|
|
||||||
./gpodder.nix
|
|
||||||
./keyring.nix
|
|
||||||
./kitty.nix
|
|
||||||
./libreoffice.nix
|
|
||||||
./mime.nix
|
|
||||||
./mpv.nix
|
|
||||||
./neovim.nix
|
|
||||||
./newsflash.nix
|
|
||||||
./splatmoji.nix
|
|
||||||
./ssh.nix
|
|
||||||
./sublime-music.nix
|
|
||||||
./vlc.nix
|
|
||||||
./xdg-dirs.nix
|
|
||||||
./zsh
|
|
||||||
];
|
|
||||||
}
|
|
@@ -1,199 +0,0 @@
|
|||||||
# common settings to toggle (at runtime, in about:config):
|
|
||||||
# > security.ssl.require_safe_negotiation
|
|
||||||
|
|
||||||
# librewolf is a forked firefox which patches firefox to allow more things
|
|
||||||
# (like default search engines) to be configurable at runtime.
|
|
||||||
# many of the settings below won't have effect without those patches.
|
|
||||||
# see: https://gitlab.com/librewolf-community/settings/-/blob/master/distribution/policies.json
|
|
||||||
|
|
||||||
{ config, lib, pkgs, sane-lib, ...}:
|
|
||||||
with lib;
|
|
||||||
let
|
|
||||||
cfg = config.sane.web-browser;
|
|
||||||
# allow easy switching between firefox and librewolf with `defaultSettings`, below
|
|
||||||
librewolfSettings = {
|
|
||||||
browser = pkgs.librewolf-unwrapped;
|
|
||||||
# browser = pkgs.librewolf-unwrapped.overrideAttrs (drv: {
|
|
||||||
# # this allows side-loading unsigned addons
|
|
||||||
# MOZ_REQUIRE_SIGNING = false;
|
|
||||||
# });
|
|
||||||
libName = "librewolf";
|
|
||||||
dotDir = ".librewolf";
|
|
||||||
cacheDir = ".cache/librewolf"; # TODO: is it?
|
|
||||||
desktop = "librewolf.desktop";
|
|
||||||
};
|
|
||||||
firefoxSettings = {
|
|
||||||
browser = pkgs.firefox-esr-unwrapped;
|
|
||||||
libName = "firefox";
|
|
||||||
dotDir = ".mozilla/firefox";
|
|
||||||
cacheDir = ".cache/mozilla";
|
|
||||||
desktop = "firefox.desktop";
|
|
||||||
};
|
|
||||||
defaultSettings = firefoxSettings;
|
|
||||||
# defaultSettings = librewolfSettings;
|
|
||||||
|
|
||||||
addon = name: extid: hash: pkgs.fetchFirefoxAddon {
|
|
||||||
inherit name hash;
|
|
||||||
url = "https://addons.mozilla.org/firefox/downloads/latest/${name}/latest.xpi";
|
|
||||||
# extid can be found by unar'ing the above xpi, and copying browser_specific_settings.gecko.id field
|
|
||||||
fixedExtid = extid;
|
|
||||||
};
|
|
||||||
localAddon = pkg: pkgs.fetchFirefoxAddon {
|
|
||||||
inherit (pkg) name;
|
|
||||||
src = "${pkg}/share/mozilla/extensions/\\{ec8030f7-c20a-464f-9b0e-13a3a9e97384\\}/${pkg.extid}.xpi";
|
|
||||||
fixedExtid = pkg.extid;
|
|
||||||
};
|
|
||||||
|
|
||||||
package = pkgs.wrapFirefox cfg.browser.browser {
|
|
||||||
# inherit the default librewolf.cfg
|
|
||||||
# it can be further customized via ~/.librewolf/librewolf.overrides.cfg
|
|
||||||
inherit (pkgs.librewolf-unwrapped) extraPrefsFiles;
|
|
||||||
inherit (cfg.browser) libName;
|
|
||||||
|
|
||||||
extraNativeMessagingHosts = [ pkgs.browserpass ];
|
|
||||||
# extraNativeMessagingHosts = [ pkgs.gopass-native-messaging-host ];
|
|
||||||
|
|
||||||
nixExtensions = concatMap (ext: optional ext.enable ext.package) (attrValues cfg.addons);
|
|
||||||
|
|
||||||
extraPolicies = {
|
|
||||||
NoDefaultBookmarks = true;
|
|
||||||
SearchEngines = {
|
|
||||||
Default = "DuckDuckGo";
|
|
||||||
};
|
|
||||||
AppUpdateURL = "https://localhost";
|
|
||||||
DisableAppUpdate = true;
|
|
||||||
OverrideFirstRunPage = "";
|
|
||||||
OverridePostUpdatePage = "";
|
|
||||||
DisableSystemAddonUpdate = true;
|
|
||||||
DisableFirefoxStudies = true;
|
|
||||||
DisableTelemetry = true;
|
|
||||||
DisableFeedbackCommands = true;
|
|
||||||
DisablePocket = true;
|
|
||||||
DisableSetDesktopBackground = false;
|
|
||||||
|
|
||||||
# remove many default search providers
|
|
||||||
# XXX this seems to prevent the `nixExtensions` from taking effect
|
|
||||||
# Extensions.Uninstall = [
|
|
||||||
# "google@search.mozilla.org"
|
|
||||||
# "bing@search.mozilla.org"
|
|
||||||
# "amazondotcom@search.mozilla.org"
|
|
||||||
# "ebay@search.mozilla.org"
|
|
||||||
# "twitter@search.mozilla.org"
|
|
||||||
# ];
|
|
||||||
# XXX doesn't seem to have any effect...
|
|
||||||
# docs: https://github.com/mozilla/policy-templates#homepage
|
|
||||||
# Homepage = {
|
|
||||||
# HomepageURL = "https://uninsane.org/";
|
|
||||||
# StartPage = "homepage";
|
|
||||||
# };
|
|
||||||
# NewTabPage = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
addonOpts = types.submodule {
|
|
||||||
options = {
|
|
||||||
package = mkOption {
|
|
||||||
type = types.package;
|
|
||||||
};
|
|
||||||
enable = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
in
|
|
||||||
{
|
|
||||||
options = {
|
|
||||||
sane.web-browser.browser = mkOption {
|
|
||||||
default = defaultSettings;
|
|
||||||
type = types.attrs;
|
|
||||||
};
|
|
||||||
sane.web-browser.persistData = mkOption {
|
|
||||||
description = "optional store name to which persist browsing data (like history)";
|
|
||||||
type = types.nullOr types.str;
|
|
||||||
default = null;
|
|
||||||
};
|
|
||||||
sane.web-browser.persistCache = mkOption {
|
|
||||||
description = "optional store name to which persist browser cache";
|
|
||||||
type = types.nullOr types.str;
|
|
||||||
default = "cryptClearOnBoot";
|
|
||||||
};
|
|
||||||
sane.web-browser.addons = mkOption {
|
|
||||||
type = types.attrsOf addonOpts;
|
|
||||||
default = {
|
|
||||||
# get names from:
|
|
||||||
# - ~/ref/nix-community/nur-combined/repos/rycee/pkgs/firefox-addons/generated-firefox-addons.nix
|
|
||||||
# `wget ...xpi`; `unar ...xpi`; `cat */manifest.json | jq '.browser_specific_settings.gecko.id'`
|
|
||||||
# browserpass-ce.package = addon "browserpass-ce" "browserpass@maximbaz.com" "sha256-sXgUBbRvMnRpeIW1MTkmTcoqtW/8RDXAkxAq1evFkpc=";
|
|
||||||
browserpass-extension.package = localAddon pkgs.browserpass-extension;
|
|
||||||
bypass-paywalls-clean.package = addon "bypass-paywalls-clean" "{d133e097-46d9-4ecc-9903-fa6a722a6e0e}" "sha256-JOj5P7c2JTTReHCRZXm4BscaGr3i+9Y4Ey/y621x8PI=";
|
|
||||||
ether-metamask.package = addon "ether-metamask" "webextension@metamask.io" "sha256-G+MwJDOcsaxYSUXjahHJmkWnjLeQ0Wven8DU/lGeMzA=";
|
|
||||||
i2p-in-private-browsing.package = addon "i2p-in-private-browsing" "i2ppb@eyedeekay.github.io" "sha256-dJcJ3jxeAeAkRvhODeIVrCflvX+S4E0wT/PyYzQBQWs=";
|
|
||||||
sidebery.package = addon "sidebery" "{3c078156-979c-498b-8990-85f7987dd929}" "sha256-YONfK/rIjlsrTgRHIt3km07Q7KnpIW89Z9r92ZSCc6w=";
|
|
||||||
sponsorblock.package = addon "sponsorblock" "sponsorBlocker@ajay.app" "sha256-d2K3ufvurWnYVzqLbyR//MgejybkY9exitAf9RdLNRo=";
|
|
||||||
ublacklist.package = addon "ublacklist" "@ublacklist" "sha256-RqY5iHzbL2qizth7aguyOKWPyINXmrwOlf/OsfqAS48=";
|
|
||||||
ublock-origin.package = addon "ublock-origin" "uBlock0@raymondhill.net" "sha256-a/ivUmY1P6teq9x0dt4CbgHt+3kBsEMMXlOfZ5Hx7cg=";
|
|
||||||
|
|
||||||
browserpass-extension.enable = lib.mkDefault true;
|
|
||||||
bypass-paywalls-clean.enable = lib.mkDefault true;
|
|
||||||
ether-metamask.enable = lib.mkDefault true;
|
|
||||||
i2p-in-private-browsing.enable = lib.mkDefault config.services.i2p.enable;
|
|
||||||
sidebery.enable = lib.mkDefault true;
|
|
||||||
sponsorblock.enable = lib.mkDefault true;
|
|
||||||
ublacklist.enable = lib.mkDefault true;
|
|
||||||
ublock-origin.enable = lib.mkDefault true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
config = lib.mkIf config.sane.home-manager.enable {
|
|
||||||
|
|
||||||
# uBlock filter list configuration.
|
|
||||||
# specifically, enable the GDPR cookie prompt blocker.
|
|
||||||
# data.toOverwrite.filterLists is additive (i.e. it supplements the default filters)
|
|
||||||
# this configuration method is documented here:
|
|
||||||
# - <https://github.com/gorhill/uBlock/issues/2986#issuecomment-364035002>
|
|
||||||
# the specific attribute path is found via scraping ublock code here:
|
|
||||||
# - <https://github.com/gorhill/uBlock/blob/master/src/js/storage.js>
|
|
||||||
# - <https://github.com/gorhill/uBlock/blob/master/assets/assets.json>
|
|
||||||
sane.fs."/home/colin/${cfg.browser.dotDir}/managed-storage/uBlock0@raymondhill.net.json" = sane-lib.fs.wantedText ''
|
|
||||||
{
|
|
||||||
"name": "uBlock0@raymondhill.net",
|
|
||||||
"description": "ignored",
|
|
||||||
"type": "storage",
|
|
||||||
"data": {
|
|
||||||
"toOverwrite": "{\"filterLists\": [\"fanboy-cookiemonster\"]}"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
'';
|
|
||||||
sane.fs."/home/colin/${cfg.browser.dotDir}/${cfg.browser.libName}.overrides.cfg" = sane-lib.fs.wantedText ''
|
|
||||||
// if we can't query the revocation status of a SSL cert because the issuer is offline,
|
|
||||||
// treat it as unrevoked.
|
|
||||||
// see: <https://librewolf.net/docs/faq/#im-getting-sec_error_ocsp_server_error-what-can-i-do>
|
|
||||||
defaultPref("security.OCSP.require", false);
|
|
||||||
'';
|
|
||||||
|
|
||||||
sane.packages.extraGuiPkgs = [ package ];
|
|
||||||
# flush the cache to disk to avoid it taking up too much tmp
|
|
||||||
sane.persist.home.byPath."${cfg.browser.cacheDir}" = lib.mkIf (cfg.persistCache != null) {
|
|
||||||
store = cfg.persistCache;
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.persist.home.byPath."${cfg.browser.dotDir}/default" = lib.mkIf (cfg.persistData != null) {
|
|
||||||
store = cfg.persistData;
|
|
||||||
};
|
|
||||||
sane.fs."/home/colin/${cfg.browser.dotDir}/default" = sane-lib.fs.wantedDir;
|
|
||||||
# instruct Firefox to put the profile in a predictable directory (so we can do things like persist just it).
|
|
||||||
# XXX: the directory *must* exist, even if empty; Firefox will not create the directory itself.
|
|
||||||
sane.fs."/home/colin/${cfg.browser.dotDir}/profiles.ini" = sane-lib.fs.wantedText ''
|
|
||||||
[Profile0]
|
|
||||||
Name=default
|
|
||||||
IsRelative=1
|
|
||||||
Path=default
|
|
||||||
Default=1
|
|
||||||
|
|
||||||
[General]
|
|
||||||
StartWithLastProfile=1
|
|
||||||
'';
|
|
||||||
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,42 +0,0 @@
|
|||||||
# gnome feeds RSS viewer
|
|
||||||
{ config, lib, sane-lib, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
feeds = sane-lib.feeds;
|
|
||||||
all-feeds = config.sane.feeds;
|
|
||||||
wanted-feeds = feeds.filterByFormat ["text" "image"] all-feeds;
|
|
||||||
in {
|
|
||||||
sane.fs."/home/colin/.config/org.gabmus.gfeeds.json" = sane-lib.fs.wantedText (
|
|
||||||
builtins.toJSON {
|
|
||||||
# feed format is a map from URL to a dict,
|
|
||||||
# with dict["tags"] a list of string tags.
|
|
||||||
feeds = sane-lib.mapToAttrs (feed: {
|
|
||||||
name = feed.url;
|
|
||||||
value.tags = [ feed.cat feed.freq ];
|
|
||||||
}) wanted-feeds;
|
|
||||||
dark_reader = false;
|
|
||||||
new_first = true;
|
|
||||||
# windowsize = {
|
|
||||||
# width = 350;
|
|
||||||
# height = 650;
|
|
||||||
# };
|
|
||||||
max_article_age_days = 90;
|
|
||||||
enable_js = false;
|
|
||||||
max_refresh_threads = 3;
|
|
||||||
# saved_items = {};
|
|
||||||
# read_items = [];
|
|
||||||
show_read_items = true;
|
|
||||||
full_article_title = true;
|
|
||||||
# views: "webview", "reader", "rsscont"
|
|
||||||
default_view = "rsscont";
|
|
||||||
open_links_externally = true;
|
|
||||||
full_feed_name = false;
|
|
||||||
refresh_on_startup = true;
|
|
||||||
tags = lib.unique (
|
|
||||||
(builtins.catAttrs "cat" wanted-feeds) ++ (builtins.catAttrs "freq" wanted-feeds)
|
|
||||||
);
|
|
||||||
open_youtube_externally = false;
|
|
||||||
media_player = "vlc"; # default: mpv
|
|
||||||
}
|
|
||||||
);
|
|
||||||
}
|
|
@@ -1,19 +0,0 @@
|
|||||||
{ config, lib, pkgs, sane-lib, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
mkCfg = lib.generators.toINI { };
|
|
||||||
in
|
|
||||||
lib.mkIf config.sane.home-manager.enable
|
|
||||||
{
|
|
||||||
sane.fs."/home/colin/.config/git/config" = sane-lib.fs.wantedText (mkCfg {
|
|
||||||
user.name = "Colin";
|
|
||||||
user.email = "colin@uninsane.org";
|
|
||||||
alias.co = "checkout";
|
|
||||||
# difftastic docs:
|
|
||||||
# - <https://difftastic.wilfred.me.uk/git.html>
|
|
||||||
diff.tool = "difftastic";
|
|
||||||
difftool.prompt = false;
|
|
||||||
"difftool \"difftastic\"".cmd = ''${pkgs.difftastic}/bin/difft "$LOCAL" "$REMOTE"'';
|
|
||||||
# now run `git difftool` to use difftastic git
|
|
||||||
});
|
|
||||||
}
|
|
@@ -1,12 +0,0 @@
|
|||||||
# gnome feeds RSS viewer
|
|
||||||
{ config, sane-lib, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
feeds = sane-lib.feeds;
|
|
||||||
all-feeds = config.sane.feeds;
|
|
||||||
wanted-feeds = feeds.filterByFormat ["podcast"] all-feeds;
|
|
||||||
in {
|
|
||||||
sane.fs."/home/colin/.config/gpodderFeeds.opml" = sane-lib.fs.wantedText (
|
|
||||||
feeds.feedsToOpml wanted-feeds
|
|
||||||
);
|
|
||||||
}
|
|
@@ -1,11 +0,0 @@
|
|||||||
{ config, lib, sane-lib, ... }:
|
|
||||||
|
|
||||||
lib.mkIf config.sane.home-manager.enable
|
|
||||||
{
|
|
||||||
sane.persist.home.private = [ ".local/share/keyrings" ];
|
|
||||||
|
|
||||||
sane.fs."/home/colin/private/.local/share/keyrings/default" = {
|
|
||||||
generated.script.script = builtins.readFile ../../../scripts/init-keyring;
|
|
||||||
wantedBy = [ config.sane.fs."/home/colin/private".unit ];
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,69 +0,0 @@
|
|||||||
{ config, lib, pkgs, sane-lib, ... }:
|
|
||||||
|
|
||||||
lib.mkIf config.sane.home-manager.enable
|
|
||||||
{
|
|
||||||
sane.fs."/home/colin/.config/kitty/kitty.conf" = sane-lib.fs.wantedText ''
|
|
||||||
# docs: https://sw.kovidgoyal.net/kitty/conf/
|
|
||||||
# disable terminal bell (when e.g. you backspace too many times)
|
|
||||||
enable_audio_bell no
|
|
||||||
|
|
||||||
map ctrl+n new_os_window_with_cwd
|
|
||||||
|
|
||||||
include ${pkgs.kitty-themes}/themes/PaperColor_dark.conf
|
|
||||||
'';
|
|
||||||
# THEME CHOICES:
|
|
||||||
# docs: https://github.com/kovidgoyal/kitty-themes
|
|
||||||
# theme = "1984 Light"; # dislike: awful, harsh blues/teals
|
|
||||||
# theme = "Adventure Time"; # dislike: harsh (dark)
|
|
||||||
# theme = "Atom One Light"; # GOOD: light theme. all color combos readable. not a huge fan of the blue.
|
|
||||||
# theme = "Belafonte Day"; # dislike: too low contrast for text colors
|
|
||||||
# theme = "Belafonte Night"; # better: dark theme that's easy on the eyes. all combos readable. low contrast.
|
|
||||||
# theme = "Catppuccin"; # dislike: a bit pale/low-contrast (dark)
|
|
||||||
# theme = "Desert"; # mediocre: colors are harsh
|
|
||||||
# theme = "Earthsong"; # BEST: dark theme. readable, good contrast. unique, but decent colors.
|
|
||||||
# theme = "Espresso Libre"; # better: dark theme. readable, but meh colors
|
|
||||||
# theme = "Forest Night"; # decent: very pastel. it's workable, but unconventional and muted/flat.
|
|
||||||
# theme = "Gruvbox Material Light Hard"; # mediocre light theme.
|
|
||||||
# theme = "kanagawabones"; # better: dark theme. colors are too background-y
|
|
||||||
# theme = "Kaolin Dark"; # dislike: too dark
|
|
||||||
# theme = "Kaolin Breeze"; # mediocre: not-too-harsh light theme, but some parts are poor contrast
|
|
||||||
# theme = "Later This Evening"; # mediocre: not-too-harsh dark theme, but cursor is poor contrast
|
|
||||||
# theme = "Material"; # decent: light theme, few colors.
|
|
||||||
# theme = "Mayukai"; # decent: not-too-harsh dark theme. the teal is a bit straining
|
|
||||||
# theme = "Nord"; # mediocre: pale background, low contrast
|
|
||||||
# theme = "One Half Light"; # better: not-too-harsh light theme. contrast could be better
|
|
||||||
# theme = "PaperColor Dark"; # BEST: dark theme, very readable still the colors are background-y
|
|
||||||
# theme = "Parasio Dark"; # dislike: too low contrast
|
|
||||||
# theme = "Pencil Light"; # better: not-too-harsh light theme. decent contrast.
|
|
||||||
# theme = "Pnevma"; # dislike: too low contrast
|
|
||||||
# theme = "Piatto Light"; # better: readable light theme. pleasing colors. powerline prompt is hard to read.
|
|
||||||
# theme = "Rosé Pine Dawn"; # GOOD: light theme. all color combinations are readable. it is very mild -- may need to manually tweak contrast. tasteful colors
|
|
||||||
# theme = "Rosé Pine Moon"; # GOOD: dark theme. tasteful colors. but background is a bit intense
|
|
||||||
# theme = "Sea Shells"; # mediocre. not all color combos are readable
|
|
||||||
# theme = "Solarized Light"; # mediocre: not-too-harsh light theme; GREAT background; but some colors are low contrast
|
|
||||||
# theme = "Solarized Dark Higher Contrast"; # better: dark theme, decent colors
|
|
||||||
# theme = "Sourcerer"; # mediocre: ugly colors
|
|
||||||
# theme = "Space Gray"; # mediocre: too muted
|
|
||||||
# theme = "Space Gray Eighties"; # better: all readable, decent colors
|
|
||||||
# theme = "Spacemacs"; # mediocre: too muted
|
|
||||||
# theme = "Spring"; # mediocre: readable light theme, but the teal is ugly.
|
|
||||||
# theme = "Srcery"; # better: highly readable. colors are ehhh
|
|
||||||
# theme = "Substrata"; # decent: nice colors, but a bit flat.
|
|
||||||
# theme = "Sundried"; # mediocre: the solar text makes me squint
|
|
||||||
# theme = "Symfonic"; # mediocre: the dark purple has low contrast to the black bg.
|
|
||||||
# theme = "Tango Light"; # dislike: teal is too grating
|
|
||||||
# theme = "Tokyo Night Day"; # medicore: too muted
|
|
||||||
# theme = "Tokyo Night"; # better: tasteful. a bit flat
|
|
||||||
# theme = "Tomorrow"; # GOOD: all color combinations are readable. contrast is slightly better than Rose. on the blander side
|
|
||||||
# theme = "Treehouse"; # dislike: the orange is harsh on my eyes.
|
|
||||||
# theme = "Urple"; # dislike: weird palette
|
|
||||||
# theme = "Warm Neon"; # decent: not-too-harsh dark theme. the green is a bit unattractive
|
|
||||||
# theme = "Wild Cherry"; # GOOD: dark theme: nice colors. a bit flat
|
|
||||||
# theme = "Xcodedark"; # dislike: bad palette
|
|
||||||
# theme = "citylights"; # decent: dark theme. some parts have just a bit low contrast
|
|
||||||
# theme = "neobones_light"; # better light theme. the background is maybe too muted
|
|
||||||
# theme = "vimbones";
|
|
||||||
# theme = "zenbones_dark"; # mediocre: readable, but meh colors
|
|
||||||
# theme = "zenbones_light"; # decent: light theme. all colors are readable. contrast is passable but not excellent. highlight color is BAD
|
|
||||||
# theme = "zenwritten_dark"; # mediocre: looks same as zenbones_dark
|
|
||||||
}
|
|
@@ -1,15 +0,0 @@
|
|||||||
{ config, lib, sane-lib, ... }:
|
|
||||||
|
|
||||||
lib.mkIf config.sane.home-manager.enable
|
|
||||||
{
|
|
||||||
# libreoffice: disable first-run stuff
|
|
||||||
sane.fs."/home/colin/.config/libreoffice/4/user/registrymodifications.xcu" = sane-lib.fs.wantedText ''
|
|
||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<oor:items xmlns:oor="http://openoffice.org/2001/registry" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
|
|
||||||
<item oor:path="/org.openoffice.Office.Common/Misc"><prop oor:name="FirstRun" oor:op="fuse"><value>false</value></prop></item>
|
|
||||||
<item oor:path="/org.openoffice.Office.Common/Misc"><prop oor:name="ShowTipOfTheDay" oor:op="fuse"><value>false</value></prop></item>
|
|
||||||
</oor:items>
|
|
||||||
'';
|
|
||||||
# <item oor:path="/org.openoffice.Setup/Product"><prop oor:name="LastTimeDonateShown" oor:op="fuse"><value>1667693880</value></prop></item>
|
|
||||||
# <item oor:path="/org.openoffice.Setup/Product"><prop oor:name="LastTimeGetInvolvedShown" oor:op="fuse"><value>1667693880</value></prop></item>
|
|
||||||
}
|
|
@@ -1,43 +0,0 @@
|
|||||||
{ config, lib, sane-lib, ...}:
|
|
||||||
|
|
||||||
let
|
|
||||||
www = config.sane.web-browser.browser.desktop;
|
|
||||||
pdf = "org.gnome.Evince.desktop";
|
|
||||||
md = "obsidian.desktop";
|
|
||||||
thumb = "org.gnome.gThumb.desktop";
|
|
||||||
video = "vlc.desktop";
|
|
||||||
# audio = "mpv.desktop";
|
|
||||||
audio = "vlc.desktop";
|
|
||||||
in
|
|
||||||
lib.mkIf config.sane.home-manager.enable
|
|
||||||
{
|
|
||||||
|
|
||||||
# the xdg mime type for a file can be found with:
|
|
||||||
# - `xdg-mime query filetype path/to/thing.ext`
|
|
||||||
# we can have single associations or a list of associations.
|
|
||||||
# there's also options to *remove* [non-default] associations from specific apps
|
|
||||||
xdg.mime.enable = true;
|
|
||||||
xdg.mime.defaultApplications = {
|
|
||||||
# AUDIO
|
|
||||||
"audio/flac" = audio;
|
|
||||||
"audio/mpeg" = audio;
|
|
||||||
"audio/x-vorbis+ogg" = audio;
|
|
||||||
# IMAGES
|
|
||||||
"image/heif" = thumb; # apple codec
|
|
||||||
"image/png" = thumb;
|
|
||||||
"image/jpeg" = thumb;
|
|
||||||
# VIDEO
|
|
||||||
"video/mp4" = video;
|
|
||||||
"video/quicktime" = video;
|
|
||||||
"video/x-matroska" = video;
|
|
||||||
# HTML
|
|
||||||
"text/html" = www;
|
|
||||||
"x-scheme-handler/http" = www;
|
|
||||||
"x-scheme-handler/https" = www;
|
|
||||||
"x-scheme-handler/about" = www;
|
|
||||||
"x-scheme-handler/unknown" = www;
|
|
||||||
# RICH-TEXT DOCUMENTS
|
|
||||||
"application/pdf" = pdf;
|
|
||||||
"text/markdown" = md;
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,11 +0,0 @@
|
|||||||
{ config, lib, sane-lib, ... }:
|
|
||||||
|
|
||||||
lib.mkIf config.sane.home-manager.enable
|
|
||||||
{
|
|
||||||
# format is <key>=%<length>%<value>
|
|
||||||
sane.fs."/home/colin/.config/mpv/mpv.conf" = sane-lib.fs.wantedText ''
|
|
||||||
save-position-on-quit=%3%yes
|
|
||||||
keep-open=%3%yes
|
|
||||||
'';
|
|
||||||
}
|
|
||||||
|
|
@@ -1,130 +0,0 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
inherit (builtins) map;
|
|
||||||
inherit (lib) concatMapStrings optionalString;
|
|
||||||
# this structure roughly mirrors home-manager's `programs.neovim.plugins` option
|
|
||||||
plugins = with pkgs.vimPlugins; [
|
|
||||||
# docs: surround-nvim: https://github.com/ur4ltz/surround.nvim/
|
|
||||||
# docs: vim-surround: https://github.com/tpope/vim-surround
|
|
||||||
{ plugin = vim-surround; }
|
|
||||||
# docs: fzf-vim (fuzzy finder): https://github.com/junegunn/fzf.vim
|
|
||||||
{ plugin = fzf-vim; }
|
|
||||||
({
|
|
||||||
# docs: tex-conceal-vim: https://github.com/KeitaNakamura/tex-conceal.vim/
|
|
||||||
plugin = tex-conceal-vim;
|
|
||||||
type = "viml";
|
|
||||||
config = ''
|
|
||||||
" present prettier fractions
|
|
||||||
let g:tex_conceal_frac=1
|
|
||||||
'';
|
|
||||||
})
|
|
||||||
({
|
|
||||||
plugin = vim-SyntaxRange;
|
|
||||||
type = "viml";
|
|
||||||
config = ''
|
|
||||||
" enable markdown-style codeblock highlighting for tex code
|
|
||||||
autocmd BufEnter * call SyntaxRange#Include('```tex', '```', 'tex', 'NonText')
|
|
||||||
" autocmd Syntax tex set conceallevel=2
|
|
||||||
'';
|
|
||||||
})
|
|
||||||
({
|
|
||||||
# treesitter syntax highlighting: https://nixos.wiki/wiki/Tree_sitters
|
|
||||||
# docs: https://github.com/nvim-treesitter/nvim-treesitter
|
|
||||||
# config taken from: https://github.com/i077/system/blob/master/modules/home/neovim/default.nix
|
|
||||||
# this is required for tree-sitter to even highlight
|
|
||||||
plugin = nvim-treesitter.withAllGrammars;
|
|
||||||
type = "lua";
|
|
||||||
config = ''
|
|
||||||
require'nvim-treesitter.configs'.setup {
|
|
||||||
highlight = {
|
|
||||||
enable = true,
|
|
||||||
-- disable treesitter on Rust so that we can use SyntaxRange
|
|
||||||
-- and leverage TeX rendering in rust projects
|
|
||||||
disable = { "rust", "tex", "latex" },
|
|
||||||
-- disable = { "tex", "latex" },
|
|
||||||
-- true to also use builtin vim syntax highlighting when treesitter fails
|
|
||||||
additional_vim_regex_highlighting = false
|
|
||||||
},
|
|
||||||
incremental_selection = {
|
|
||||||
enable = true,
|
|
||||||
keymaps = {
|
|
||||||
init_selection = "gnn",
|
|
||||||
node_incremental = "grn",
|
|
||||||
mcope_incremental = "grc",
|
|
||||||
node_decremental = "grm"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
indent = {
|
|
||||||
enable = true,
|
|
||||||
disable = {}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
vim.o.foldmethod = 'expr'
|
|
||||||
vim.o.foldexpr = 'nvim_treesitter#foldexpr()'
|
|
||||||
'';
|
|
||||||
})
|
|
||||||
];
|
|
||||||
plugin-packages = map (p: p.plugin) plugins;
|
|
||||||
plugin-config-tex = concatMapStrings (p: optionalString (p.type or "" == "viml") p.config) plugins;
|
|
||||||
plugin-config-lua = concatMapStrings (p: optionalString (p.type or "" == "lua") p.config) plugins;
|
|
||||||
in
|
|
||||||
lib.mkIf config.sane.home-manager.enable
|
|
||||||
{
|
|
||||||
# private because there could be sensitive things in the swap
|
|
||||||
sane.persist.home.private = [ ".cache/vim-swap" ];
|
|
||||||
|
|
||||||
programs.neovim = {
|
|
||||||
# neovim: https://github.com/neovim/neovim
|
|
||||||
enable = true;
|
|
||||||
viAlias = true;
|
|
||||||
vimAlias = true;
|
|
||||||
configure = {
|
|
||||||
packages.myVimPackage = {
|
|
||||||
start = plugin-packages;
|
|
||||||
};
|
|
||||||
customRC = ''
|
|
||||||
" let the terminal handle mouse events, that way i get OS-level ctrl+shift+c/etc
|
|
||||||
" this used to be default, until <https://github.com/neovim/neovim/pull/19290>
|
|
||||||
set mouse=
|
|
||||||
|
|
||||||
" copy/paste to system clipboard
|
|
||||||
set clipboard=unnamedplus
|
|
||||||
|
|
||||||
" screw tabs; always expand them into spaces
|
|
||||||
set expandtab
|
|
||||||
|
|
||||||
" at least don't open files with sections folded by default
|
|
||||||
set nofoldenable
|
|
||||||
|
|
||||||
" allow text substitutions for certain glyphs.
|
|
||||||
" higher number = more aggressive substitution (0, 1, 2, 3)
|
|
||||||
" i only make use of this for tex, but it's unclear how to
|
|
||||||
" apply that *just* to tex and retain the SyntaxRange stuff.
|
|
||||||
set conceallevel=2
|
|
||||||
|
|
||||||
" horizontal rule under the active line
|
|
||||||
" set cursorline
|
|
||||||
|
|
||||||
" highlight trailing space & related syntax errors (doesn't seem to work??)
|
|
||||||
" let c_space_errors=1
|
|
||||||
" let python_space_errors=1
|
|
||||||
|
|
||||||
" enable highlighting of leading/trailing spaces,
|
|
||||||
" and especially tabs
|
|
||||||
" source: https://www.reddit.com/r/neovim/comments/chlmfk/highlight_trailing_whitespaces_in_neovim/
|
|
||||||
set list
|
|
||||||
set listchars=tab:▷\·,trail:·,extends:◣,precedes:◢,nbsp:○
|
|
||||||
|
|
||||||
""""" PLUGIN CONFIG (tex)
|
|
||||||
${plugin-config-tex}
|
|
||||||
|
|
||||||
""""" PLUGIN CONFIG (lua)
|
|
||||||
lua <<EOF
|
|
||||||
${plugin-config-lua}
|
|
||||||
EOF
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,12 +0,0 @@
|
|||||||
# news-flash RSS viewer
|
|
||||||
{ config, sane-lib, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
feeds = sane-lib.feeds;
|
|
||||||
all-feeds = config.sane.feeds;
|
|
||||||
wanted-feeds = feeds.filterByFormat ["text" "image"] all-feeds;
|
|
||||||
in {
|
|
||||||
sane.fs."/home/colin/.config/newsflashFeeds.opml" = sane-lib.fs.wantedText (
|
|
||||||
feeds.feedsToOpml wanted-feeds
|
|
||||||
);
|
|
||||||
}
|
|
@@ -1,19 +0,0 @@
|
|||||||
# borrows from:
|
|
||||||
# - default config: <https://github.com/cspeterson/splatmoji/blob/master/splatmoji.config>
|
|
||||||
# - wayland: <https://github.com/cspeterson/splatmoji/issues/32#issuecomment-830862566>
|
|
||||||
{ pkgs, sane-lib, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
sane.persist.home.plaintext = [ ".local/state/splatmoji" ];
|
|
||||||
sane.fs."/home/colin/.config/splatmoji/splatmoji.config" = sane-lib.fs.wantedText ''
|
|
||||||
history_file=/home/colin/.local/state/splatmoji/history
|
|
||||||
history_length=5
|
|
||||||
# TODO: wayland equiv
|
|
||||||
paste_command=xdotool key ctrl+v
|
|
||||||
# rofi_command=${pkgs.wofi}/bin/wofi --dmenu --insensitive --cache-file /dev/null
|
|
||||||
rofi_command=${pkgs.fuzzel}/bin/fuzzel -d -i -w 60
|
|
||||||
xdotool_command=${pkgs.wtype}/bin/wtype
|
|
||||||
# TODO: wayland equiv
|
|
||||||
xsel_command=xsel -b -i
|
|
||||||
'';
|
|
||||||
}
|
|
@@ -1,23 +0,0 @@
|
|||||||
{ config, lib, pkgs, sane-lib, ... }:
|
|
||||||
|
|
||||||
with lib;
|
|
||||||
let
|
|
||||||
host = config.networking.hostName;
|
|
||||||
user-pubkey = config.sane.ssh.pubkeys."colin@${host}".asUserKey;
|
|
||||||
host-keys = filter (k: k.user == "root") (attrValues config.sane.ssh.pubkeys);
|
|
||||||
known-hosts-text = concatStringsSep
|
|
||||||
"\n"
|
|
||||||
(map (k: k.asHostKey) host-keys)
|
|
||||||
;
|
|
||||||
in lib.mkIf config.sane.home-manager.enable {
|
|
||||||
# ssh key is stored in private storage
|
|
||||||
sane.persist.home.private = [ ".ssh/id_ed25519" ];
|
|
||||||
sane.fs."/home/colin/.ssh/id_ed25519.pub" = sane-lib.fs.wantedText user-pubkey;
|
|
||||||
sane.fs."/home/colin/.ssh/known_hosts" = sane-lib.fs.wantedText known-hosts-text;
|
|
||||||
|
|
||||||
users.users.colin.openssh.authorizedKeys.keys =
|
|
||||||
let
|
|
||||||
user-keys = filter (k: k.user == "colin") (attrValues config.sane.ssh.pubkeys);
|
|
||||||
in
|
|
||||||
map (k: k.asUserKey) user-keys;
|
|
||||||
}
|
|
@@ -1,12 +0,0 @@
|
|||||||
{ config, lib, sane-lib, ... }:
|
|
||||||
|
|
||||||
lib.mkIf config.sane.home-manager.enable
|
|
||||||
{
|
|
||||||
# TODO: this should only be shipped on gui platforms
|
|
||||||
sops.secrets."sublime_music_config" = {
|
|
||||||
owner = config.users.users.colin.name;
|
|
||||||
sopsFile = ../../../secrets/universal/sublime_music_config.json.bin;
|
|
||||||
format = "binary";
|
|
||||||
};
|
|
||||||
sane.fs."/home/colin/.config/sublime-music/config.json" = sane-lib.fs.wantedSymlinkTo config.sops.secrets.sublime_music_config.path;
|
|
||||||
}
|
|
@@ -1,21 +0,0 @@
|
|||||||
{ config, lib, sane-lib, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
feeds = sane-lib.feeds;
|
|
||||||
all-feeds = config.sane.feeds;
|
|
||||||
wanted-feeds = feeds.filterByFormat ["podcast"] all-feeds;
|
|
||||||
podcast-urls = lib.concatStringsSep "|" (
|
|
||||||
builtins.map (feed: feed.url) wanted-feeds
|
|
||||||
);
|
|
||||||
in
|
|
||||||
lib.mkIf config.sane.home-manager.enable
|
|
||||||
{
|
|
||||||
sane.fs."/home/colin/.config/vlc/vlcrc" = sane-lib.fs.wantedText ''
|
|
||||||
[podcast]
|
|
||||||
podcast-urls=${podcast-urls}
|
|
||||||
[core]
|
|
||||||
metadata-network-access=0
|
|
||||||
[qt]
|
|
||||||
qt-privacy-ask=0
|
|
||||||
'';
|
|
||||||
}
|
|
@@ -1,21 +0,0 @@
|
|||||||
{ config, lib, sane-lib, ...}:
|
|
||||||
|
|
||||||
lib.mkIf config.sane.home-manager.enable
|
|
||||||
{
|
|
||||||
# XDG defines things like ~/Desktop, ~/Downloads, etc.
|
|
||||||
# these clutter the home, so i mostly don't use them.
|
|
||||||
sane.fs."/home/colin/.config/user-dirs.dirs" = sane-lib.fs.wantedText ''
|
|
||||||
XDG_DESKTOP_DIR="$HOME/.xdg/Desktop"
|
|
||||||
XDG_DOCUMENTS_DIR="$HOME/dev"
|
|
||||||
XDG_DOWNLOAD_DIR="$HOME/tmp"
|
|
||||||
XDG_MUSIC_DIR="$HOME/Music"
|
|
||||||
XDG_PICTURES_DIR="$HOME/Pictures"
|
|
||||||
XDG_PUBLICSHARE_DIR="$HOME/.xdg/Public"
|
|
||||||
XDG_TEMPLATES_DIR="$HOME/.xdg/Templates"
|
|
||||||
XDG_VIDEOS_DIR="$HOME/Videos"
|
|
||||||
'';
|
|
||||||
|
|
||||||
# prevent `xdg-user-dirs-update` from overriding/updating our config
|
|
||||||
# see <https://manpages.ubuntu.com/manpages/bionic/man5/user-dirs.conf.5.html>
|
|
||||||
sane.fs."/home/colin/.config/user-dirs.conf" = sane-lib.fs.wantedText "enabled=False";
|
|
||||||
}
|
|
@@ -1,141 +0,0 @@
|
|||||||
{ config, lib, pkgs, sane-lib, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
# powerlevel10k prompt config
|
|
||||||
# p10k.zsh is the auto-generated config, and i overwrite those defaults here, below.
|
|
||||||
p10k-overrides = ''
|
|
||||||
# powerlevel10k launches a gitstatusd daemon to accelerate git prompt queries.
|
|
||||||
# this keeps open file handles for any git repo i touch for 60 minutes (by default).
|
|
||||||
# that prevents unmounting whatever device the git repo is on -- particularly problematic for ~/private.
|
|
||||||
# i can disable gitstatusd and get slower fallback git queries:
|
|
||||||
# - either universally
|
|
||||||
# - or selectively by path
|
|
||||||
# see: <https://github.com/romkatv/powerlevel10k/issues/246>
|
|
||||||
typeset -g POWERLEVEL9K_VCS_DISABLED_DIR_PATTERN='(/home/colin/private/*|/home/colin/knowledge/*)'
|
|
||||||
# typeset -g POWERLEVEL9K_DISABLE_GITSTATUS=true
|
|
||||||
|
|
||||||
# show user@host also when logged into the current machine.
|
|
||||||
# default behavior is to show it only over ssh.
|
|
||||||
typeset -g POWERLEVEL9K_CONTEXT_{DEFAULT,SUDO}_CONTENT_EXPANSION='$P9K_CONTENT'
|
|
||||||
'';
|
|
||||||
|
|
||||||
prezto-init = ''
|
|
||||||
source ${pkgs.zsh-autosuggestions}/share/zsh-autosuggestions/zsh-autosuggestions.zsh
|
|
||||||
source ${pkgs.zsh-syntax-highlighting}/share/zsh-syntax-highlighting/zsh-syntax-highlighting.zsh
|
|
||||||
source ${pkgs.zsh-prezto}/share/zsh-prezto/init.zsh
|
|
||||||
'';
|
|
||||||
in
|
|
||||||
lib.mkIf config.sane.home-manager.enable
|
|
||||||
{
|
|
||||||
sane.persist.home.plaintext = [
|
|
||||||
# we don't need to full zsh dir -- just the history file --
|
|
||||||
# but zsh will sometimes backup the history file and we get fewer errors if we do proper mounts instead of symlinks.
|
|
||||||
# TODO: should be private?
|
|
||||||
".local/share/zsh"
|
|
||||||
# cache gitstatus otherwise p10k fetched it from the net EVERY BOOT
|
|
||||||
".cache/gitstatus"
|
|
||||||
];
|
|
||||||
|
|
||||||
# zsh/prezto complains if zshrc doesn't exist; but it does allow an "empty" file.
|
|
||||||
sane.fs."/home/colin/.config/zsh/.zshrc" = sane-lib.fs.wantedText "# ";
|
|
||||||
|
|
||||||
programs.zsh = {
|
|
||||||
enable = true;
|
|
||||||
histFile = "$HOME/.local/share/zsh/history";
|
|
||||||
shellAliases = {
|
|
||||||
":q" = "exit";
|
|
||||||
# common typos
|
|
||||||
"cd.." = "cd ..";
|
|
||||||
"cd../" = "cd ../";
|
|
||||||
};
|
|
||||||
setOptions = [
|
|
||||||
# defaults:
|
|
||||||
"HIST_IGNORE_DUPS"
|
|
||||||
"SHARE_HISTORY"
|
|
||||||
"HIST_FCNTL_LOCK"
|
|
||||||
# disable `rm *` confirmations
|
|
||||||
"rmstarsilent"
|
|
||||||
];
|
|
||||||
|
|
||||||
# .zshenv config:
|
|
||||||
shellInit = ''
|
|
||||||
ZDOTDIR=$HOME/.config/zsh
|
|
||||||
'';
|
|
||||||
|
|
||||||
# .zshrc config:
|
|
||||||
interactiveShellInit =
|
|
||||||
(builtins.readFile ./p10k.zsh)
|
|
||||||
+ p10k-overrides
|
|
||||||
+ prezto-init
|
|
||||||
+ ''
|
|
||||||
# zmv is a way to do rich moves/renames, with pattern matching/substitution.
|
|
||||||
# see for an example: <https://filipe.kiss.ink/zmv-zsh-rename/>
|
|
||||||
autoload -Uz zmv
|
|
||||||
|
|
||||||
HISTORY_IGNORE='(sane-shutdown *|sane-reboot *|rm *)'
|
|
||||||
|
|
||||||
# extra aliases
|
|
||||||
# TODO: move to `shellAliases` config?
|
|
||||||
function nd() {
|
|
||||||
mkdir -p "$1";
|
|
||||||
pushd "$1";
|
|
||||||
}
|
|
||||||
|
|
||||||
# auto-cd into any of these dirs by typing them and pressing 'enter':
|
|
||||||
hash -d 3rd="/home/colin/dev/3rd"
|
|
||||||
hash -d dev="/home/colin/dev"
|
|
||||||
hash -d knowledge="/home/colin/knowledge"
|
|
||||||
hash -d nixos="/home/colin/nixos"
|
|
||||||
hash -d nixpkgs="/home/colin/dev/3rd/nixpkgs"
|
|
||||||
hash -d ref="/home/colin/ref"
|
|
||||||
hash -d secrets="/home/colin/knowledge/secrets"
|
|
||||||
hash -d tmp="/home/colin/tmp"
|
|
||||||
hash -d uninsane="/home/colin/dev/uninsane"
|
|
||||||
hash -d Videos="/home/colin/Videos"
|
|
||||||
'';
|
|
||||||
|
|
||||||
syntaxHighlighting.enable = true;
|
|
||||||
vteIntegration = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
# enable a command-not-found hook to show nix packages that might provide the binary typed.
|
|
||||||
programs.nix-index.enable = true;
|
|
||||||
programs.command-not-found.enable = false; #< mutually exclusive with nix-index
|
|
||||||
|
|
||||||
# prezto = oh-my-zsh fork; controls prompt, auto-completion, etc.
|
|
||||||
# see: https://github.com/sorin-ionescu/prezto
|
|
||||||
# i believe this file is auto-sourced by the prezto init.zsh script.
|
|
||||||
sane.fs."/home/colin/.config/zsh/.zpreztorc" = sane-lib.fs.wantedText ''
|
|
||||||
zstyle ':prezto:*:*' color 'yes'
|
|
||||||
|
|
||||||
# modules (they ship with prezto):
|
|
||||||
# ENVIRONMENT: configures jobs to persist after shell exit; other basic niceties
|
|
||||||
# TERMINAL: auto-titles terminal (e.g. based on cwd)
|
|
||||||
# EDITOR: configures shortcuts like Ctrl+U=undo, Ctrl+L=clear
|
|
||||||
# HISTORY: `history-stat` alias, setopts for good history defaults
|
|
||||||
# DIRECTORY: sets AUTO_CD, adds `d` alias to list directory stack, and `1`-`9` to cd that far back the stack
|
|
||||||
# SPECTRUM: helpers for term colors and styling. used by prompts? might be unnecessary
|
|
||||||
# UTILITY: configures aliases like `ll`, `la`, disables globbing for things like rsync
|
|
||||||
# adds aliases like `get` to fetch a file. also adds `http-serve` alias??
|
|
||||||
# COMPLETION: tab completion. requires `utility` module prior to loading
|
|
||||||
# TODO: enable AUTO_PARAM_SLASH
|
|
||||||
zstyle ':prezto:load' pmodule \
|
|
||||||
'environment' \
|
|
||||||
'terminal' \
|
|
||||||
'editor' \
|
|
||||||
'history' \
|
|
||||||
'directory' \
|
|
||||||
'spectrum' \
|
|
||||||
'utility' \
|
|
||||||
'completion' \
|
|
||||||
'prompt'
|
|
||||||
|
|
||||||
# default keymap. try also `vicmd` (vim normal mode, AKA "cmd mode") or `vi`.
|
|
||||||
zstyle ':prezto:module:editor' key-bindings 'emacs'
|
|
||||||
|
|
||||||
zstyle ':prezto:module:prompt' theme 'powerlevel10k'
|
|
||||||
|
|
||||||
# disable `mv` confirmation (and `rm`, too, unfortunately)
|
|
||||||
zstyle ':prezto:module:utility' safe-ops 'no'
|
|
||||||
'';
|
|
||||||
}
|
|
File diff suppressed because it is too large
Load Diff
@@ -1,4 +0,0 @@
|
|||||||
{ ... }:
|
|
||||||
{
|
|
||||||
# services.i2p.enable = true;
|
|
||||||
}
|
|
@@ -1,66 +0,0 @@
|
|||||||
{ ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
# legacy servo users, some are inconvenient to migrate
|
|
||||||
sane.ids.dhcpcd.gid = 991;
|
|
||||||
sane.ids.dhcpcd.uid = 992;
|
|
||||||
sane.ids.gitea.gid = 993;
|
|
||||||
sane.ids.git.uid = 994;
|
|
||||||
sane.ids.jellyfin.gid = 994;
|
|
||||||
sane.ids.pleroma.gid = 995;
|
|
||||||
sane.ids.jellyfin.uid = 996;
|
|
||||||
sane.ids.acme.gid = 996;
|
|
||||||
sane.ids.pleroma.uid = 997;
|
|
||||||
sane.ids.acme.uid = 998;
|
|
||||||
|
|
||||||
# greetd (used by sway)
|
|
||||||
sane.ids.greeter.uid = 999;
|
|
||||||
sane.ids.greeter.gid = 999;
|
|
||||||
|
|
||||||
# new servo users
|
|
||||||
sane.ids.freshrss.uid = 2401;
|
|
||||||
sane.ids.freshrss.gid = 2401;
|
|
||||||
sane.ids.mediawiki.uid = 2402;
|
|
||||||
sane.ids.signald.uid = 2403;
|
|
||||||
sane.ids.signald.gid = 2403;
|
|
||||||
sane.ids.mautrix-signal.uid = 2404;
|
|
||||||
sane.ids.mautrix-signal.gid = 2404;
|
|
||||||
sane.ids.navidrome.uid = 2405;
|
|
||||||
sane.ids.navidrome.gid = 2405;
|
|
||||||
|
|
||||||
sane.ids.colin.uid = 1000;
|
|
||||||
sane.ids.guest.uid = 1100;
|
|
||||||
|
|
||||||
# found on all hosts
|
|
||||||
sane.ids.sshd.uid = 2001; # 997
|
|
||||||
sane.ids.sshd.gid = 2001; # 997
|
|
||||||
sane.ids.polkituser.gid = 2002; # 998
|
|
||||||
sane.ids.systemd-coredump.gid = 2003; # 996
|
|
||||||
sane.ids.nscd.uid = 2004;
|
|
||||||
sane.ids.nscd.gid = 2004;
|
|
||||||
sane.ids.systemd-oom.uid = 2005;
|
|
||||||
sane.ids.systemd-oom.gid = 2005;
|
|
||||||
|
|
||||||
# found on graphical hosts
|
|
||||||
sane.ids.nm-iodine.uid = 2101; # desko/moby/lappy
|
|
||||||
|
|
||||||
# found on desko host
|
|
||||||
# from services.usbmuxd
|
|
||||||
sane.ids.usbmux.uid = 2204;
|
|
||||||
sane.ids.usbmux.gid = 2204;
|
|
||||||
|
|
||||||
|
|
||||||
# originally found on moby host
|
|
||||||
# gnome core-shell
|
|
||||||
sane.ids.avahi.uid = 2304;
|
|
||||||
sane.ids.avahi.gid = 2304;
|
|
||||||
sane.ids.colord.uid = 2305;
|
|
||||||
sane.ids.colord.gid = 2305;
|
|
||||||
sane.ids.geoclue.uid = 2306;
|
|
||||||
sane.ids.geoclue.gid = 2306;
|
|
||||||
# gnome core-os-services
|
|
||||||
sane.ids.rtkit.uid = 2307;
|
|
||||||
sane.ids.rtkit.gid = 2307;
|
|
||||||
# phosh
|
|
||||||
sane.ids.feedbackd.gid = 2308;
|
|
||||||
}
|
|
@@ -1,16 +0,0 @@
|
|||||||
{ ... }:
|
|
||||||
{
|
|
||||||
# /etc/machine-id is a globally unique identifier used for:
|
|
||||||
# - systemd-networkd: DHCP lease renewal (instead of keying by the MAC address)
|
|
||||||
# - systemd-journald: to filter logs by host
|
|
||||||
# - chromium (potentially to track re-installations)
|
|
||||||
# - gdbus; system services that might upgrade to AF_LOCAL if both services can confirm they're on the same machine
|
|
||||||
# because of e.g. the chromium use, we *don't want* to persist this.
|
|
||||||
# however, `journalctl` won't show logs from previous boots unless the machine-ids match.
|
|
||||||
# so for now, generate something unique from the host ssh key.
|
|
||||||
# TODO: move this into modules?
|
|
||||||
system.activationScripts.machine-id = {
|
|
||||||
deps = [ "etc" ];
|
|
||||||
text = "sha256sum /etc/ssh/host_keys/ssh_host_ed25519_key | cut -c 1-32 > /etc/machine-id";
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,23 +0,0 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
# the default backend is "wpa_supplicant".
|
|
||||||
# wpa_supplicant reliably picks weak APs to connect to.
|
|
||||||
# see: <https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/issues/474>
|
|
||||||
# iwd is an alternative that shouldn't have this problem
|
|
||||||
# docs:
|
|
||||||
# - <https://nixos.wiki/wiki/Iwd>
|
|
||||||
# - <https://iwd.wiki.kernel.org/networkmanager>
|
|
||||||
# - `man iwd.config` for global config
|
|
||||||
# - `man iwd.network` for per-SSID config
|
|
||||||
# use `iwctl` to control
|
|
||||||
networking.networkmanager.wifi.backend = "iwd";
|
|
||||||
networking.wireless.iwd.enable = true;
|
|
||||||
networking.wireless.iwd.settings = {
|
|
||||||
# auto-connect to a stronger network if signal drops below this value
|
|
||||||
# bedroom -> bedroom connection is -35 to -40 dBm
|
|
||||||
# bedroom -> living room connection is -60 dBm
|
|
||||||
General.RoamThreshold = "-52"; # default -70
|
|
||||||
General.RoamThreshold5G = "-52"; # default -76
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,124 +0,0 @@
|
|||||||
{ config, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
# SOPS configuration:
|
|
||||||
# docs: https://github.com/Mic92/sops-nix
|
|
||||||
#
|
|
||||||
# for each new user you want to edit sops files:
|
|
||||||
# create a private age key from ssh key:
|
|
||||||
# $ mkdir -p ~/.config/sops/age; ssh-to-age -private-key -i ~/.ssh/id_ed25519 > ~/.config/sops/age/keys.txt; chmod 600 ~/.config/sops/age/keys.txt
|
|
||||||
# if the private key was password protected, then first decrypt it:
|
|
||||||
# $ cp ~/.ssh/id_ed25519 /tmp/id_ed25519
|
|
||||||
# $ ssh-keygen -p -N "" -f /tmp/id_ed25519
|
|
||||||
#
|
|
||||||
# for each user you want to decrypt secrets:
|
|
||||||
# $ cat ~/.ssh/id_ed25519.pub | ssh-to-age
|
|
||||||
# add the result to .sops.yaml
|
|
||||||
# since we specify ssh pubkeys in the nix config, you can just grep for `ssh-ed25519` here and use those instead
|
|
||||||
#
|
|
||||||
# for each host you want to decrypt secrets:
|
|
||||||
# $ cat /etc/ssh/ssh_host_ed25519_key.pub | ssh-to-age
|
|
||||||
# add the result to .sops.yaml
|
|
||||||
# $ sops updatekeys secrets/example.yaml
|
|
||||||
#
|
|
||||||
# to create a new secret:
|
|
||||||
# $ sops secrets/example.yaml
|
|
||||||
# control access below (sops.secret.<x>.owner = ...)
|
|
||||||
#
|
|
||||||
# to read a secret:
|
|
||||||
# $ cat /run/secrets/example_key
|
|
||||||
|
|
||||||
# sops.age.sshKeyPaths = [ "/home/colin/.ssh/id_ed25519_dec" ];
|
|
||||||
# This will add secrets.yaml to the nix store
|
|
||||||
# You can avoid this by adding a string to the full path instead, i.e.
|
|
||||||
# sops.defaultSopsFile = "/root/.sops/secrets/example.yaml";
|
|
||||||
sops.defaultSopsFile = ../../secrets/universal.yaml;
|
|
||||||
sops.gnupg.sshKeyPaths = []; # disable RSA key import
|
|
||||||
# This is using an age key that is expected to already be in the filesystem
|
|
||||||
# sops.age.keyFile = "/home/colin/.ssh/age.pub";
|
|
||||||
# sops.age.keyFile = "/var/lib/sops-nix/key.txt";
|
|
||||||
# This will generate a new key if the key specified above does not exist
|
|
||||||
# sops.age.generateKey = true;
|
|
||||||
# This is the actual specification of the secrets.
|
|
||||||
# sops.secrets.example_key = {
|
|
||||||
# owner = config.users.users.colin.name;
|
|
||||||
# };
|
|
||||||
# sops.secrets."myservice/my_subdir/my_secret" = {};
|
|
||||||
|
|
||||||
## universal secrets
|
|
||||||
# TODO: glob these?
|
|
||||||
|
|
||||||
sops.secrets."jackett_apikey" = {
|
|
||||||
sopsFile = ../../secrets/universal.yaml;
|
|
||||||
owner = config.users.users.colin.name;
|
|
||||||
};
|
|
||||||
sops.secrets."router_passwd" = {
|
|
||||||
sopsFile = ../../secrets/universal.yaml;
|
|
||||||
};
|
|
||||||
sops.secrets."wg_ovpnd_us_privkey" = {
|
|
||||||
sopsFile = ../../secrets/universal.yaml;
|
|
||||||
};
|
|
||||||
sops.secrets."wg_ovpnd_us-atl_privkey" = {
|
|
||||||
sopsFile = ../../secrets/universal.yaml;
|
|
||||||
};
|
|
||||||
sops.secrets."wg_ovpnd_us-mi_privkey" = {
|
|
||||||
sopsFile = ../../secrets/universal.yaml;
|
|
||||||
};
|
|
||||||
sops.secrets."wg_ovpnd_ukr_privkey" = {
|
|
||||||
sopsFile = ../../secrets/universal.yaml;
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets."snippets" = {
|
|
||||||
sopsFile = ../../secrets/universal/snippets.bin;
|
|
||||||
format = "binary";
|
|
||||||
owner = config.users.users.colin.name;
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets."bt/car" = {
|
|
||||||
sopsFile = ../../secrets/universal/bt/car.bin;
|
|
||||||
format = "binary";
|
|
||||||
};
|
|
||||||
sops.secrets."bt/earbuds" = {
|
|
||||||
sopsFile = ../../secrets/universal/bt/earbuds.bin;
|
|
||||||
format = "binary";
|
|
||||||
};
|
|
||||||
sops.secrets."bt/portable-speaker" = {
|
|
||||||
sopsFile = ../../secrets/universal/bt/portable-speaker.bin;
|
|
||||||
format = "binary";
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets."iwd/community-university.psk" = {
|
|
||||||
sopsFile = ../../secrets/universal/net/community-university.psk.bin;
|
|
||||||
format = "binary";
|
|
||||||
};
|
|
||||||
sops.secrets."iwd/friend-libertarian-dod.psk" = {
|
|
||||||
sopsFile = ../../secrets/universal/net/friend-libertarian-dod.psk.bin;
|
|
||||||
format = "binary";
|
|
||||||
};
|
|
||||||
sops.secrets."iwd/friend-rationalist-empathist.psk" = {
|
|
||||||
sopsFile = ../../secrets/universal/net/friend-rationalist-empathist.psk.bin;
|
|
||||||
format = "binary";
|
|
||||||
};
|
|
||||||
sops.secrets."iwd/home-bedroom.psk" = {
|
|
||||||
sopsFile = ../../secrets/universal/net/home-bedroom.psk.bin;
|
|
||||||
format = "binary";
|
|
||||||
};
|
|
||||||
sops.secrets."iwd/home-shared-24G.psk" = {
|
|
||||||
sopsFile = ../../secrets/universal/net/home-shared-24G.psk.bin;
|
|
||||||
format = "binary";
|
|
||||||
};
|
|
||||||
sops.secrets."iwd/home-shared.psk" = {
|
|
||||||
sopsFile = ../../secrets/universal/net/home-shared.psk.bin;
|
|
||||||
format = "binary";
|
|
||||||
};
|
|
||||||
sops.secrets."iwd/iphone" = {
|
|
||||||
sopsFile = ../../secrets/universal/net/iphone.psk.bin;
|
|
||||||
format = "binary";
|
|
||||||
};
|
|
||||||
sops.secrets."iwd/parents" = {
|
|
||||||
sopsFile = ../../secrets/universal/net/parents.psk.bin;
|
|
||||||
format = "binary";
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
@@ -1,33 +0,0 @@
|
|||||||
{ config, lib, sane-data, sane-lib, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
inherit (builtins) head map mapAttrs tail;
|
|
||||||
inherit (lib) concatStringsSep mkMerge reverseList;
|
|
||||||
in
|
|
||||||
{
|
|
||||||
sane.ssh.pubkeys =
|
|
||||||
let
|
|
||||||
# path is a DNS-style path like [ "org" "uninsane" "root" ]
|
|
||||||
keyNameForPath = path:
|
|
||||||
let
|
|
||||||
rev = reverseList path;
|
|
||||||
name = head rev;
|
|
||||||
host = concatStringsSep "." (tail rev);
|
|
||||||
in
|
|
||||||
"${name}@${host}";
|
|
||||||
|
|
||||||
# [{ path :: [String], value :: String }] for the keys we want to install
|
|
||||||
globalKeys = sane-lib.flattenAttrs sane-data.keys;
|
|
||||||
domainKeys = sane-lib.flattenAttrs (
|
|
||||||
mapAttrs (host: cfg: {
|
|
||||||
colin = cfg.ssh.user_pubkey;
|
|
||||||
root = cfg.ssh.host_pubkey;
|
|
||||||
}) config.sane.hosts.by-name
|
|
||||||
);
|
|
||||||
in mkMerge (map
|
|
||||||
({ path, value }: {
|
|
||||||
"${keyNameForPath path}" = lib.mkIf (value != null) value;
|
|
||||||
})
|
|
||||||
(globalKeys ++ domainKeys)
|
|
||||||
);
|
|
||||||
}
|
|
@@ -1,134 +0,0 @@
|
|||||||
{ config, pkgs, lib, sane-lib, ... }:
|
|
||||||
|
|
||||||
# installer docs: https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/profiles/installation-device.nix
|
|
||||||
with lib;
|
|
||||||
let
|
|
||||||
cfg = config.sane.users;
|
|
||||||
fs = sane-lib.fs;
|
|
||||||
in
|
|
||||||
{
|
|
||||||
options = {
|
|
||||||
sane.users.guest.enable = mkOption {
|
|
||||||
default = false;
|
|
||||||
type = types.bool;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
config = {
|
|
||||||
# Users are exactly these specified here;
|
|
||||||
# old ones will be deleted (from /etc/passwd, etc) upon upgrade.
|
|
||||||
users.mutableUsers = false;
|
|
||||||
|
|
||||||
# docs: https://nixpkgs-manual-sphinx-markedown-example.netlify.app/generated/options-db.xml.html#users-users
|
|
||||||
users.users.colin = {
|
|
||||||
# sets group to "users" (?)
|
|
||||||
isNormalUser = true;
|
|
||||||
home = "/home/colin";
|
|
||||||
createHome = true;
|
|
||||||
homeMode = "0700";
|
|
||||||
# i don't get exactly what this is, but nixos defaults to this non-deterministically
|
|
||||||
# in /var/lib/nixos/auto-subuid-map and i don't want that.
|
|
||||||
subUidRanges = [
|
|
||||||
{ startUid=100000; count=1; }
|
|
||||||
];
|
|
||||||
group = "users";
|
|
||||||
extraGroups = [
|
|
||||||
"wheel"
|
|
||||||
"nixbuild"
|
|
||||||
"networkmanager"
|
|
||||||
# phosh/mobile. XXX colin: unsure if necessary
|
|
||||||
"video"
|
|
||||||
"feedbackd"
|
|
||||||
"dialout" # required for modem access
|
|
||||||
];
|
|
||||||
|
|
||||||
# initial password is empty, in case anything goes wrong.
|
|
||||||
# if `colin-passwd` (a password hash) is successfully found/decrypted, that becomes the password at boot.
|
|
||||||
initialPassword = lib.mkDefault "";
|
|
||||||
passwordFile = lib.mkIf (config.sops.secrets ? "colin-passwd") config.sops.secrets.colin-passwd.path;
|
|
||||||
|
|
||||||
shell = pkgs.zsh;
|
|
||||||
|
|
||||||
# mount encrypted stuff at login
|
|
||||||
# some other nix pam users:
|
|
||||||
# - <https://github.com/g00pix/nixconf/blob/32c04f6fa843fed97639dd3f09e157668d3eea1f/profiles/sshfs.nix>
|
|
||||||
# - <https://github.com/lourkeur/distro/blob/11173454c6bb50f7ccab28cc2c757dca21446d1d/nixos/profiles/users/louis-full.nix>
|
|
||||||
# - <https://github.com/dnr/sample-nix-code/blob/03494480c1fae550c033aa54fd96aeb3827761c5/nixos/laptop.nix>
|
|
||||||
pamMount = let
|
|
||||||
priv = config.fileSystems."/home/colin/private";
|
|
||||||
in {
|
|
||||||
fstype = priv.fsType;
|
|
||||||
path = priv.device;
|
|
||||||
mountpoint = priv.mountPoint;
|
|
||||||
options = builtins.concatStringsSep "," priv.options;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
security.pam.mount.enable = true;
|
|
||||||
|
|
||||||
# ensure ~ perms are known to sane.fs module.
|
|
||||||
# TODO: this is generic enough to be lifted up into sane.fs itself.
|
|
||||||
sane.fs."/home/colin".dir.acl = {
|
|
||||||
user = "colin";
|
|
||||||
group = config.users.users.colin.group;
|
|
||||||
mode = config.users.users.colin.homeMode;
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.persist.home.plaintext = [
|
|
||||||
"archive"
|
|
||||||
"dev"
|
|
||||||
# TODO: records should be private
|
|
||||||
"records"
|
|
||||||
"ref"
|
|
||||||
"tmp"
|
|
||||||
"use"
|
|
||||||
"Music"
|
|
||||||
"Pictures"
|
|
||||||
"Videos"
|
|
||||||
|
|
||||||
".cache/nix"
|
|
||||||
".cache/nix-index"
|
|
||||||
".cargo"
|
|
||||||
".rustup"
|
|
||||||
];
|
|
||||||
|
|
||||||
# convenience
|
|
||||||
sane.fs."/home/colin/knowledge" = fs.wantedSymlinkTo "/home/colin/private/knowledge";
|
|
||||||
sane.fs."/home/colin/nixos" = fs.wantedSymlinkTo "/home/colin/dev/nixos";
|
|
||||||
sane.fs."/home/colin/Videos/servo" = fs.wantedSymlinkTo "/mnt/servo-media/Videos";
|
|
||||||
sane.fs."/home/colin/Videos/servo-incomplete" = fs.wantedSymlinkTo "/mnt/servo-media/incomplete";
|
|
||||||
sane.fs."/home/colin/Music/servo" = fs.wantedSymlinkTo "/mnt/servo-media/Music";
|
|
||||||
|
|
||||||
# used by password managers, e.g. unix `pass`
|
|
||||||
sane.fs."/home/colin/.password-store" = fs.wantedSymlinkTo "/home/colin/knowledge/secrets/accounts";
|
|
||||||
|
|
||||||
sane.persist.sys.plaintext = mkIf cfg.guest.enable [
|
|
||||||
# intentionally allow other users to write to the guest folder
|
|
||||||
{ directory = "/home/guest"; user = "guest"; group = "users"; mode = "0775"; }
|
|
||||||
];
|
|
||||||
users.users.guest = mkIf cfg.guest.enable {
|
|
||||||
isNormalUser = true;
|
|
||||||
home = "/home/guest";
|
|
||||||
subUidRanges = [
|
|
||||||
{ startUid=200000; count=1; }
|
|
||||||
];
|
|
||||||
group = "users";
|
|
||||||
initialPassword = lib.mkDefault "";
|
|
||||||
shell = pkgs.zsh;
|
|
||||||
openssh.authorizedKeys.keys = [
|
|
||||||
# TODO: insert pubkeys that should be allowed in
|
|
||||||
];
|
|
||||||
};
|
|
||||||
|
|
||||||
security.sudo = {
|
|
||||||
enable = true;
|
|
||||||
wheelNeedsPassword = false;
|
|
||||||
};
|
|
||||||
|
|
||||||
services.openssh = {
|
|
||||||
enable = true;
|
|
||||||
settings.PermitRootLogin = "no";
|
|
||||||
settings.PasswordAuthentication = false;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,66 +0,0 @@
|
|||||||
{ config, lib, ... }:
|
|
||||||
|
|
||||||
# to add a new OVPN VPN:
|
|
||||||
# - generate a privkey `wg genkey`
|
|
||||||
# - add this key to `sops secrets/universal.yaml`
|
|
||||||
# - upload pubkey to OVPN.com
|
|
||||||
# - generate config @ OVPN.com
|
|
||||||
# - copy the Address, PublicKey, Endpoint from OVPN's config
|
|
||||||
# N.B.: maximum interface name in Linux is 15 characters.
|
|
||||||
let
|
|
||||||
def-ovpn = name: { endpoint, publicKey, address }: {
|
|
||||||
networking.wg-quick.interfaces."ovpnd-${name}" = {
|
|
||||||
inherit address;
|
|
||||||
privateKeyFile = config.sops.secrets."wg_ovpnd_${name}_privkey".path;
|
|
||||||
dns = [
|
|
||||||
"46.227.67.134"
|
|
||||||
"192.165.9.158"
|
|
||||||
];
|
|
||||||
peers = [
|
|
||||||
{
|
|
||||||
allowedIPs = [
|
|
||||||
"0.0.0.0/0"
|
|
||||||
"::/0"
|
|
||||||
];
|
|
||||||
inherit endpoint publicKey;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
# to start: `systemctl start wg-quick-ovpnd-${name}`
|
|
||||||
autostart = false;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
in lib.mkMerge [
|
|
||||||
(def-ovpn "us" {
|
|
||||||
endpoint = "vpn31.prd.losangeles.ovpn.com:9929";
|
|
||||||
publicKey = "VW6bEWMOlOneta1bf6YFE25N/oMGh1E1UFBCfyggd0k=";
|
|
||||||
address = [
|
|
||||||
"172.27.237.218/32"
|
|
||||||
"fd00:0000:1337:cafe:1111:1111:ab00:4c8f/128"
|
|
||||||
];
|
|
||||||
})
|
|
||||||
# NB: us-* share the same wg key and link-local addrs, but distinct public addresses
|
|
||||||
(def-ovpn "us-atl" {
|
|
||||||
endpoint = "vpn18.prd.atlanta.ovpn.com:9929";
|
|
||||||
publicKey = "Dpg/4v5s9u0YbrXukfrMpkA+XQqKIFpf8ZFgyw0IkE0=";
|
|
||||||
address = [
|
|
||||||
"172.21.182.178/32"
|
|
||||||
"fd00:0000:1337:cafe:1111:1111:cfcb:27e3/128"
|
|
||||||
];
|
|
||||||
})
|
|
||||||
(def-ovpn "us-mi" {
|
|
||||||
endpoint = "vpn34.prd.miami.ovpn.com:9929";
|
|
||||||
publicKey = "VtJz2irbu8mdkIQvzlsYhU+k9d55or9mx4A2a14t0V0=";
|
|
||||||
address = [
|
|
||||||
"172.21.182.178/32"
|
|
||||||
"fd00:0000:1337:cafe:1111:1111:cfcb:27e3/128"
|
|
||||||
];
|
|
||||||
})
|
|
||||||
(def-ovpn "ukr" {
|
|
||||||
endpoint = "vpn96.prd.kyiv.ovpn.com:9929";
|
|
||||||
publicKey = "CjZcXDxaaKpW8b5As1EcNbI6+42A6BjWahwXDCwfVFg=";
|
|
||||||
address = [
|
|
||||||
"172.18.180.159/32"
|
|
||||||
"fd00:0000:1337:cafe:1111:1111:ec5c:add3/128"
|
|
||||||
];
|
|
||||||
})
|
|
||||||
]
|
|
@@ -1,27 +0,0 @@
|
|||||||
# trampoline from flake.nix into the specific host definition, while doing a tiny bit of common setup
|
|
||||||
|
|
||||||
# args from flake-level `import`
|
|
||||||
{ hostName, localSystem }:
|
|
||||||
|
|
||||||
# module args
|
|
||||||
{ config, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
./by-name/${hostName}
|
|
||||||
./common
|
|
||||||
./modules
|
|
||||||
];
|
|
||||||
|
|
||||||
networking.hostName = hostName;
|
|
||||||
|
|
||||||
nixpkgs.overlays = [
|
|
||||||
(next: prev: {
|
|
||||||
# for local != target we by default just emulate the target while building.
|
|
||||||
# provide a `pkgs.cross.<pkg>` alias that consumers can use instead of `pkgs.<foo>`
|
|
||||||
# to explicitly opt into non-emulated cross compilation for any specific package.
|
|
||||||
# this is most beneficial for large packages with few pre-requisites -- like Linux.
|
|
||||||
cross = next.crossFrom."${localSystem}";
|
|
||||||
})
|
|
||||||
];
|
|
||||||
}
|
|
@@ -1,12 +0,0 @@
|
|||||||
{ ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
./derived-secrets.nix
|
|
||||||
./hardware
|
|
||||||
./hostnames.nix
|
|
||||||
./hosts.nix
|
|
||||||
./roles
|
|
||||||
./wg-home.nix
|
|
||||||
];
|
|
||||||
}
|
|
@@ -1,47 +0,0 @@
|
|||||||
{ config, lib, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
inherit (builtins) toString;
|
|
||||||
inherit (lib) mapAttrs mkOption types;
|
|
||||||
cfg = config.sane.derived-secrets;
|
|
||||||
secret = types.submodule {
|
|
||||||
options = {
|
|
||||||
len = mkOption {
|
|
||||||
type = types.int;
|
|
||||||
};
|
|
||||||
encoding = mkOption {
|
|
||||||
type = types.enum [ "base64" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
in
|
|
||||||
{
|
|
||||||
options = {
|
|
||||||
sane.derived-secrets = mkOption {
|
|
||||||
type = types.attrsOf secret;
|
|
||||||
default = {};
|
|
||||||
description = ''
|
|
||||||
fs path => secret options.
|
|
||||||
for each entry, we create an item at the given path whose value is deterministic,
|
|
||||||
but also pseudo-random and not predictable by anyone without root access to the machine.
|
|
||||||
as PRNG source we use the host ssh key, and derived secrets are salted based on the destination path.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
config = {
|
|
||||||
sane.fs = mapAttrs (path: c: {
|
|
||||||
generated.script.script = ''
|
|
||||||
echo "$1" | cat /dev/stdin /etc/ssh/host_keys/ssh_host_ed25519_key \
|
|
||||||
| sha512sum \
|
|
||||||
| cut -c 1-${toString (c.len * 2)} \
|
|
||||||
| tr a-z A-Z \
|
|
||||||
| basenc -d --base16 \
|
|
||||||
| basenc --${c.encoding} \
|
|
||||||
> "$1"
|
|
||||||
'';
|
|
||||||
generated.script.scriptArgs = [ path ];
|
|
||||||
generated.acl.mode = "0600";
|
|
||||||
}) cfg;
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,21 +0,0 @@
|
|||||||
{ config, lib, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
# give each host a shortname that all the other hosts know, to allow easy comms.
|
|
||||||
networking.hosts = lib.mkMerge [
|
|
||||||
(lib.mapAttrs' (host: cfg: {
|
|
||||||
# bare-name for LAN addresses
|
|
||||||
# if using router's DNS, these mappings will already exist.
|
|
||||||
# if using a different DNS provider (which servo does), then we need to explicity provide them.
|
|
||||||
# ugly hack. would be better to get servo to somehow use the router's DNS
|
|
||||||
name = cfg.lan-ip;
|
|
||||||
value = [ host ];
|
|
||||||
}) config.sane.hosts.by-name)
|
|
||||||
(lib.mapAttrs' (host: cfg: {
|
|
||||||
# -hn suffixed name for communication over my wg-home VPN.
|
|
||||||
# hn = "home network"
|
|
||||||
name = cfg.wg-home.ip;
|
|
||||||
value = [ "${host}-hn" ];
|
|
||||||
}) config.sane.hosts.by-name)
|
|
||||||
];
|
|
||||||
}
|
|
@@ -1,100 +0,0 @@
|
|||||||
{ config, lib, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
inherit (lib) attrValues filterAttrs mkMerge mkOption types;
|
|
||||||
cfg = config.sane.hosts;
|
|
||||||
|
|
||||||
host = types.submodule ({ config, ... }: {
|
|
||||||
options = {
|
|
||||||
ssh.user_pubkey = mkOption {
|
|
||||||
type = types.str;
|
|
||||||
description = ''
|
|
||||||
ssh pubkey that the primary user of this machine will use when connecting to other machines.
|
|
||||||
e.g. "ssh-ed25519 AAAA<base64>".
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
ssh.host_pubkey = mkOption {
|
|
||||||
type = types.str;
|
|
||||||
description = ''
|
|
||||||
ssh pubkey which this host will present to connections initiated against it.
|
|
||||||
e.g. "ssh-ed25519 AAAA<base64>".
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
wg-home.pubkey = mkOption {
|
|
||||||
type = types.nullOr types.str;
|
|
||||||
default = null;
|
|
||||||
description = ''
|
|
||||||
wireguard public key for the wg-home VPN.
|
|
||||||
e.g. "pWtnKW7f7sNIZQ2M83uJ7cHg3IL1tebE3IoVkCgjkXM=".
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
wg-home.ip = mkOption {
|
|
||||||
type = types.nullOr types.str;
|
|
||||||
default = null;
|
|
||||||
description = ''
|
|
||||||
IP address to use on the wg-home VPN.
|
|
||||||
e.g. "10.0.10.5";
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
wg-home.endpoint = mkOption {
|
|
||||||
type = types.nullOr types.str;
|
|
||||||
default = null;
|
|
||||||
};
|
|
||||||
lan-ip = mkOption {
|
|
||||||
type = types.str;
|
|
||||||
description = ''
|
|
||||||
ip address when on the lan.
|
|
||||||
e.g. "192.168.0.5";
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
});
|
|
||||||
in
|
|
||||||
{
|
|
||||||
options = {
|
|
||||||
sane.hosts.by-name = mkOption {
|
|
||||||
type = types.attrsOf host;
|
|
||||||
default = {};
|
|
||||||
description = ''
|
|
||||||
map of hostname => attrset of information specific to that host,
|
|
||||||
like its ssh pubkey, etc.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
config = {
|
|
||||||
# TODO: this should be populated per-host
|
|
||||||
sane.hosts.by-name."desko" = {
|
|
||||||
ssh.user_pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPU5GlsSfbaarMvDA20bxpSZGWviEzXGD8gtrIowc1pX";
|
|
||||||
ssh.host_pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFw9NoRaYrM6LbDd3aFBc4yyBlxGQn8HjeHd/dZ3CfHk";
|
|
||||||
wg-home.pubkey = "17PMZssYi0D4t2d0vbmhjBKe1sGsE8kT8/dod0Q2CXc=";
|
|
||||||
wg-home.ip = "10.0.10.22";
|
|
||||||
lan-ip = "192.168.0.22";
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.hosts.by-name."lappy" = {
|
|
||||||
ssh.user_pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDpmFdNSVPRol5hkbbCivRhyeENzb9HVyf9KutGLP2Zu";
|
|
||||||
ssh.host_pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILSJnqmVl9/SYQ0btvGb0REwwWY8wkdkGXQZfn/1geEc";
|
|
||||||
wg-home.pubkey = "FTUWGw2p4/cEcrrIE86PWVnqctbv8OYpw8Gt3+dC/lk=";
|
|
||||||
wg-home.ip = "10.0.10.20";
|
|
||||||
lan-ip = "192.168.0.20";
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.hosts.by-name."moby" = {
|
|
||||||
ssh.user_pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICrR+gePnl0nV/vy7I5BzrGeyVL+9eOuXHU1yNE3uCwU";
|
|
||||||
ssh.host_pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO1N/IT3nQYUD+dBlU1sTEEVMxfOyMkrrDeyHcYgnJvw";
|
|
||||||
wg-home.pubkey = "I7XIR1hm8bIzAtcAvbhWOwIAabGkuEvbWH/3kyIB1yA=";
|
|
||||||
wg-home.ip = "10.0.10.48";
|
|
||||||
lan-ip = "192.168.0.48";
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.hosts.by-name."servo" = {
|
|
||||||
ssh.user_pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPS1qFzKurAdB9blkWomq8gI1g0T3sTs9LsmFOj5VtqX";
|
|
||||||
ssh.host_pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOfdSmFkrVT6DhpgvFeQKm3Fh9VKZ9DbLYOPOJWYQ0E8";
|
|
||||||
wg-home.pubkey = "roAw+IUFVtdpCcqa4khB385Qcv9l5JAB//730tyK4Wk=";
|
|
||||||
wg-home.ip = "10.0.10.5";
|
|
||||||
wg-home.endpoint = "uninsane.org:51820";
|
|
||||||
lan-ip = "192.168.0.5";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,18 +0,0 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
config = lib.mkIf config.sane.roles.client {
|
|
||||||
# persist external pairings by default
|
|
||||||
sane.persist.sys.plaintext = [ "/var/lib/bluetooth" ];
|
|
||||||
|
|
||||||
sane.fs."/var/lib/bluetooth".generated.acl.mode = "0700";
|
|
||||||
sane.fs."/var/lib/bluetooth/.secrets.stamp" = {
|
|
||||||
wantedBeforeBy = [ "bluetooth.service" ];
|
|
||||||
# XXX: install-bluetooth uses sed, but that's part of the default systemd unit path, it seems
|
|
||||||
generated.script.script = builtins.readFile ../../../../scripts/install-bluetooth + ''
|
|
||||||
touch "/var/lib/bluetooth/.secrets.stamp"
|
|
||||||
'';
|
|
||||||
generated.script.scriptArgs = [ "/run/secrets/bt" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,17 +0,0 @@
|
|||||||
{ config, lib, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
inherit (lib) mkIf mkOption types;
|
|
||||||
in
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
./bluetooth-pairings.nix
|
|
||||||
./wifi-pairings.nix
|
|
||||||
];
|
|
||||||
|
|
||||||
# option is consumed by the other imports in this dir
|
|
||||||
options.sane.roles.client = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = false;
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,15 +0,0 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
config = lib.mkIf config.sane.roles.client {
|
|
||||||
sane.fs."/var/lib/iwd/.secrets.psk.stamp" = {
|
|
||||||
wantedBeforeBy = [ "iwd.service" ];
|
|
||||||
generated.acl.mode = "0600";
|
|
||||||
# XXX: install-iwd uses sed, but that's part of the default systemd unit path, it seems
|
|
||||||
generated.script.script = builtins.readFile ../../../../scripts/install-iwd + ''
|
|
||||||
touch "/var/lib/iwd/.secrets.psk.stamp"
|
|
||||||
'';
|
|
||||||
generated.script.scriptArgs = [ "/run/secrets/iwd" "/var/lib/iwd" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
@@ -1,6 +0,0 @@
|
|||||||
{ ... }:
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
./client
|
|
||||||
];
|
|
||||||
}
|
|
@@ -1,80 +0,0 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
inherit (builtins) filter map;
|
|
||||||
inherit (lib) concatMap mapAttrsToList mkIf mkMerge mkOption optionalAttrs types;
|
|
||||||
cfg = config.sane.services.wg-home;
|
|
||||||
server-cfg = config.sane.hosts.by-name."servo".wg-home;
|
|
||||||
mkPeer = { ips, pubkey, endpoint }: {
|
|
||||||
publicKey = pubkey;
|
|
||||||
allowedIPs = map (k: "${k}/32") ips;
|
|
||||||
} // (optionalAttrs (endpoint != null) {
|
|
||||||
inherit endpoint;
|
|
||||||
# send keepalives every 25 seconds to keep NAT routes live.
|
|
||||||
# only need to do this from client -> server though, i think.
|
|
||||||
persistentKeepalive = 25;
|
|
||||||
# allows wireguard to notice DNS/hostname changes, with this much effective TTL.
|
|
||||||
dynamicEndpointRefreshSeconds = 600;
|
|
||||||
});
|
|
||||||
# make separate peers to route each given host
|
|
||||||
mkClientPeers = hosts: map (p: mkPeer {
|
|
||||||
inherit (p) pubkey endpoint;
|
|
||||||
ips = [ p.ip ];
|
|
||||||
}) hosts;
|
|
||||||
# make a single peer which routes all the given hosts
|
|
||||||
mkServerPeer = hosts: mkPeer {
|
|
||||||
inherit (server-cfg) pubkey endpoint;
|
|
||||||
ips = map (h: h.ip) hosts;
|
|
||||||
};
|
|
||||||
in
|
|
||||||
{
|
|
||||||
options = {
|
|
||||||
sane.services.wg-home.enable = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = false;
|
|
||||||
};
|
|
||||||
sane.services.wg-home.ip = mkOption {
|
|
||||||
type = types.str;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
# generate a (deterministic) wireguard private key
|
|
||||||
sane.derived-secrets."/run/wg-home.priv" = {
|
|
||||||
len = 32;
|
|
||||||
encoding = "base64";
|
|
||||||
};
|
|
||||||
|
|
||||||
# wireguard VPN which allows everything on my domain to speak to each other even when
|
|
||||||
# not behind a shared LAN.
|
|
||||||
# this config defines both the endpoint (server) and client configs
|
|
||||||
|
|
||||||
# for convenience, have both the server and client use the same port for their wireguard connections.
|
|
||||||
networking.firewall.allowedUDPPorts = [ 51820 ];
|
|
||||||
networking.wireguard.interfaces.wg-home = {
|
|
||||||
listenPort = 51820;
|
|
||||||
privateKeyFile = "/run/wg-home.priv";
|
|
||||||
preSetup =
|
|
||||||
let
|
|
||||||
gen-key = config.sane.fs."/run/wg-home.priv".unit;
|
|
||||||
in
|
|
||||||
"${pkgs.systemd}/bin/systemctl start '${gen-key}'";
|
|
||||||
|
|
||||||
ips = [
|
|
||||||
"${cfg.ip}/24"
|
|
||||||
];
|
|
||||||
|
|
||||||
peers =
|
|
||||||
let
|
|
||||||
all-peers = mapAttrsToList (_: hostcfg: hostcfg.wg-home) config.sane.hosts.by-name;
|
|
||||||
peer-list = filter (p: p.ip != null && p.ip != cfg.ip && p.pubkey != null) all-peers;
|
|
||||||
in
|
|
||||||
if cfg.ip == server-cfg.ip then
|
|
||||||
# if we're the server, then we maintain the entire client list
|
|
||||||
mkClientPeers peer-list
|
|
||||||
else
|
|
||||||
# but if we're a client, we maintain a single peer -- the server -- which does the actual routing
|
|
||||||
[ (mkServerPeer peer-list) ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
@@ -4,32 +4,25 @@
|
|||||||
./fs.nix
|
./fs.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
# sane.packages.enableDevPkgs = true;
|
sane.gui.sway.enable = true;
|
||||||
|
|
||||||
sane.roles.client = true;
|
|
||||||
sane.services.wg-home.enable = true;
|
|
||||||
sane.services.wg-home.ip = config.sane.hosts.by-name."desko".wg-home.ip;
|
|
||||||
sane.services.duplicity.enable = true;
|
sane.services.duplicity.enable = true;
|
||||||
sane.services.nixserve.enable = true;
|
sane.services.nixserve.enable = true;
|
||||||
sane.services.nixserve.sopsFile = ../../../secrets/desko.yaml;
|
sane.services.nixserve.sopsFile = ../../secrets/desko.yaml;
|
||||||
sane.persist.enable = true;
|
sane.impermanence.enable = true;
|
||||||
|
|
||||||
sane.gui.sway.enable = true;
|
|
||||||
|
|
||||||
boot.loader.efi.canTouchEfiVariables = false;
|
boot.loader.efi.canTouchEfiVariables = false;
|
||||||
sane.image.extraBootFiles = [ pkgs.bootpart-uefi-x86_64 ];
|
sane.image.extraBootFiles = [ pkgs.bootpart-uefi-x86_64 ];
|
||||||
|
|
||||||
# needed to use libimobiledevice/ifuse, for iphone sync
|
# needed to use libimobiledevice/ifuse, for iphone sync
|
||||||
services.usbmuxd.enable = true;
|
services.usbmuxd.enable = true;
|
||||||
|
users.users.usbmux.uid = config.sane.allocations.usbmux-uid;
|
||||||
|
users.groups.usbmux.gid = config.sane.allocations.usbmux-gid;
|
||||||
|
|
||||||
sops.secrets.colin-passwd = {
|
sops.secrets.colin-passwd = {
|
||||||
sopsFile = ../../../secrets/desko.yaml;
|
sopsFile = ../../secrets/desko.yaml;
|
||||||
neededForUsers = true;
|
neededForUsers = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
# don't enable wifi by default: it messes with connectivity.
|
|
||||||
systemd.services.iwd.enable = false;
|
|
||||||
|
|
||||||
# default config: https://man.archlinux.org/man/snapper-configs.5
|
# default config: https://man.archlinux.org/man/snapper-configs.5
|
||||||
# defaults to something like:
|
# defaults to something like:
|
||||||
# - hourly snapshots
|
# - hourly snapshots
|
||||||
@@ -45,7 +38,7 @@
|
|||||||
};
|
};
|
||||||
|
|
||||||
sops.secrets.duplicity_passphrase = {
|
sops.secrets.duplicity_passphrase = {
|
||||||
sopsFile = ../../../secrets/desko.yaml;
|
sopsFile = ../../secrets/desko.yaml;
|
||||||
};
|
};
|
||||||
|
|
||||||
programs.steam = {
|
programs.steam = {
|
||||||
@@ -54,7 +47,7 @@
|
|||||||
remotePlay.openFirewall = true; # Open ports in the firewall for Steam Remote Play
|
remotePlay.openFirewall = true; # Open ports in the firewall for Steam Remote Play
|
||||||
dedicatedServer.openFirewall = true; # Open ports in the firewall for Source Dedicated Server
|
dedicatedServer.openFirewall = true; # Open ports in the firewall for Source Dedicated Server
|
||||||
};
|
};
|
||||||
sane.persist.home.plaintext = [
|
sane.impermanence.home-dirs = [
|
||||||
".steam"
|
".steam"
|
||||||
".local/share/Steam"
|
".local/share/Steam"
|
||||||
];
|
];
|
@@ -1,7 +1,16 @@
|
|||||||
{ ... }:
|
{ ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
sane.persist.root-on-tmpfs = true;
|
# root is a tmpfs so that we have an ephemeral system ("impermanence" handles the state)
|
||||||
|
fileSystems."/" = {
|
||||||
|
device = "none";
|
||||||
|
fsType = "tmpfs";
|
||||||
|
options = [
|
||||||
|
"mode=755"
|
||||||
|
"size=1G"
|
||||||
|
"defaults"
|
||||||
|
];
|
||||||
|
};
|
||||||
# we need a /tmp for building large nix things.
|
# we need a /tmp for building large nix things.
|
||||||
# a cross-compiled kernel, particularly, will easily use 30+GB of tmp
|
# a cross-compiled kernel, particularly, will easily use 30+GB of tmp
|
||||||
fileSystems."/tmp" = {
|
fileSystems."/tmp" = {
|
11
machines/instantiate.nix
Normal file
11
machines/instantiate.nix
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
# trampoline from flake.nix into the specific machine definition, while doing a tiny bit of common setup
|
||||||
|
|
||||||
|
hostName: { ... }: {
|
||||||
|
imports = [
|
||||||
|
./${hostName}
|
||||||
|
];
|
||||||
|
|
||||||
|
networking.hostName = hostName;
|
||||||
|
|
||||||
|
nixpkgs.config.allowUnfree = true;
|
||||||
|
}
|
@@ -1,24 +1,18 @@
|
|||||||
{ config, pkgs, ... }:
|
{ pkgs, ... }:
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./fs.nix
|
./fs.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
sane.roles.client = true;
|
|
||||||
sane.services.wg-home.enable = true;
|
|
||||||
sane.services.wg-home.ip = config.sane.hosts.by-name."lappy".wg-home.ip;
|
|
||||||
|
|
||||||
# sane.packages.enableDevPkgs = true;
|
|
||||||
|
|
||||||
# sane.users.guest.enable = true;
|
# sane.users.guest.enable = true;
|
||||||
sane.gui.sway.enable = true;
|
sane.gui.sway.enable = true;
|
||||||
sane.persist.enable = true;
|
sane.impermanence.enable = true;
|
||||||
sane.nixcache.enable = true;
|
sane.nixcache.enable = true;
|
||||||
boot.loader.efi.canTouchEfiVariables = false;
|
boot.loader.efi.canTouchEfiVariables = false;
|
||||||
sane.image.extraBootFiles = [ pkgs.bootpart-uefi-x86_64 ];
|
sane.image.extraBootFiles = [ pkgs.bootpart-uefi-x86_64 ];
|
||||||
|
|
||||||
sops.secrets.colin-passwd = {
|
sops.secrets.colin-passwd = {
|
||||||
sopsFile = ../../../secrets/lappy.yaml;
|
sopsFile = ../../secrets/lappy.yaml;
|
||||||
neededForUsers = true;
|
neededForUsers = true;
|
||||||
};
|
};
|
||||||
|
|
@@ -1,7 +1,16 @@
|
|||||||
{ ... }:
|
{ ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
sane.persist.root-on-tmpfs = true;
|
# root is a tmpfs so that we have an ephemeral system ("impermanence" handles the state)
|
||||||
|
fileSystems."/" = {
|
||||||
|
device = "none";
|
||||||
|
fsType = "tmpfs";
|
||||||
|
options = [
|
||||||
|
"mode=755"
|
||||||
|
"size=1G"
|
||||||
|
"defaults"
|
||||||
|
];
|
||||||
|
};
|
||||||
# we need a /tmp of default size (half RAM) for building large nix things
|
# we need a /tmp of default size (half RAM) for building large nix things
|
||||||
fileSystems."/tmp" = {
|
fileSystems."/tmp" = {
|
||||||
device = "none";
|
device = "none";
|
@@ -1,4 +1,4 @@
|
|||||||
{ config, pkgs, lib, ... }:
|
{ config, pkgs, lib, mobile-nixos, ... }:
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./firmware.nix
|
./firmware.nix
|
||||||
@@ -6,10 +6,6 @@
|
|||||||
./kernel.nix
|
./kernel.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
sane.roles.client = true;
|
|
||||||
sane.services.wg-home.enable = true;
|
|
||||||
sane.services.wg-home.ip = config.sane.hosts.by-name."moby".wg-home.ip;
|
|
||||||
|
|
||||||
# cross-compiled documentation is *slow*.
|
# cross-compiled documentation is *slow*.
|
||||||
# no obvious way to natively compile docs (2022/09/29).
|
# no obvious way to natively compile docs (2022/09/29).
|
||||||
# entrypoint is nixos/modules/misc/documentation.nix
|
# entrypoint is nixos/modules/misc/documentation.nix
|
||||||
@@ -23,38 +19,27 @@
|
|||||||
services.getty.autologinUser = "root"; # allows for emergency maintenance?
|
services.getty.autologinUser = "root"; # allows for emergency maintenance?
|
||||||
|
|
||||||
sops.secrets.colin-passwd = {
|
sops.secrets.colin-passwd = {
|
||||||
sopsFile = ../../../secrets/moby.yaml;
|
sopsFile = ../../secrets/moby.yaml;
|
||||||
neededForUsers = true;
|
neededForUsers = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
sane.web-browser = {
|
# usability compromises
|
||||||
# compromise impermanence for the sake of usability
|
sane.impermanence.home-dirs = [
|
||||||
persistCache = "private";
|
".librewolf"
|
||||||
persistData = "private";
|
|
||||||
|
|
||||||
# i don't do crypto stuff on moby
|
|
||||||
addons.ether-metamask.enable = false;
|
|
||||||
# addons.sideberry.enable = false;
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.persist.home.plaintext = [
|
|
||||||
".config/pulse" # persist pulseaudio volume
|
|
||||||
];
|
];
|
||||||
|
|
||||||
# sane.packages.enableGuiPkgs = false; # XXX faster builds/imaging for debugging
|
# sane.home-packages.enableGuiPkgs = false; # XXX faster builds/imaging for debugging
|
||||||
sane.packages.extraUserPkgs = [
|
sane.home-manager.extraPackages = [
|
||||||
pkgs.plasma5Packages.konsole # terminal
|
pkgs.plasma5Packages.konsole # terminal
|
||||||
];
|
];
|
||||||
|
|
||||||
sane.nixcache.enable = true;
|
sane.nixcache.enable = true;
|
||||||
sane.persist.enable = true;
|
sane.impermanence.enable = true;
|
||||||
sane.gui.phosh.enable = true;
|
sane.gui.phosh.enable = true;
|
||||||
|
|
||||||
boot.loader.efi.canTouchEfiVariables = false;
|
boot.loader.efi.canTouchEfiVariables = false;
|
||||||
# /boot space is at a premium. default was 20.
|
# /boot space is at a premium. default was 20.
|
||||||
# even 10 can be too much
|
boot.loader.generic-extlinux-compatible.configurationLimit = 10;
|
||||||
# TODO: compress moby kernels!
|
|
||||||
boot.loader.generic-extlinux-compatible.configurationLimit = 8;
|
|
||||||
# mobile.bootloader.enable = false;
|
# mobile.bootloader.enable = false;
|
||||||
# mobile.boot.stage-1.enable = false;
|
# mobile.boot.stage-1.enable = false;
|
||||||
# boot.initrd.systemd.enable = false;
|
# boot.initrd.systemd.enable = false;
|
||||||
@@ -65,10 +50,9 @@
|
|||||||
|
|
||||||
# without this some GUI apps fail: `DRM_IOCTL_MODE_CREATE_DUMB failed: Cannot allocate memory`
|
# without this some GUI apps fail: `DRM_IOCTL_MODE_CREATE_DUMB failed: Cannot allocate memory`
|
||||||
# this is because they can't allocate enough video ram.
|
# this is because they can't allocate enough video ram.
|
||||||
# the default CMA seems to be 32M.
|
# the default CMA seems to be 32M. we could probably get by with as little as 64M, and safely with 128M.
|
||||||
# i was running fine with 256MB from 2022/07-ish through 2022/12-ish, but then the phone quit reliably coming back from sleep: maybe a memory leak?
|
|
||||||
# `cat /proc/meminfo` to see CmaTotal/CmaFree if interested in tuning this.
|
# `cat /proc/meminfo` to see CmaTotal/CmaFree if interested in tuning this.
|
||||||
boot.kernelParams = [ "cma=512M" ];
|
boot.kernelParams = [ "cma=256M" ];
|
||||||
|
|
||||||
# mobile-nixos' /lib/firmware includes:
|
# mobile-nixos' /lib/firmware includes:
|
||||||
# rtl_bt (bluetooth)
|
# rtl_bt (bluetooth)
|
@@ -1,7 +1,17 @@
|
|||||||
{ ... }:
|
{ ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
sane.persist.root-on-tmpfs = true;
|
# root is a tmpfs so that we have an ephemeral system ("impermanence" handles the state)
|
||||||
|
fileSystems."/" = {
|
||||||
|
device = "none";
|
||||||
|
fsType = "tmpfs";
|
||||||
|
options = [
|
||||||
|
"mode=755"
|
||||||
|
"size=1G"
|
||||||
|
"defaults"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
fileSystems."/nix" = {
|
fileSystems."/nix" = {
|
||||||
device = "/dev/disk/by-uuid/1f1271f8-53ce-4081-8a29-60a4a6b5d6f9";
|
device = "/dev/disk/by-uuid/1f1271f8-53ce-4081-8a29-60a4a6b5d6f9";
|
||||||
fsType = "btrfs";
|
fsType = "btrfs";
|
@@ -125,9 +125,6 @@ in
|
|||||||
# aarch64-unknown-linux-gnu-gcc: error: unrecognized command line option '-mfpu=neon'
|
# aarch64-unknown-linux-gnu-gcc: error: unrecognized command line option '-mfpu=neon'
|
||||||
# make[3]: *** [../scripts/Makefile.build:289: drivers/video/fbdev/sun5i-eink-neon.o] Error 1
|
# make[3]: *** [../scripts/Makefile.build:289: drivers/video/fbdev/sun5i-eink-neon.o] Error 1
|
||||||
FB_SUN5I_EINK = no;
|
FB_SUN5I_EINK = no;
|
||||||
# used by the pinephone pro, but fails to compile with:
|
|
||||||
# ../drivers/media/i2c/ov8858.c:1834:27: error: implicit declaration of function 'compat_ptr'
|
|
||||||
VIDEO_OV8858 = no;
|
|
||||||
})
|
})
|
||||||
))
|
))
|
||||||
];
|
];
|
@@ -8,6 +8,9 @@
|
|||||||
boot.loader.efi.canTouchEfiVariables = false;
|
boot.loader.efi.canTouchEfiVariables = false;
|
||||||
sane.image.extraBootFiles = [ pkgs.bootpart-uefi-x86_64 ];
|
sane.image.extraBootFiles = [ pkgs.bootpart-uefi-x86_64 ];
|
||||||
|
|
||||||
|
users.users.dhcpcd.uid = config.sane.allocations.dhcpcd-uid;
|
||||||
|
users.groups.dhcpcd.gid = config.sane.allocations.dhcpcd-gid;
|
||||||
|
|
||||||
# docs: https://nixos.org/manual/nixos/stable/options.html#opt-system.stateVersion
|
# docs: https://nixos.org/manual/nixos/stable/options.html#opt-system.stateVersion
|
||||||
system.stateVersion = "21.05";
|
system.stateVersion = "21.05";
|
||||||
}
|
}
|
@@ -1,36 +1,38 @@
|
|||||||
{ config, pkgs, ... }:
|
{ pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./fs.nix
|
./fs.nix
|
||||||
|
./hardware.nix
|
||||||
./net.nix
|
./net.nix
|
||||||
./secrets.nix
|
./users.nix
|
||||||
./services
|
./services
|
||||||
];
|
];
|
||||||
|
|
||||||
sane.packages.extraUserPkgs = with pkgs; [
|
sane.home-manager.extraPackages = [
|
||||||
# for administering services
|
# for administering services
|
||||||
freshrss
|
pkgs.matrix-synapse
|
||||||
matrix-synapse
|
pkgs.freshrss
|
||||||
signaldctl
|
pkgs.goaccess
|
||||||
];
|
];
|
||||||
sane.persist.enable = true;
|
sane.impermanence.enable = true;
|
||||||
sane.services.dyn-dns.enable = true;
|
sane.services.duplicity.enable = true;
|
||||||
sane.services.wg-home.enable = true;
|
sane.services.nixserve.enable = true;
|
||||||
sane.services.wg-home.ip = config.sane.hosts.by-name."servo".wg-home.ip;
|
|
||||||
# sane.services.duplicity.enable = true; # TODO: re-enable after HW upgrade
|
|
||||||
|
|
||||||
# automatically log in at the virtual consoles.
|
|
||||||
# using root here makes sure we always have an escape hatch
|
|
||||||
services.getty.autologinUser = "root";
|
|
||||||
|
|
||||||
|
# TODO: look into the EFI stuff
|
||||||
|
boot.loader.grub.enable = false;
|
||||||
|
boot.loader.generic-extlinux-compatible.enable = true;
|
||||||
boot.loader.efi.canTouchEfiVariables = false;
|
boot.loader.efi.canTouchEfiVariables = false;
|
||||||
sane.image.extraBootFiles = [ pkgs.bootpart-uefi-x86_64 ];
|
sane.image.extraBootFiles = [ pkgs.bootpart-u-boot-rpi-aarch64 ];
|
||||||
|
|
||||||
|
sops.secrets.duplicity_passphrase = {
|
||||||
|
sopsFile = ../../secrets/servo.yaml;
|
||||||
|
};
|
||||||
|
|
||||||
# both transmission and ipfs try to set different net defaults.
|
# both transmission and ipfs try to set different net defaults.
|
||||||
# we just use the most aggressive of the two here:
|
# we just use the most aggressive of the two here:
|
||||||
boot.kernel.sysctl = {
|
boot.kernel.sysctl = {
|
||||||
"net.core.rmem_max" = 4194304; # 4MB
|
"net.core.rmem_max" = "4194304"; # 4MB
|
||||||
};
|
};
|
||||||
|
|
||||||
# This value determines the NixOS release from which the default
|
# This value determines the NixOS release from which the default
|
||||||
@@ -39,6 +41,6 @@
|
|||||||
# this value at the release version of the first install of this system.
|
# this value at the release version of the first install of this system.
|
||||||
# Before changing this value read the documentation for this option
|
# Before changing this value read the documentation for this option
|
||||||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||||||
system.stateVersion = "21.11";
|
system.stateVersion = "21.11"; # Did you read the comment?
|
||||||
}
|
}
|
||||||
|
|
69
machines/servo/fs.nix
Normal file
69
machines/servo/fs.nix
Normal file
@@ -0,0 +1,69 @@
|
|||||||
|
{ ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
# root is a tmpfs so that we have an ephemeral system ("impermanence" handles the state)
|
||||||
|
fileSystems."/" = {
|
||||||
|
device = "none";
|
||||||
|
fsType = "tmpfs";
|
||||||
|
options = [
|
||||||
|
"mode=755"
|
||||||
|
"size=1G"
|
||||||
|
"defaults"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
# we need a /tmp for building large nix things
|
||||||
|
fileSystems."/tmp" = {
|
||||||
|
device = "none";
|
||||||
|
fsType = "tmpfs";
|
||||||
|
options = [
|
||||||
|
"size=40G"
|
||||||
|
"mode=777"
|
||||||
|
"defaults"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
fileSystems."/nix" = {
|
||||||
|
device = "/dev/disk/by-uuid/aa272cff-0fcc-498e-a4cb-0d95fb60631b";
|
||||||
|
fsType = "btrfs";
|
||||||
|
};
|
||||||
|
|
||||||
|
fileSystems."/boot" = {
|
||||||
|
device = "/dev/disk/by-uuid/31D3-40CB";
|
||||||
|
fsType = "vfat";
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
|
# fileSystems."/var/lib/pleroma" = {
|
||||||
|
# device = "/opt/pleroma";
|
||||||
|
# options = [ "bind" ];
|
||||||
|
# };
|
||||||
|
|
||||||
|
# in-memory compressed RAM (seems to be dynamically sized)
|
||||||
|
zramSwap = {
|
||||||
|
enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# btrfs doesn't easily support swapfiles
|
||||||
|
# swapDevices = [
|
||||||
|
# { device = "/nix/persist/swapfile"; size = 4096; }
|
||||||
|
# ];
|
||||||
|
|
||||||
|
# this can be a partition. create with:
|
||||||
|
# fdisk <dev>
|
||||||
|
# n
|
||||||
|
# <default partno>
|
||||||
|
# <start>
|
||||||
|
# <end>
|
||||||
|
# t
|
||||||
|
# <partno>
|
||||||
|
# 19 # set part type to Linux swap
|
||||||
|
# w # write changes
|
||||||
|
# mkswap -L swap <part>
|
||||||
|
swapDevices = [
|
||||||
|
{
|
||||||
|
label = "swap";
|
||||||
|
# TODO: randomEncryption.enable = true;
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
|
75
machines/servo/hardware.nix
Normal file
75
machines/servo/hardware.nix
Normal file
@@ -0,0 +1,75 @@
|
|||||||
|
# this file originates from ‘nixos-generate-config’
|
||||||
|
# but has been heavily modified
|
||||||
|
{ pkgs, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
# i changed this becuse linux 5.10 didn't have rpi-400 device tree blob.
|
||||||
|
# nixos-22.05 linux 5.15 DOES have these now.
|
||||||
|
# it should be possible to remove this if desired, but i'm not sure how the rpi-specific kernel differs.
|
||||||
|
# see: https://github.com/raspberrypi/linux
|
||||||
|
boot.kernelPackages = pkgs.linuxPackages_rpi4;
|
||||||
|
|
||||||
|
# raspberryPi boot loader creates extlinux.conf.
|
||||||
|
# otherwise, enable the generic-extlinux-compatible loader below.
|
||||||
|
# note: THESE ARE MUTUALLY EXCLUSIVE. generic-extlinux-compatible causes uboot to not be built
|
||||||
|
|
||||||
|
boot.initrd.availableKernelModules = [
|
||||||
|
"bcm2711_thermal"
|
||||||
|
"bcm_phy_lib"
|
||||||
|
"brcmfmac"
|
||||||
|
"brcmutil"
|
||||||
|
"broadcom"
|
||||||
|
"clk_raspberrypi"
|
||||||
|
"drm" # Direct Render Manager
|
||||||
|
"enclosure" # SCSI ?
|
||||||
|
"fuse"
|
||||||
|
"mdio_bcm_unimac"
|
||||||
|
"pcie_brcmstb"
|
||||||
|
"raspberrypi_cpufreq"
|
||||||
|
"raspberrypi_hwmon"
|
||||||
|
"ses" # SCSI Enclosure Services
|
||||||
|
"uas" # USB attached storage
|
||||||
|
"uio" # userspace IO
|
||||||
|
"uio_pdrv_genirq"
|
||||||
|
"xhci_pci"
|
||||||
|
"xhci_pci_renesas"
|
||||||
|
];
|
||||||
|
# boot.initrd.compressor = "gzip"; # defaults to zstd
|
||||||
|
|
||||||
|
# ondemand power scaling keeps the cpu at low frequency when idle, and sets to max frequency
|
||||||
|
# when load is detected. (v.s. the "performance" default, which always uses the max frequency)
|
||||||
|
powerManagement.cpuFreqGovernor = "ondemand";
|
||||||
|
|
||||||
|
# XXX colin: this allows one to `systemctl halt` and then not remove power until the HDD has spun down.
|
||||||
|
# however, it doesn't work with reboot because systemd will spin the drive up again to read its reboot bin.
|
||||||
|
# a better solution would be to put the drive behind a powered USB hub (or get a SSD).
|
||||||
|
# systemd.services.diskguard = {
|
||||||
|
# description = "Safely power off spinning media";
|
||||||
|
# before = [ "shutdown.target" ];
|
||||||
|
# wantedBy = [ "sysinit.target" ];
|
||||||
|
# # old (creates dep loop, but works)
|
||||||
|
# # before = [ "systemd-remount-fs.service" "shutdown.target" ];
|
||||||
|
# # wantedBy = [ "systemd-remount-fs.service" ];
|
||||||
|
# serviceConfig = {
|
||||||
|
# Type = "oneshot";
|
||||||
|
# RemainAfterExit = true;
|
||||||
|
# ExecStart = "${pkgs.coreutils}/bin/true";
|
||||||
|
# ExecStop = with pkgs; writeScript "diskguard" ''
|
||||||
|
# #!${bash}/bin/bash
|
||||||
|
# if ${procps}/bin/pgrep nixos-rebuild ;
|
||||||
|
# then
|
||||||
|
# exit 0 # don't halt drives unless we're actually shutting down. maybe better way to do this (check script args?)
|
||||||
|
# fi
|
||||||
|
# # ${coreutils}/bin/sync
|
||||||
|
# # ${util-linux}/bin/mount -o remount,ro /nix/store
|
||||||
|
# # ${util-linux}/bin/mount -o remount,ro /
|
||||||
|
# # -S 1 retracts the spindle after 5 seconds of idle
|
||||||
|
# # -B 1 spins down the drive after <vendor specific duration>
|
||||||
|
# ${hdparm}/sbin/hdparm -S 1 -B 1 /dev/sda
|
||||||
|
# # TODO: monitor smartmonctl until disk is idle? or try hdparm -Y
|
||||||
|
# # ${coreutils}/bin/sleep 20
|
||||||
|
# # exec ${util-linux}/bin/umount --all -t ext4,vfat,ext2
|
||||||
|
# '';
|
||||||
|
# };
|
||||||
|
# };
|
||||||
|
}
|
139
machines/servo/net.nix
Normal file
139
machines/servo/net.nix
Normal file
@@ -0,0 +1,139 @@
|
|||||||
|
{ config, pkgs, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
networking.domain = "uninsane.org";
|
||||||
|
|
||||||
|
# The global useDHCP flag is deprecated, therefore explicitly set to false here.
|
||||||
|
# Per-interface useDHCP will be mandatory in the future, so this generated config
|
||||||
|
# replicates the default behaviour.
|
||||||
|
networking.useDHCP = false;
|
||||||
|
networking.interfaces.eth0.useDHCP = true;
|
||||||
|
# XXX colin: probably don't need this. wlan0 won't be populated unless i touch a value in networking.interfaces.wlan0
|
||||||
|
networking.wireless.enable = false;
|
||||||
|
|
||||||
|
# networking.firewall.enable = false;
|
||||||
|
networking.firewall.enable = true;
|
||||||
|
networking.firewall.allowedTCPPorts = [
|
||||||
|
25 # SMTP
|
||||||
|
80 # HTTP
|
||||||
|
143 # IMAP
|
||||||
|
443 # HTTPS
|
||||||
|
465 # SMTPS
|
||||||
|
587 # SMTPS/submission
|
||||||
|
993 # IMAPS
|
||||||
|
4001 # IPFS
|
||||||
|
];
|
||||||
|
networking.firewall.allowedUDPPorts = [
|
||||||
|
1900 7359 # DLNA: https://jellyfin.org/docs/general/networking/index.html
|
||||||
|
4001 # IPFS
|
||||||
|
];
|
||||||
|
|
||||||
|
# we need to use externally-visible nameservers in order for VPNs to be able to resolve hosts.
|
||||||
|
networking.nameservers = [
|
||||||
|
"1.1.1.1"
|
||||||
|
"9.9.9.9"
|
||||||
|
];
|
||||||
|
|
||||||
|
# OVPN CONFIG (https://www.ovpn.com):
|
||||||
|
# DOCS: https://nixos.wiki/wiki/WireGuard
|
||||||
|
networking.wireguard.enable = true;
|
||||||
|
networking.wireguard.interfaces.wg0 = {
|
||||||
|
privateKeyFile = config.sops.secrets.wg_ovpns_privkey.path;
|
||||||
|
# wg is active only in this namespace.
|
||||||
|
# run e.g. ip netns exec ovpns <some command like ping/curl/etc, it'll go through wg>
|
||||||
|
# sudo ip netns exec ovpns ping www.google.com
|
||||||
|
# note: without the namespace, you'll need to add a specific route through eth0 for the peer (185.157.162.178/32)
|
||||||
|
interfaceNamespace = "ovpns";
|
||||||
|
preSetup = "${pkgs.iproute2}/bin/ip netns add ovpns || true";
|
||||||
|
postShutdown = "${pkgs.iproute2}/bin/ip netns delete ovpns";
|
||||||
|
ips = [
|
||||||
|
"185.157.162.178/32"
|
||||||
|
];
|
||||||
|
peers = [
|
||||||
|
{
|
||||||
|
publicKey = "SkkEZDCBde22KTs/Hc7FWvDBfdOCQA4YtBEuC3n5KGs=";
|
||||||
|
endpoint = "vpn36.prd.amsterdam.ovpn.com:9930";
|
||||||
|
allowedIPs = [ "0.0.0.0/0" ];
|
||||||
|
# nixOS says this is important for keeping NATs active
|
||||||
|
persistentKeepalive = 25;
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services.wg0veth = {
|
||||||
|
description = "veth pair to allow communication between host and wg0 netns";
|
||||||
|
after = [ "wireguard-wg0.service" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
RemainAfterExit = true;
|
||||||
|
|
||||||
|
ExecStart = with pkgs; writeScript "wg0veth-start" ''
|
||||||
|
#!${bash}/bin/bash
|
||||||
|
# create veth pair
|
||||||
|
${iproute2}/bin/ip link add ovpns-veth-a type veth peer name ovpns-veth-b
|
||||||
|
${iproute2}/bin/ip addr add 10.0.1.5/24 dev ovpns-veth-a
|
||||||
|
${iproute2}/bin/ip link set ovpns-veth-a up
|
||||||
|
# mv veth-b into the ovpns namespace
|
||||||
|
${iproute2}/bin/ip link set ovpns-veth-b netns ovpns
|
||||||
|
${iproute2}/bin/ip -n ovpns addr add 10.0.1.6/24 dev ovpns-veth-b
|
||||||
|
${iproute2}/bin/ip -n ovpns link set ovpns-veth-b up
|
||||||
|
# forward HTTP traffic, which we need for letsencrypt to work
|
||||||
|
${iproute2}/bin/ip netns exec ovpns ${socat}/bin/socat TCP4-LISTEN:80,reuseaddr,fork,su=nobody TCP4:10.0.1.5:80 &
|
||||||
|
'';
|
||||||
|
|
||||||
|
ExecStop = with pkgs; writeScript "wg0veth-stop" ''
|
||||||
|
#!${bash}/bin/bash
|
||||||
|
${iproute2}/bin/ip -n wg0 link del ovpns-veth-b
|
||||||
|
${iproute2}/bin/ip link del ovpns-veth-a
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
sops.secrets."wg_ovpns_privkey" = {
|
||||||
|
sopsFile = ../../secrets/servo.yaml;
|
||||||
|
};
|
||||||
|
|
||||||
|
# HURRICANE ELECTRIC CONFIG:
|
||||||
|
# networking.sits = {
|
||||||
|
# hurricane = {
|
||||||
|
# remote = "216.218.226.238";
|
||||||
|
# local = "192.168.0.5";
|
||||||
|
# # local = "10.0.0.5";
|
||||||
|
# # remote = "10.0.0.1";
|
||||||
|
# # local = "10.0.0.22";
|
||||||
|
# dev = "eth0";
|
||||||
|
# ttl = 255;
|
||||||
|
# };
|
||||||
|
# };
|
||||||
|
# networking.interfaces."hurricane".ipv6 = {
|
||||||
|
# addresses = [
|
||||||
|
# # mx.uninsane.org (publically routed /64)
|
||||||
|
# {
|
||||||
|
# address = "2001:470:b:465::1";
|
||||||
|
# prefixLength = 128;
|
||||||
|
# }
|
||||||
|
# # client addr
|
||||||
|
# # {
|
||||||
|
# # address = "2001:470:a:466::2";
|
||||||
|
# # prefixLength = 64;
|
||||||
|
# # }
|
||||||
|
# ];
|
||||||
|
# routes = [
|
||||||
|
# {
|
||||||
|
# address = "::";
|
||||||
|
# prefixLength = 0;
|
||||||
|
# # via = "2001:470:a:466::1";
|
||||||
|
# }
|
||||||
|
# ];
|
||||||
|
# };
|
||||||
|
|
||||||
|
# # after configuration, we want the hurricane device to look like this:
|
||||||
|
# # hurricane: flags=209<UP,POINTOPOINT,RUNNING,NOARP> mtu 1480
|
||||||
|
# # inet6 2001:470:a:450::2 prefixlen 64 scopeid 0x0<global>
|
||||||
|
# # inet6 fe80::c0a8:16 prefixlen 64 scopeid 0x20<link>
|
||||||
|
# # sit txqueuelen 1000 (IPv6-in-IPv4)
|
||||||
|
# # test with:
|
||||||
|
# # curl --interface hurricane http://[2607:f8b0:400a:80b::2004]
|
||||||
|
# # ping 2607:f8b0:400a:80b::2004
|
||||||
|
}
|
@@ -1,7 +1,5 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
{ config, pkgs, ... }:
|
||||||
|
|
||||||
# we use manual DDNS now
|
|
||||||
lib.mkIf false
|
|
||||||
{
|
{
|
||||||
systemd.services.ddns-he = {
|
systemd.services.ddns-he = {
|
||||||
description = "update dynamic DNS entries for HurricaneElectric";
|
description = "update dynamic DNS entries for HurricaneElectric";
|
||||||
@@ -27,4 +25,8 @@ lib.mkIf false
|
|||||||
OnUnitActiveSec = "10min";
|
OnUnitActiveSec = "10min";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
sops.secrets."ddns_he" = {
|
||||||
|
sopsFile = ../../../secrets/servo.yaml;
|
||||||
|
};
|
||||||
}
|
}
|
@@ -1,26 +1,19 @@
|
|||||||
{ ... }:
|
{ ... }:
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./ddns-afraid.nix
|
|
||||||
./ddns-he.nix
|
./ddns-he.nix
|
||||||
./ejabberd.nix
|
|
||||||
./freshrss.nix
|
./freshrss.nix
|
||||||
./gitea.nix
|
./gitea.nix
|
||||||
./goaccess.nix
|
./goaccess.nix
|
||||||
./ipfs.nix
|
./ipfs.nix
|
||||||
./jackett.nix
|
./jackett.nix
|
||||||
./jellyfin.nix
|
./jellyfin.nix
|
||||||
./kiwix-serve.nix
|
|
||||||
./matrix
|
./matrix
|
||||||
./navidrome.nix
|
./navidrome.nix
|
||||||
./nixserve.nix
|
|
||||||
./nginx.nix
|
./nginx.nix
|
||||||
./pleroma.nix
|
./pleroma.nix
|
||||||
./postfix.nix
|
./postfix.nix
|
||||||
./postgres.nix
|
./postgres.nix
|
||||||
./prosody.nix
|
|
||||||
./transmission.nix
|
./transmission.nix
|
||||||
./trust-dns.nix
|
|
||||||
./wikipedia.nix
|
|
||||||
];
|
];
|
||||||
}
|
}
|
@@ -9,16 +9,19 @@
|
|||||||
# $ sudo -u freshrss -g freshrss FRESHRSS_DATA_PATH=/var/lib/freshrss ./result/cli/export-opml-for-user.php --user admin
|
# $ sudo -u freshrss -g freshrss FRESHRSS_DATA_PATH=/var/lib/freshrss ./result/cli/export-opml-for-user.php --user admin
|
||||||
# ```
|
# ```
|
||||||
|
|
||||||
{ config, lib, pkgs, sane-lib, ... }:
|
{ config, lib, pkgs, ... }:
|
||||||
{
|
{
|
||||||
sops.secrets."freshrss_passwd" = {
|
sops.secrets.freshrss_passwd = {
|
||||||
|
sopsFile = ../../../secrets/servo.yaml;
|
||||||
owner = config.users.users.freshrss.name;
|
owner = config.users.users.freshrss.name;
|
||||||
mode = "0400";
|
mode = "400";
|
||||||
};
|
};
|
||||||
sane.persist.sys.plaintext = [
|
sane.impermanence.service-dirs = [
|
||||||
{ user = "freshrss"; group = "freshrss"; directory = "/var/lib/freshrss"; }
|
{ user = "freshrss"; group = "freshrss"; directory = "/var/lib/freshrss"; }
|
||||||
];
|
];
|
||||||
|
|
||||||
|
users.users.freshrss.uid = config.sane.allocations.freshrss-uid;
|
||||||
|
users.groups.freshrss.gid = config.sane.allocations.freshrss-gid;
|
||||||
services.freshrss.enable = true;
|
services.freshrss.enable = true;
|
||||||
services.freshrss.baseUrl = "https://rss.uninsane.org";
|
services.freshrss.baseUrl = "https://rss.uninsane.org";
|
||||||
services.freshrss.virtualHost = "rss.uninsane.org";
|
services.freshrss.virtualHost = "rss.uninsane.org";
|
||||||
@@ -26,11 +29,9 @@
|
|||||||
|
|
||||||
systemd.services.freshrss-import-feeds =
|
systemd.services.freshrss-import-feeds =
|
||||||
let
|
let
|
||||||
feeds = sane-lib.feeds;
|
|
||||||
fresh = config.systemd.services.freshrss-config;
|
fresh = config.systemd.services.freshrss-config;
|
||||||
all-feeds = config.sane.feeds;
|
feeds = import ../../../modules/universal/home-manager/feeds.nix { inherit lib; };
|
||||||
wanted-feeds = feeds.filterByFormat ["text" "image"] all-feeds;
|
opml = pkgs.writeText "sane-freshrss.opml" (feeds.feedsToOpml feeds.all);
|
||||||
opml = pkgs.writeText "sane-freshrss.opml" (feeds.feedsToOpml wanted-feeds);
|
|
||||||
in {
|
in {
|
||||||
inherit (fresh) wantedBy environment;
|
inherit (fresh) wantedBy environment;
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
@@ -41,23 +42,7 @@
|
|||||||
description = "import sane RSS feed list";
|
description = "import sane RSS feed list";
|
||||||
after = [ "freshrss-config.service" ];
|
after = [ "freshrss-config.service" ];
|
||||||
script = ''
|
script = ''
|
||||||
# easiest way to preserve feeds: delete the user, recreate it, import feeds
|
${pkgs.freshrss}/cli/import-for-user.php --user admin --filename ${opml}
|
||||||
${pkgs.freshrss}/cli/delete-user.php --user colin || true
|
|
||||||
${pkgs.freshrss}/cli/create-user.php --user colin --password "$(cat ${config.services.freshrss.passwordFile})" || true
|
|
||||||
${pkgs.freshrss}/cli/import-for-user.php --user colin --filename ${opml}
|
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
# the default ("*:0/5") is to run every 5 minutes.
|
|
||||||
# `systemctl list-timers` to show
|
|
||||||
systemd.services.freshrss-updater.startAt = lib.mkForce "*:3/30";
|
|
||||||
|
|
||||||
services.nginx.virtualHosts."rss.uninsane.org" = {
|
|
||||||
addSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
# inherit kTLS;
|
|
||||||
# the routing is handled by services.freshrss.virtualHost
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet.CNAME."rss" = "native";
|
|
||||||
}
|
}
|
@@ -1,10 +1,11 @@
|
|||||||
{ config, pkgs, lib, ... }:
|
{ config, pkgs, lib, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
sane.persist.sys.plaintext = [
|
sane.impermanence.service-dirs = [
|
||||||
# TODO: mode? could be more granular
|
# TODO: mode? could be more granular
|
||||||
{ user = "git"; group = "gitea"; directory = "/var/lib/gitea"; }
|
{ user = "git"; group = "gitea"; directory = "/var/lib/gitea"; }
|
||||||
];
|
];
|
||||||
|
users.groups.gitea.gid = config.sane.allocations.gitea-gid;
|
||||||
services.gitea.enable = true;
|
services.gitea.enable = true;
|
||||||
services.gitea.user = "git"; # default is 'gitea'
|
services.gitea.user = "git"; # default is 'gitea'
|
||||||
services.gitea.database.type = "postgres";
|
services.gitea.database.type = "postgres";
|
||||||
@@ -15,17 +16,6 @@
|
|||||||
services.gitea.settings.session.COOKIE_SECURE = true;
|
services.gitea.settings.session.COOKIE_SECURE = true;
|
||||||
# services.gitea.disableRegistration = true;
|
# services.gitea.disableRegistration = true;
|
||||||
|
|
||||||
# gitea doesn't create the git user
|
|
||||||
users.users.git = {
|
|
||||||
description = "Gitea Service";
|
|
||||||
home = "/var/lib/gitea";
|
|
||||||
useDefaultShell = true;
|
|
||||||
group = "gitea";
|
|
||||||
isSystemUser = true;
|
|
||||||
# sendmail access (not 100% sure if this is necessary)
|
|
||||||
extraGroups = [ "postdrop" ];
|
|
||||||
};
|
|
||||||
|
|
||||||
services.gitea.settings = {
|
services.gitea.settings = {
|
||||||
server = {
|
server = {
|
||||||
# options: "home", "explore", "organizations", "login" or URL fragment (or full URL)
|
# options: "home", "explore", "organizations", "login" or URL fragment (or full URL)
|
||||||
@@ -82,18 +72,4 @@
|
|||||||
"/var/lib/gitea"
|
"/var/lib/gitea"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
# hosted git (web view and for `git <cmd>` use
|
|
||||||
# TODO: enable publog?
|
|
||||||
services.nginx.virtualHosts."git.uninsane.org" = {
|
|
||||||
forceSSL = true; # gitea complains if served over a different protocol than its config file says
|
|
||||||
enableACME = true;
|
|
||||||
# inherit kTLS;
|
|
||||||
|
|
||||||
locations."/" = {
|
|
||||||
proxyPass = "http://127.0.0.1:3000";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet.CNAME."git" = "native";
|
|
||||||
}
|
}
|
@@ -14,7 +14,6 @@
|
|||||||
-f /var/log/nginx/public.log \
|
-f /var/log/nginx/public.log \
|
||||||
--log-format=VCOMBINED \
|
--log-format=VCOMBINED \
|
||||||
--real-time-html \
|
--real-time-html \
|
||||||
--html-refresh=30 \
|
|
||||||
--no-query-string \
|
--no-query-string \
|
||||||
--anonymize-ip \
|
--anonymize-ip \
|
||||||
--ignore-panel=HOSTS \
|
--ignore-panel=HOSTS \
|
||||||
@@ -25,7 +24,6 @@
|
|||||||
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
|
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
|
||||||
Type = "simple";
|
Type = "simple";
|
||||||
Restart = "on-failure";
|
Restart = "on-failure";
|
||||||
RestartSec = "10s";
|
|
||||||
|
|
||||||
# hardening
|
# hardening
|
||||||
WorkingDirectory = "/tmp";
|
WorkingDirectory = "/tmp";
|
||||||
@@ -43,26 +41,4 @@
|
|||||||
after = [ "network.target" ];
|
after = [ "network.target" ];
|
||||||
wantedBy = [ "multi-user.target" ];
|
wantedBy = [ "multi-user.target" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
# server statistics
|
|
||||||
services.nginx.virtualHosts."sink.uninsane.org" = {
|
|
||||||
addSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
# inherit kTLS;
|
|
||||||
root = "/var/lib/uninsane/sink";
|
|
||||||
|
|
||||||
locations."/ws" = {
|
|
||||||
proxyPass = "http://127.0.0.1:7890";
|
|
||||||
# XXX not sure how much of this is necessary
|
|
||||||
extraConfig = ''
|
|
||||||
proxy_http_version 1.1;
|
|
||||||
proxy_set_header Upgrade $http_upgrade;
|
|
||||||
proxy_set_header Connection $connection_upgrade;
|
|
||||||
proxy_buffering off;
|
|
||||||
proxy_read_timeout 7d;
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet.CNAME."sink" = "native";
|
|
||||||
}
|
}
|
@@ -6,50 +6,26 @@
|
|||||||
# - number of open peer connections:
|
# - number of open peer connections:
|
||||||
# - sudo -u ipfs -g ipfs ipfs -c /var/lib/ipfs/ swarm peers | wc -l
|
# - sudo -u ipfs -g ipfs ipfs -c /var/lib/ipfs/ swarm peers | wc -l
|
||||||
|
|
||||||
{ lib, ... }:
|
{ ... }:
|
||||||
|
|
||||||
lib.mkIf false # i don't actively use ipfs anymore
|
|
||||||
{
|
{
|
||||||
sane.persist.sys.plaintext = [
|
sane.impermanence.service-dirs = [
|
||||||
# TODO: mode? could be more granular
|
# TODO: mode? could be more granular
|
||||||
{ user = "261"; group = "261"; directory = "/var/lib/ipfs"; }
|
{ user = "261"; group = "261"; directory = "/var/lib/ipfs"; }
|
||||||
];
|
];
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 4001 ];
|
|
||||||
networking.firewall.allowedUDPPorts = [ 4001 ];
|
|
||||||
|
|
||||||
services.nginx.virtualHosts."ipfs.uninsane.org" = {
|
|
||||||
# don't default to ssl upgrades, since this may be dnslink'd from a different domain.
|
|
||||||
# ideally we'd disable ssl entirely, but some places assume it?
|
|
||||||
addSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
# inherit kTLS;
|
|
||||||
|
|
||||||
locations."/" = {
|
|
||||||
proxyPass = "http://127.0.0.1:8080";
|
|
||||||
extraConfig = ''
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Ipfs-Gateway-Prefix "";
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet.CNAME."ipfs" = "native";
|
|
||||||
|
|
||||||
# services.ipfs.enable = true;
|
# services.ipfs.enable = true;
|
||||||
services.kubo.localDiscovery = true;
|
services.kubo.localDiscovery = true;
|
||||||
services.kubo.settings = {
|
services.kubo.swarmAddress = [
|
||||||
|
# "/dns4/ipfs.uninsane.org/tcp/4001"
|
||||||
|
# "/ip4/0.0.0.0/tcp/4001"
|
||||||
|
"/dns4/ipfs.uninsane.org/udp/4001/quic"
|
||||||
|
"/ip4/0.0.0.0/udp/4001/quic"
|
||||||
|
];
|
||||||
|
services.kubo.extraConfig = {
|
||||||
Addresses = {
|
Addresses = {
|
||||||
Announce = [
|
Announce = [
|
||||||
# "/dns4/ipfs.uninsane.org/tcp/4001"
|
# "/dns4/ipfs.uninsane.org/tcp/4001"
|
||||||
"/dns4/ipfs.uninsane.org/udp/4001/quic"
|
"/dns4/ipfs.uninsane.org/udp/4001/quic"
|
||||||
];
|
];
|
||||||
Swarm = [
|
|
||||||
# "/dns4/ipfs.uninsane.org/tcp/4001"
|
|
||||||
# "/ip4/0.0.0.0/tcp/4001"
|
|
||||||
"/dns4/ipfs.uninsane.org/udp/4001/quic"
|
|
||||||
"/ip4/0.0.0.0/udp/4001/quic"
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
Gateway = {
|
Gateway = {
|
||||||
# the gateway can only be used to serve content already replicated on this host
|
# the gateway can only be used to serve content already replicated on this host
|
@@ -1,32 +1,18 @@
|
|||||||
{ ... }:
|
{ ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
sane.persist.sys.plaintext = [
|
sane.impermanence.service-dirs = [
|
||||||
# TODO: mode? we only need this to save Indexer creds ==> migrate to config?
|
# TODO: mode? we only need this to save Indexer creds ==> migrate to config?
|
||||||
{ user = "root"; group = "root"; directory = "/var/lib/jackett"; }
|
{ user = "root"; group = "root"; directory = "/var/lib/jackett"; }
|
||||||
];
|
];
|
||||||
services.jackett.enable = true;
|
services.jackett.enable = true;
|
||||||
|
|
||||||
systemd.services.jackett.after = [ "wireguard-wg-ovpns.service" ];
|
systemd.services.jackett.after = ["wg0veth.service"];
|
||||||
systemd.services.jackett.partOf = [ "wireguard-wg-ovpns.service" ];
|
|
||||||
systemd.services.jackett.serviceConfig = {
|
systemd.services.jackett.serviceConfig = {
|
||||||
# run this behind the OVPN static VPN
|
# run this behind the OVPN static VPN
|
||||||
NetworkNamespacePath = "/run/netns/ovpns";
|
NetworkNamespacePath = "/run/netns/ovpns";
|
||||||
# patch jackett to listen on the public interfaces
|
# patch jackett to listen on the public interfaces
|
||||||
# ExecStart = lib.mkForce "${pkgs.jackett}/bin/Jackett --NoUpdates --DataFolder /var/lib/jackett/.config/Jackett --ListenPublic";
|
# ExecStart = lib.mkForce "${pkgs.jackett}/bin/Jackett --NoUpdates --DataFolder /var/lib/jackett/.config/Jackett --ListenPublic";
|
||||||
};
|
};
|
||||||
|
|
||||||
# jackett torrent search
|
|
||||||
services.nginx.virtualHosts."jackett.uninsane.org" = {
|
|
||||||
forceSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
# inherit kTLS;
|
|
||||||
locations."/" = {
|
|
||||||
# proxyPass = "http://ovpns.uninsane.org:9117";
|
|
||||||
proxyPass = "http://10.0.1.6:9117";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet.CNAME."jackett" = "native";
|
|
||||||
}
|
}
|
||||||
|
|
14
machines/servo/services/jellyfin.nix
Normal file
14
machines/servo/services/jellyfin.nix
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
{ config, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
sane.impermanence.service-dirs = [
|
||||||
|
# TODO: mode? could be more granular
|
||||||
|
{ user = "jellyfin"; group = "jellyfin"; directory = "/var/lib/jellyfin"; }
|
||||||
|
];
|
||||||
|
|
||||||
|
# users.users.jellyfin.uid = config.sane.allocations.jellyfin-uid;
|
||||||
|
# users.groups.jellyfin.gid = config.sane.allocations.jellyfin-gid;
|
||||||
|
# TODO: re-enable after migrating media dir to /var/lib/uninsane/media
|
||||||
|
# else it's too spammy
|
||||||
|
# services.jellyfin.enable = true;
|
||||||
|
}
|
@@ -1,23 +1,17 @@
|
|||||||
# docs: https://nixos.wiki/wiki/Matrix
|
# docs: https://nixos.wiki/wiki/Matrix
|
||||||
# docs: https://nixos.org/manual/nixos/stable/index.html#module-services-matrix-synapse
|
# docs: https://nixos.org/manual/nixos/stable/index.html#module-services-matrix-synapse
|
||||||
{ config, lib, pkgs, ... }:
|
{ config, lib, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./discord-puppet.nix
|
./discord-puppet.nix
|
||||||
# ./irc.nix
|
# ./irc.nix
|
||||||
./signal.nix
|
|
||||||
];
|
];
|
||||||
|
|
||||||
# allow synapse to read the registration files of its appservices
|
sane.impermanence.service-dirs = [
|
||||||
users.users.matrix-synapse.extraGroups = [ "mautrix-signal" ];
|
|
||||||
|
|
||||||
sane.persist.sys.plaintext = [
|
|
||||||
{ user = "matrix-synapse"; group = "matrix-synapse"; directory = "/var/lib/matrix-synapse"; }
|
{ user = "matrix-synapse"; group = "matrix-synapse"; directory = "/var/lib/matrix-synapse"; }
|
||||||
];
|
];
|
||||||
services.matrix-synapse.enable = true;
|
services.matrix-synapse.enable = true;
|
||||||
# this changes the default log level from INFO to WARN.
|
|
||||||
# maybe there's an easier way?
|
|
||||||
services.matrix-synapse.settings.log_config = ./synapse-log_level.yaml;
|
services.matrix-synapse.settings.log_config = ./synapse-log_level.yaml;
|
||||||
services.matrix-synapse.settings.server_name = "uninsane.org";
|
services.matrix-synapse.settings.server_name = "uninsane.org";
|
||||||
|
|
||||||
@@ -83,57 +77,9 @@
|
|||||||
# create a token with limited uses:
|
# create a token with limited uses:
|
||||||
# curl -d '{ "uses_allowed": 1 }' --header "Authorization: Bearer <my_token>" localhost:8008/_synapse/admin/v1/registration_tokens/new
|
# curl -d '{ "uses_allowed": 1 }' --header "Authorization: Bearer <my_token>" localhost:8008/_synapse/admin/v1/registration_tokens/new
|
||||||
|
|
||||||
# matrix chat server
|
|
||||||
# TODO: was `publog`
|
|
||||||
services.nginx.virtualHosts."matrix.uninsane.org" = {
|
|
||||||
addSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
# inherit kTLS;
|
|
||||||
|
|
||||||
# TODO colin: replace this with something helpful to the viewer
|
sops.secrets.matrix_synapse_secrets = {
|
||||||
# locations."/".extraConfig = ''
|
sopsFile = ../../../../secrets/servo.yaml;
|
||||||
# return 404;
|
|
||||||
# '';
|
|
||||||
|
|
||||||
locations."/" = {
|
|
||||||
proxyPass = "http://127.0.0.1:8008";
|
|
||||||
};
|
|
||||||
# redirect browsers to the web client.
|
|
||||||
# i don't think native matrix clients ever fetch the root.
|
|
||||||
# ideally this would be put behind some user-agent test though.
|
|
||||||
locations."= /" = {
|
|
||||||
return = "301 https://web.matrix.uninsane.org";
|
|
||||||
};
|
|
||||||
|
|
||||||
# locations."/_matrix" = {
|
|
||||||
# proxyPass = "http://127.0.0.1:8008";
|
|
||||||
# };
|
|
||||||
};
|
|
||||||
|
|
||||||
# matrix web client
|
|
||||||
# docs: https://nixos.org/manual/nixos/stable/index.html#module-services-matrix-element-web
|
|
||||||
services.nginx.virtualHosts."web.matrix.uninsane.org" = {
|
|
||||||
forceSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
# inherit kTLS;
|
|
||||||
|
|
||||||
root = pkgs.element-web.override {
|
|
||||||
conf = {
|
|
||||||
default_server_config."m.homeserver" = {
|
|
||||||
"base_url" = "https://matrix.uninsane.org";
|
|
||||||
"server_name" = "uninsane.org";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet = {
|
|
||||||
CNAME."matrix" = "native";
|
|
||||||
CNAME."web.matrix" = "native";
|
|
||||||
};
|
|
||||||
|
|
||||||
|
|
||||||
sops.secrets."matrix_synapse_secrets" = {
|
|
||||||
owner = config.users.users.matrix-synapse.name;
|
owner = config.users.users.matrix-synapse.name;
|
||||||
};
|
};
|
||||||
}
|
}
|
@@ -1,6 +1,6 @@
|
|||||||
{ lib, ... }:
|
{ lib, ... }:
|
||||||
{
|
{
|
||||||
sane.persist.sys.plaintext = [
|
sane.impermanence.service-dirs = [
|
||||||
{ user = "matrix-synapse"; group = "matrix-synapse"; directory = "/var/lib/mx-puppet-discord"; }
|
{ user = "matrix-synapse"; group = "matrix-synapse"; directory = "/var/lib/mx-puppet-discord"; }
|
||||||
];
|
];
|
||||||
|
|
||||||
@@ -43,7 +43,6 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# TODO: should use a dedicated user
|
|
||||||
systemd.services.mx-puppet-discord.serviceConfig = {
|
systemd.services.mx-puppet-discord.serviceConfig = {
|
||||||
# fix up to not use /var/lib/private, but just /var/lib
|
# fix up to not use /var/lib/private, but just /var/lib
|
||||||
DynamicUser = lib.mkForce false;
|
DynamicUser = lib.mkForce false;
|
@@ -1,7 +1,7 @@
|
|||||||
{ config, lib, ... }:
|
{ config, lib, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
sane.persist.sys.plaintext = [
|
sane.impermanence.service-dirs = [
|
||||||
# TODO: mode?
|
# TODO: mode?
|
||||||
# user and group are both "matrix-appservice-irc"
|
# user and group are both "matrix-appservice-irc"
|
||||||
{ user = "993"; group = "992"; directory = "/var/lib/matrix-appservice-irc"; }
|
{ user = "993"; group = "992"; directory = "/var/lib/matrix-appservice-irc"; }
|
17
machines/servo/services/navidrome.nix
Normal file
17
machines/servo/services/navidrome.nix
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
{ ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
sane.impermanence.service-dirs = [
|
||||||
|
{ user = "navidrome"; group = "navidrome"; directory = "/var/lib/private/navidrome"; }
|
||||||
|
];
|
||||||
|
services.navidrome.enable = true;
|
||||||
|
services.navidrome.settings = {
|
||||||
|
# docs: https://www.navidrome.org/docs/usage/configuration-options/
|
||||||
|
Address = "127.0.0.1";
|
||||||
|
Port = 4533;
|
||||||
|
MusicFolder = "/var/lib/uninsane/media/Music";
|
||||||
|
CovertArtPriority = "*.jpg, *.JPG, *.png, *.PNG, embedded";
|
||||||
|
AutoImportPlaylists = false;
|
||||||
|
ScanSchedule = "@every 1h";
|
||||||
|
};
|
||||||
|
}
|
320
machines/servo/services/nginx.nix
Normal file
320
machines/servo/services/nginx.nix
Normal file
@@ -0,0 +1,320 @@
|
|||||||
|
# docs: https://nixos.wiki/wiki/Nginx
|
||||||
|
{ config, pkgs, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
# make the logs for this host "public" so that they show up in e.g. metrics
|
||||||
|
publog = vhost: vhost // {
|
||||||
|
extraConfig = (vhost.extraConfig or "") + ''
|
||||||
|
access_log /var/log/nginx/public.log vcombined;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
in
|
||||||
|
{
|
||||||
|
services.nginx.enable = true;
|
||||||
|
|
||||||
|
# this is the standard `combined` log format, with the addition of $host
|
||||||
|
# so that we have the virtualHost in the log.
|
||||||
|
# KEEP IN SYNC WITH GOACCESS
|
||||||
|
# goaccess calls this VCOMBINED:
|
||||||
|
# - <https://gist.github.com/jyap808/10570005>
|
||||||
|
services.nginx.commonHttpConfig = ''
|
||||||
|
log_format vcombined '$host:$server_port $remote_addr - $remote_user [$time_local] "$request" $status $body_bytes_sent "$http_referrer" "$http_user_agent"';
|
||||||
|
access_log /var/log/nginx/private.log vcombined;
|
||||||
|
'';
|
||||||
|
|
||||||
|
# web blog/personal site
|
||||||
|
services.nginx.virtualHosts."uninsane.org" = publog {
|
||||||
|
root = "${pkgs.uninsane-dot-org}/share/uninsane-dot-org";
|
||||||
|
# a lot of places hardcode https://uninsane.org,
|
||||||
|
# and then when we mix http + non-https, we get CORS violations
|
||||||
|
# and things don't look right. so force SSL.
|
||||||
|
forceSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
|
||||||
|
# uninsane.org/share/foo => /var/lib/uninsane/root/share/foo.
|
||||||
|
# yes, nginx does not strip the prefix when evaluating against the root.
|
||||||
|
locations."/share".root = "/var/lib/uninsane/root";
|
||||||
|
|
||||||
|
# allow matrix users to discover that @user:uninsane.org is reachable via matrix.uninsane.org
|
||||||
|
locations."= /.well-known/matrix/server".extraConfig =
|
||||||
|
let
|
||||||
|
# use 443 instead of the default 8448 port to unite
|
||||||
|
# the client-server and server-server port for simplicity
|
||||||
|
server = { "m.server" = "matrix.uninsane.org:443"; };
|
||||||
|
in ''
|
||||||
|
add_header Content-Type application/json;
|
||||||
|
return 200 '${builtins.toJSON server}';
|
||||||
|
'';
|
||||||
|
locations."= /.well-known/matrix/client".extraConfig =
|
||||||
|
let
|
||||||
|
client = {
|
||||||
|
"m.homeserver" = { "base_url" = "https://matrix.uninsane.org"; };
|
||||||
|
"m.identity_server" = { "base_url" = "https://vector.im"; };
|
||||||
|
};
|
||||||
|
# ACAO required to allow element-web on any URL to request this json file
|
||||||
|
in ''
|
||||||
|
add_header Content-Type application/json;
|
||||||
|
add_header Access-Control-Allow-Origin *;
|
||||||
|
return 200 '${builtins.toJSON client}';
|
||||||
|
'';
|
||||||
|
|
||||||
|
# static URLs might not be aware of .well-known (e.g. registration confirmation URLs),
|
||||||
|
# so hack around that.
|
||||||
|
locations."/_matrix" = {
|
||||||
|
proxyPass = "http://127.0.0.1:8008";
|
||||||
|
};
|
||||||
|
locations."/_synapse" = {
|
||||||
|
proxyPass = "http://127.0.0.1:8008";
|
||||||
|
};
|
||||||
|
|
||||||
|
# allow ActivityPub clients to discover how to reach @user@uninsane.org
|
||||||
|
# TODO: waiting on https://git.pleroma.social/pleroma/pleroma/-/merge_requests/3361/
|
||||||
|
# locations."/.well-known/nodeinfo" = {
|
||||||
|
# proxyPass = "http://127.0.0.1:4000";
|
||||||
|
# extraConfig = pleromaExtraConfig;
|
||||||
|
# };
|
||||||
|
};
|
||||||
|
|
||||||
|
# server statistics
|
||||||
|
services.nginx.virtualHosts."sink.uninsane.org" = {
|
||||||
|
addSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
root = "/var/lib/uninsane/sink";
|
||||||
|
|
||||||
|
locations."/ws" = {
|
||||||
|
proxyPass = "http://127.0.0.1:7890";
|
||||||
|
# XXX not sure how much of this is necessary
|
||||||
|
extraConfig = ''
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection $connection_upgrade;
|
||||||
|
proxy_buffering off;
|
||||||
|
proxy_read_timeout 7d;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
# Pleroma server and web interface
|
||||||
|
services.nginx.virtualHosts."fed.uninsane.org" = publog {
|
||||||
|
addSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
locations."/" = {
|
||||||
|
proxyPass = "http://127.0.0.1:4000";
|
||||||
|
# documented: https://git.pleroma.social/pleroma/pleroma/-/blob/develop/installation/pleroma.nginx
|
||||||
|
extraConfig = ''
|
||||||
|
# XXX colin: this block is in the nixos examples: i don't understand all of it
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*' always;
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'POST, PUT, DELETE, GET, PATCH, OPTIONS' always;
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Authorization, Content-Type, Idempotency-Key' always;
|
||||||
|
add_header 'Access-Control-Expose-Headers' 'Link, X-RateLimit-Reset, X-RateLimit-Limit, X-RateLimit-Remaining, X-Request-Id' always;
|
||||||
|
if ($request_method = OPTIONS) {
|
||||||
|
return 204;
|
||||||
|
}
|
||||||
|
|
||||||
|
add_header X-XSS-Protection "1; mode=block";
|
||||||
|
add_header X-Permitted-Cross-Domain-Policies none;
|
||||||
|
add_header X-Frame-Options DENY;
|
||||||
|
add_header X-Content-Type-Options nosniff;
|
||||||
|
add_header Referrer-Policy same-origin;
|
||||||
|
add_header X-Download-Options noopen;
|
||||||
|
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
# proxy_set_header Host $http_host;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
|
||||||
|
# colin: added this due to Pleroma complaining in its logs
|
||||||
|
# proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
# proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
|
||||||
|
client_max_body_size 16m;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# transmission web client
|
||||||
|
services.nginx.virtualHosts."bt.uninsane.org" = {
|
||||||
|
# basicAuth is literally cleartext user/pw, so FORCE this to happen over SSL
|
||||||
|
forceSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
locations."/" = {
|
||||||
|
# proxyPass = "http://ovpns.uninsane.org:9091";
|
||||||
|
proxyPass = "http://10.0.1.6:9091";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# jackett torrent search
|
||||||
|
services.nginx.virtualHosts."jackett.uninsane.org" = {
|
||||||
|
forceSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
locations."/" = {
|
||||||
|
# proxyPass = "http://ovpns.uninsane.org:9117";
|
||||||
|
proxyPass = "http://10.0.1.6:9117";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# matrix chat server
|
||||||
|
services.nginx.virtualHosts."matrix.uninsane.org" = publog {
|
||||||
|
addSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
|
||||||
|
# TODO colin: replace this with something helpful to the viewer
|
||||||
|
# locations."/".extraConfig = ''
|
||||||
|
# return 404;
|
||||||
|
# '';
|
||||||
|
|
||||||
|
locations."/" = {
|
||||||
|
proxyPass = "http://127.0.0.1:8008";
|
||||||
|
};
|
||||||
|
# redirect browsers to the web client.
|
||||||
|
# i don't think native matrix clients ever fetch the root.
|
||||||
|
# ideally this would be put behind some user-agent test though.
|
||||||
|
locations."= /" = {
|
||||||
|
return = "301 https://web.matrix.uninsane.org";
|
||||||
|
};
|
||||||
|
|
||||||
|
# locations."/_matrix" = {
|
||||||
|
# proxyPass = "http://127.0.0.1:8008";
|
||||||
|
# };
|
||||||
|
};
|
||||||
|
|
||||||
|
# matrix web client
|
||||||
|
# docs: https://nixos.org/manual/nixos/stable/index.html#module-services-matrix-element-web
|
||||||
|
services.nginx.virtualHosts."web.matrix.uninsane.org" = {
|
||||||
|
forceSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
|
||||||
|
root = pkgs.element-web.override {
|
||||||
|
conf = {
|
||||||
|
default_server_config."m.homeserver" = {
|
||||||
|
"base_url" = "https://matrix.uninsane.org";
|
||||||
|
"server_name" = "uninsane.org";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# hosted git (web view and for `git <cmd>` use
|
||||||
|
services.nginx.virtualHosts."git.uninsane.org" = publog {
|
||||||
|
addSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
|
||||||
|
locations."/" = {
|
||||||
|
proxyPass = "http://127.0.0.1:3000";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Jellyfin multimedia server
|
||||||
|
# this is mostly taken from the official jellfin.org docs
|
||||||
|
services.nginx.virtualHosts."jelly.uninsane.org" = {
|
||||||
|
addSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
|
||||||
|
locations."/" = {
|
||||||
|
proxyPass = "http://127.0.0.1:8096";
|
||||||
|
extraConfig = ''
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_set_header X-Forwarded-Protocol $scheme;
|
||||||
|
proxy_set_header X-Forwarded-Host $http_host;
|
||||||
|
|
||||||
|
# Disable buffering when the nginx proxy gets very resource heavy upon streaming
|
||||||
|
proxy_buffering off;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
# locations."/web/" = {
|
||||||
|
# proxyPass = "http://127.0.0.1:8096/web/index.html";
|
||||||
|
# extraConfig = ''
|
||||||
|
# proxy_set_header Host $host;
|
||||||
|
# proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
# proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
# proxy_set_header X-Forwarded-Protocol $scheme;
|
||||||
|
# proxy_set_header X-Forwarded-Host $http_host;
|
||||||
|
# '';
|
||||||
|
# };
|
||||||
|
locations."/socket" = {
|
||||||
|
proxyPass = "http://127.0.0.1:8096";
|
||||||
|
extraConfig = ''
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_set_header X-Forwarded-Protocol $scheme;
|
||||||
|
proxy_set_header X-Forwarded-Host $http_host;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
services.nginx.virtualHosts."music.uninsane.org" = {
|
||||||
|
forceSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
locations."/".proxyPass = "http://127.0.0.1:4533";
|
||||||
|
};
|
||||||
|
|
||||||
|
services.nginx.virtualHosts."rss.uninsane.org" = {
|
||||||
|
addSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
# the routing is handled by freshrss.nix
|
||||||
|
};
|
||||||
|
|
||||||
|
services.nginx.virtualHosts."ipfs.uninsane.org" = {
|
||||||
|
# don't default to ssl upgrades, since this may be dnslink'd from a different domain.
|
||||||
|
# ideally we'd disable ssl entirely, but some places assume it?
|
||||||
|
addSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
|
||||||
|
default = true;
|
||||||
|
|
||||||
|
locations."/" = {
|
||||||
|
proxyPass = "http://127.0.0.1:8080";
|
||||||
|
extraConfig = ''
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Ipfs-Gateway-Prefix "";
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# exists only to manage certs for dovecot
|
||||||
|
services.nginx.virtualHosts."imap.uninsane.org" = {
|
||||||
|
forceSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
};
|
||||||
|
# exists only to manage certs for Postfix
|
||||||
|
services.nginx.virtualHosts."mx.uninsane.org" = {
|
||||||
|
forceSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
};
|
||||||
|
services.nginx.virtualHosts."nixcache.uninsane.org" = {
|
||||||
|
addSSL = true;
|
||||||
|
enableACME = true;
|
||||||
|
# serverAliases = [ "nixcache" ];
|
||||||
|
locations."/".extraConfig = ''
|
||||||
|
proxy_pass http://localhost:${toString config.services.nix-serve.port};
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
security.acme.acceptTerms = true;
|
||||||
|
security.acme.defaults.email = "admin.acme@uninsane.org";
|
||||||
|
|
||||||
|
users.users.acme.uid = config.sane.allocations.acme-uid;
|
||||||
|
users.groups.acme.gid = config.sane.allocations.acme-gid;
|
||||||
|
sane.impermanence.service-dirs = [
|
||||||
|
# TODO: mode?
|
||||||
|
{ user = "acme"; group = "acme"; directory = "/var/lib/acme"; }
|
||||||
|
# TODO: this is overly broad; only need media and share directories to be persisted
|
||||||
|
{ user = "colin"; group = "users"; directory = "/var/lib/uninsane"; }
|
||||||
|
];
|
||||||
|
}
|
@@ -1,15 +1,15 @@
|
|||||||
# docs:
|
# docs: https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/services/networking/pleroma.nix
|
||||||
# - https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/services/networking/pleroma.nix
|
|
||||||
# - https://docs.pleroma.social/backend/configuration/cheatsheet/
|
|
||||||
#
|
#
|
||||||
# to run it in a oci-container: https://github.com/barrucadu/nixfiles/blob/master/services/pleroma.nix
|
# to run it in a oci-container: https://github.com/barrucadu/nixfiles/blob/master/services/pleroma.nix
|
||||||
{ config, pkgs, ... }:
|
{ config, pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
sane.persist.sys.plaintext = [
|
sane.impermanence.service-dirs = [
|
||||||
# TODO: mode? could be more granular
|
# TODO: mode? could be more granular
|
||||||
{ user = "pleroma"; group = "pleroma"; directory = "/var/lib/pleroma"; }
|
{ user = "pleroma"; group = "pleroma"; directory = "/var/lib/pleroma"; }
|
||||||
];
|
];
|
||||||
|
users.users.pleroma.uid = config.sane.allocations.pleroma-uid;
|
||||||
|
users.groups.pleroma.gid = config.sane.allocations.pleroma-gid;
|
||||||
services.pleroma.enable = true;
|
services.pleroma.enable = true;
|
||||||
services.pleroma.secretConfigFile = config.sops.secrets.pleroma_secrets.path;
|
services.pleroma.secretConfigFile = config.sops.secrets.pleroma_secrets.path;
|
||||||
services.pleroma.configs = [
|
services.pleroma.configs = [
|
||||||
@@ -48,19 +48,16 @@
|
|||||||
redirect_on_failure: true
|
redirect_on_failure: true
|
||||||
#base_url: "https://cache.pleroma.social"
|
#base_url: "https://cache.pleroma.social"
|
||||||
|
|
||||||
# see for reference:
|
|
||||||
# - `force_custom_plan`: <https://docs.pleroma.social/backend/configuration/postgresql/#disable-generic-query-plans>
|
|
||||||
config :pleroma, Pleroma.Repo,
|
config :pleroma, Pleroma.Repo,
|
||||||
adapter: Ecto.Adapters.Postgres,
|
adapter: Ecto.Adapters.Postgres,
|
||||||
username: "pleroma",
|
username: "pleroma",
|
||||||
database: "pleroma",
|
database: "pleroma",
|
||||||
hostname: "localhost",
|
hostname: "localhost",
|
||||||
pool_size: 10,
|
pool_size: 10,
|
||||||
|
prepare: :named,
|
||||||
parameters: [
|
parameters: [
|
||||||
plan_cache_mode: "force_custom_plan"
|
plan_cache_mode: "force_custom_plan"
|
||||||
]
|
]
|
||||||
# XXX: prepare: :named is needed only for PG <= 12
|
|
||||||
# prepare: :named,
|
|
||||||
# password: "{secrets.pleroma.db_password}",
|
# password: "{secrets.pleroma.db_password}",
|
||||||
|
|
||||||
# Configure web push notifications
|
# Configure web push notifications
|
||||||
@@ -111,11 +108,11 @@
|
|||||||
''
|
''
|
||||||
];
|
];
|
||||||
|
|
||||||
systemd.services.pleroma.path = [
|
systemd.services.pleroma.path = [
|
||||||
# something inside pleroma invokes `sh` w/o specifying it by path, so this is needed to allow pleroma to start
|
# something inside pleroma invokes `sh` w/o specifying it by path, so this is needed to allow pleroma to start
|
||||||
pkgs.bash
|
pkgs.bash
|
||||||
# used by Pleroma to strip geo tags from uploads
|
# used by Pleroma to strip geo tags from uploads
|
||||||
pkgs.exiftool
|
pkgs.exiftool
|
||||||
# i saw some errors when pleroma was shutting down about it not being able to find `awk`. probably not critical
|
# i saw some errors when pleroma was shutting down about it not being able to find `awk`. probably not critical
|
||||||
pkgs.gawk
|
pkgs.gawk
|
||||||
# needed for email operations like password reset
|
# needed for email operations like password reset
|
||||||
@@ -125,7 +122,6 @@
|
|||||||
systemd.services.pleroma.serviceConfig = {
|
systemd.services.pleroma.serviceConfig = {
|
||||||
# postgres can be slow to service early requests, preventing pleroma from starting on the first try
|
# postgres can be slow to service early requests, preventing pleroma from starting on the first try
|
||||||
Restart = "on-failure";
|
Restart = "on-failure";
|
||||||
RestartSec = "10s";
|
|
||||||
};
|
};
|
||||||
|
|
||||||
# systemd.services.pleroma.serviceConfig = {
|
# systemd.services.pleroma.serviceConfig = {
|
||||||
@@ -135,56 +131,8 @@
|
|||||||
# CapabilityBoundingSet = lib.mkForce "~";
|
# CapabilityBoundingSet = lib.mkForce "~";
|
||||||
# };
|
# };
|
||||||
|
|
||||||
# this is required to allow pleroma to send email.
|
sops.secrets.pleroma_secrets = {
|
||||||
# raw `sendmail` works, but i think pleroma's passing it some funny flags or something, idk.
|
sopsFile = ../../../secrets/servo.yaml;
|
||||||
# hack to fix that.
|
|
||||||
users.users.pleroma.extraGroups = [ "postdrop" ];
|
|
||||||
|
|
||||||
# Pleroma server and web interface
|
|
||||||
# TODO: enable publog?
|
|
||||||
services.nginx.virtualHosts."fed.uninsane.org" = {
|
|
||||||
forceSSL = true; # pleroma redirects to https anyway
|
|
||||||
enableACME = true;
|
|
||||||
# inherit kTLS;
|
|
||||||
locations."/" = {
|
|
||||||
proxyPass = "http://127.0.0.1:4000";
|
|
||||||
# documented: https://git.pleroma.social/pleroma/pleroma/-/blob/develop/installation/pleroma.nginx
|
|
||||||
extraConfig = ''
|
|
||||||
# XXX colin: this block is in the nixos examples: i don't understand all of it
|
|
||||||
add_header 'Access-Control-Allow-Origin' '*' always;
|
|
||||||
add_header 'Access-Control-Allow-Methods' 'POST, PUT, DELETE, GET, PATCH, OPTIONS' always;
|
|
||||||
add_header 'Access-Control-Allow-Headers' 'Authorization, Content-Type, Idempotency-Key' always;
|
|
||||||
add_header 'Access-Control-Expose-Headers' 'Link, X-RateLimit-Reset, X-RateLimit-Limit, X-RateLimit-Remaining, X-Request-Id' always;
|
|
||||||
if ($request_method = OPTIONS) {
|
|
||||||
return 204;
|
|
||||||
}
|
|
||||||
|
|
||||||
add_header X-XSS-Protection "1; mode=block";
|
|
||||||
add_header X-Permitted-Cross-Domain-Policies none;
|
|
||||||
add_header X-Frame-Options DENY;
|
|
||||||
add_header X-Content-Type-Options nosniff;
|
|
||||||
add_header Referrer-Policy same-origin;
|
|
||||||
add_header X-Download-Options noopen;
|
|
||||||
|
|
||||||
proxy_http_version 1.1;
|
|
||||||
proxy_set_header Upgrade $http_upgrade;
|
|
||||||
proxy_set_header Connection "upgrade";
|
|
||||||
# proxy_set_header Host $http_host;
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
||||||
|
|
||||||
# colin: added this due to Pleroma complaining in its logs
|
|
||||||
# proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
# proxy_set_header X-Forwarded-Proto $scheme;
|
|
||||||
|
|
||||||
client_max_body_size 16m;
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet.CNAME."fed" = "native";
|
|
||||||
|
|
||||||
sops.secrets."pleroma_secrets" = {
|
|
||||||
owner = config.users.users.pleroma.name;
|
owner = config.users.users.pleroma.name;
|
||||||
};
|
};
|
||||||
}
|
}
|
@@ -16,7 +16,7 @@ let
|
|||||||
};
|
};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
sane.persist.sys.plaintext = [
|
sane.impermanence.service-dirs = [
|
||||||
# TODO: mode? could be more granular
|
# TODO: mode? could be more granular
|
||||||
{ user = "opendkim"; group = "opendkim"; directory = "/var/lib/opendkim"; }
|
{ user = "opendkim"; group = "opendkim"; directory = "/var/lib/opendkim"; }
|
||||||
{ user = "root"; group = "root"; directory = "/var/lib/postfix"; }
|
{ user = "root"; group = "root"; directory = "/var/lib/postfix"; }
|
||||||
@@ -25,61 +25,6 @@ in
|
|||||||
# "/var/lib/dhparams" # https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/security/dhparams.nix
|
# "/var/lib/dhparams" # https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/security/dhparams.nix
|
||||||
# "/var/lib/dovecot"
|
# "/var/lib/dovecot"
|
||||||
];
|
];
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [
|
|
||||||
25 # SMTP
|
|
||||||
143 # IMAP
|
|
||||||
465 # SMTPS
|
|
||||||
587 # SMTPS/submission
|
|
||||||
993 # IMAPS
|
|
||||||
];
|
|
||||||
|
|
||||||
# exists only to manage certs for dovecot
|
|
||||||
services.nginx.virtualHosts."imap.uninsane.org" = {
|
|
||||||
enableACME = true;
|
|
||||||
};
|
|
||||||
# exists only to manage certs for Postfix
|
|
||||||
services.nginx.virtualHosts."mx.uninsane.org" = {
|
|
||||||
enableACME = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet = {
|
|
||||||
MX."@" = "10 mx.uninsane.org.";
|
|
||||||
# XXX: RFC's specify that the MX record CANNOT BE A CNAME
|
|
||||||
A."mx" = "185.157.162.178";
|
|
||||||
CNAME."imap" = "native";
|
|
||||||
|
|
||||||
# Sender Policy Framework:
|
|
||||||
# +mx => mail passes if it originated from the MX
|
|
||||||
# +a => mail passes if it originated from the A address of this domain
|
|
||||||
# +ip4:.. => mail passes if it originated from this IP
|
|
||||||
# -all => mail fails if none of these conditions were met
|
|
||||||
TXT."@" = "v=spf1 a mx -all";
|
|
||||||
|
|
||||||
# DKIM public key:
|
|
||||||
TXT."mx._domainkey" =
|
|
||||||
"v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCkSyMufc2KrRx3j17e/LyB+3eYSBRuEFT8PUka8EDX04QzCwDPdkwgnj3GNDvnB5Ktb05Cf2SJ/S1OLqNsINxJRWtkVfZd/C339KNh9wrukMKRKNELL9HLUw0bczOI4gKKFqyrRE9qm+4csCMAR79Te9FCjGV/jVnrkLdPT0GtFwIDAQAB"
|
|
||||||
;
|
|
||||||
|
|
||||||
# DMARC fields <https://datatracker.ietf.org/doc/html/rfc7489>:
|
|
||||||
# p=none|quarantine|reject: what to do with failures
|
|
||||||
# sp = p but for subdomains
|
|
||||||
# rua = where to send aggregrate reports
|
|
||||||
# ruf = where to send individual failure reports
|
|
||||||
# fo=0|1|d|s controls WHEN to send failure reports
|
|
||||||
# (1=on bad alignment; d=on DKIM failure; s=on SPF failure);
|
|
||||||
# Additionally:
|
|
||||||
# adkim=r|s (is DKIM relaxed [default] or strict)
|
|
||||||
# aspf=r|s (is SPF relaxed [default] or strict)
|
|
||||||
# pct = sampling ratio for punishing failures (default 100 for 100%)
|
|
||||||
# rf = report format
|
|
||||||
# ri = report interval
|
|
||||||
TXT."_dmarc" =
|
|
||||||
"v=DMARC1;p=quarantine;sp=reject;rua=mailto:admin+mail@uninsane.org;ruf=mailto:admin+mail@uninsane.org;fo=1:d:s"
|
|
||||||
;
|
|
||||||
};
|
|
||||||
|
|
||||||
services.postfix.enable = true;
|
services.postfix.enable = true;
|
||||||
services.postfix.hostname = "mx.uninsane.org";
|
services.postfix.hostname = "mx.uninsane.org";
|
||||||
services.postfix.origin = "uninsane.org";
|
services.postfix.origin = "uninsane.org";
|
||||||
@@ -110,8 +55,7 @@ in
|
|||||||
services.postfix.enableSubmissions = true;
|
services.postfix.enableSubmissions = true;
|
||||||
services.postfix.submissionsOptions = submissionOptions;
|
services.postfix.submissionsOptions = submissionOptions;
|
||||||
|
|
||||||
systemd.services.postfix.after = [ "wireguard-wg-ovpns.service" ];
|
systemd.services.postfix.after = [ "wg0veth.service" ];
|
||||||
systemd.services.postfix.partOf = [ "wireguard-wg-ovpns.service" ];
|
|
||||||
systemd.services.postfix.serviceConfig = {
|
systemd.services.postfix.serviceConfig = {
|
||||||
# run this behind the OVPN static VPN
|
# run this behind the OVPN static VPN
|
||||||
NetworkNamespacePath = "/run/netns/ovpns";
|
NetworkNamespacePath = "/run/netns/ovpns";
|
||||||
@@ -132,8 +76,7 @@ in
|
|||||||
# keeping this the same as the hostname seems simplest
|
# keeping this the same as the hostname seems simplest
|
||||||
services.opendkim.selector = "mx";
|
services.opendkim.selector = "mx";
|
||||||
|
|
||||||
systemd.services.opendkim.after = [ "wireguard-wg-ovpns.service" ];
|
systemd.services.opendkim.after = [ "wg0veth.service" ];
|
||||||
systemd.services.opendkim.partOf = [ "wireguard-wg-ovpns.service" ];
|
|
||||||
systemd.services.opendkim.serviceConfig = {
|
systemd.services.opendkim.serviceConfig = {
|
||||||
# run this behind the OVPN static VPN
|
# run this behind the OVPN static VPN
|
||||||
NetworkNamespacePath = "/run/netns/ovpns";
|
NetworkNamespacePath = "/run/netns/ovpns";
|
||||||
@@ -197,7 +140,8 @@ in
|
|||||||
# }
|
# }
|
||||||
];
|
];
|
||||||
|
|
||||||
sops.secrets."dovecot_passwd" = {
|
sops.secrets.dovecot_passwd = {
|
||||||
|
sopsFile = ../../../secrets/servo.yaml;
|
||||||
owner = config.users.users.dovecot2.name;
|
owner = config.users.users.dovecot2.name;
|
||||||
# TODO: debug why mail can't be sent without this being world-readable
|
# TODO: debug why mail can't be sent without this being world-readable
|
||||||
mode = "0444";
|
mode = "0444";
|
@@ -1,7 +1,7 @@
|
|||||||
{ ... }:
|
{ ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
sane.persist.sys.plaintext = [
|
sane.impermanence.service-dirs = [
|
||||||
# TODO: mode?
|
# TODO: mode?
|
||||||
{ user = "postgres"; group = "postgres"; directory = "/var/lib/postgresql"; }
|
{ user = "postgres"; group = "postgres"; directory = "/var/lib/postgresql"; }
|
||||||
];
|
];
|
||||||
@@ -17,11 +17,6 @@
|
|||||||
# LC_CTYPE = "C";
|
# LC_CTYPE = "C";
|
||||||
# '';
|
# '';
|
||||||
|
|
||||||
# TODO: perf tuning
|
|
||||||
# - for recommended values see: <https://pgtune.leopard.in.ua/>
|
|
||||||
# - for official docs (sparse), see: <https://www.postgresql.org/docs/11/config-setting.html#CONFIG-SETTING-CONFIGURATION-FILE>
|
|
||||||
# services.postgresql.settings = { ... }
|
|
||||||
|
|
||||||
# daily backups to /var/backup
|
# daily backups to /var/backup
|
||||||
services.postgresqlBackup.enable = true;
|
services.postgresqlBackup.enable = true;
|
||||||
|
|
@@ -1,7 +1,7 @@
|
|||||||
{ pkgs, ... }:
|
{ ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
sane.persist.sys.plaintext = [
|
sane.impermanence.service-dirs = [
|
||||||
# TODO: mode? we need this specifically for the stats tracking in .config/
|
# TODO: mode? we need this specifically for the stats tracking in .config/
|
||||||
{ user = "transmission"; group = "transmission"; directory = "/var/lib/transmission"; }
|
{ user = "transmission"; group = "transmission"; directory = "/var/lib/transmission"; }
|
||||||
];
|
];
|
||||||
@@ -40,41 +40,11 @@
|
|||||||
# transmission will by default not allow the world to read its files.
|
# transmission will by default not allow the world to read its files.
|
||||||
services.transmission.downloadDirPermissions = "775";
|
services.transmission.downloadDirPermissions = "775";
|
||||||
|
|
||||||
systemd.services.transmission.after = [ "wireguard-wg-ovpns.service" ];
|
systemd.services.transmission.after = ["wg0veth.service"];
|
||||||
systemd.services.transmission.partOf = [ "wireguard-wg-ovpns.service" ];
|
|
||||||
systemd.services.transmission.serviceConfig = {
|
systemd.services.transmission.serviceConfig = {
|
||||||
# run this behind the OVPN static VPN
|
# run this behind the OVPN static VPN
|
||||||
NetworkNamespacePath = "/run/netns/ovpns";
|
NetworkNamespacePath = "/run/netns/ovpns";
|
||||||
LogLevelMax = "warning";
|
LogLevelMax = "warning";
|
||||||
};
|
};
|
||||||
|
|
||||||
# service to automatically backup torrents i add to transmission
|
|
||||||
systemd.services.backup-torrents = {
|
|
||||||
description = "archive torrents to storage not owned by transmission";
|
|
||||||
script = ''
|
|
||||||
${pkgs.rsync}/bin/rsync -arv /var/lib/transmission/.config/transmission-daemon/torrents/ /var/backup/torrents/
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
systemd.timers.backup-torrents = {
|
|
||||||
wantedBy = [ "multi-user.target" ];
|
|
||||||
timerConfig = {
|
|
||||||
OnStartupSec = "11min";
|
|
||||||
OnUnitActiveSec = "240min";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# transmission web client
|
|
||||||
services.nginx.virtualHosts."bt.uninsane.org" = {
|
|
||||||
# basicAuth is literally cleartext user/pw, so FORCE this to happen over SSL
|
|
||||||
forceSSL = true;
|
|
||||||
enableACME = true;
|
|
||||||
# inherit kTLS;
|
|
||||||
locations."/" = {
|
|
||||||
# proxyPass = "http://ovpns.uninsane.org:9091";
|
|
||||||
proxyPass = "http://10.0.1.6:9091";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
sane.services.trust-dns.zones."uninsane.org".inet.CNAME."bt" = "native";
|
|
||||||
}
|
}
|
||||||
|
|
25
machines/servo/users.nix
Normal file
25
machines/servo/users.nix
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
{ config, ... }:
|
||||||
|
|
||||||
|
# installer docs: https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/profiles/installation-device.nix
|
||||||
|
{
|
||||||
|
# automatically log in at the virtual consoles.
|
||||||
|
# using root here makes sure we always have an escape hatch
|
||||||
|
services.getty.autologinUser = "root";
|
||||||
|
|
||||||
|
# gitea doesn't create the git user
|
||||||
|
users.users.git = {
|
||||||
|
description = "Gitea Service";
|
||||||
|
home = "/var/lib/gitea";
|
||||||
|
useDefaultShell = true;
|
||||||
|
group = "gitea";
|
||||||
|
uid = config.sane.allocations.git-uid;
|
||||||
|
isSystemUser = true;
|
||||||
|
# sendmail access (not 100% sure if this is necessary)
|
||||||
|
extraGroups = [ "postdrop" ];
|
||||||
|
};
|
||||||
|
|
||||||
|
# this is required to allow pleroma to send email.
|
||||||
|
# raw `sendmail` works, but i think pleroma's passing it some funny flags or something, idk.
|
||||||
|
# hack to fix that.
|
||||||
|
users.users.pleroma.extraGroups = [ "postdrop" ];
|
||||||
|
}
|
@@ -1,12 +0,0 @@
|
|||||||
# this directory contains data of a factual nature.
|
|
||||||
# for example, public ssh keys, GPG keys, DNS-type name mappings.
|
|
||||||
#
|
|
||||||
# don't put things like fully-specific ~/.config files in here,
|
|
||||||
# even if they're "relatively unopinionated".
|
|
||||||
|
|
||||||
moduleArgs:
|
|
||||||
|
|
||||||
{
|
|
||||||
feeds = import ./feeds moduleArgs;
|
|
||||||
keys = import ./keys.nix;
|
|
||||||
}
|
|
@@ -1,51 +0,0 @@
|
|||||||
{ lib, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
inherit (builtins) concatLists concatStringsSep foldl' fromJSON map readDir readFile;
|
|
||||||
inherit (lib) hasSuffix listToAttrs mapAttrsToList removeSuffix splitString;
|
|
||||||
|
|
||||||
# given a path to a .json file relative to sources, construct the best feed object we can.
|
|
||||||
# the .json file could be empty, in which case we make assumptions about the feed based
|
|
||||||
# on its fs path.
|
|
||||||
# Type: feedFromSourcePath :: String -> { name = String; value = feed; }
|
|
||||||
feedFromSourcePath = json-path:
|
|
||||||
assert hasSuffix "/default.json" json-path;
|
|
||||||
let
|
|
||||||
canonical-name = removeSuffix "/default.json" json-path;
|
|
||||||
default-url = "https://${canonical-name}";
|
|
||||||
feed-details = { url = default-url; } // (tryImportJson (./sources/${json-path}));
|
|
||||||
in { name = canonical-name; value = mkFeed feed-details; };
|
|
||||||
|
|
||||||
# TODO: for now, feeds are just ordinary Attrs.
|
|
||||||
# in the future, we'd like to set them up with an update script.
|
|
||||||
mkFeed = { url, ... }@details: details;
|
|
||||||
|
|
||||||
# return an AttrSet representing the json at the provided path,
|
|
||||||
# or {} if the path is empty.
|
|
||||||
tryImportJson = path:
|
|
||||||
let
|
|
||||||
as-str = readFile path;
|
|
||||||
in
|
|
||||||
if as-str == "" then
|
|
||||||
{}
|
|
||||||
else
|
|
||||||
fromJSON as-str;
|
|
||||||
|
|
||||||
sources = enumerateFilePaths ./sources;
|
|
||||||
|
|
||||||
# like `lib.listFilesRecursive` but does not mangle paths.
|
|
||||||
# Type: enumerateFilePaths :: path -> [String]
|
|
||||||
enumerateFilePaths = base:
|
|
||||||
concatLists (
|
|
||||||
mapAttrsToList
|
|
||||||
(name: type:
|
|
||||||
if type == "directory" then
|
|
||||||
# enumerate this directory and then prefix each result with the directory's name
|
|
||||||
map (e: "${name}/${e}") (enumerateFilePaths (base + "/${name}"))
|
|
||||||
else
|
|
||||||
[ name ]
|
|
||||||
)
|
|
||||||
(readDir base)
|
|
||||||
);
|
|
||||||
in
|
|
||||||
listToAttrs (map feedFromSourcePath sources)
|
|
@@ -1,21 +0,0 @@
|
|||||||
{
|
|
||||||
"bozo": 0,
|
|
||||||
"content_length": 1369733,
|
|
||||||
"content_type": "application/rss+xml; charset=utf-8",
|
|
||||||
"description": "Every company has a story. Learn the playbooks that built the world’s greatest companies — and how you can apply them as a founder, operator, or investor.",
|
|
||||||
"favicon": null,
|
|
||||||
"hubs": [],
|
|
||||||
"is_podcast": true,
|
|
||||||
"is_push": false,
|
|
||||||
"item_count": 173,
|
|
||||||
"last_seen": "2023-01-11T15:26:37.515527+00:00",
|
|
||||||
"last_updated": "2022-12-19T07:22:28+00:00",
|
|
||||||
"score": 18,
|
|
||||||
"self_url": "https://acquired.libsyn.com/rss",
|
|
||||||
"site_name": null,
|
|
||||||
"site_url": null,
|
|
||||||
"title": "Acquired",
|
|
||||||
"url": "https://acquired.libsyn.com/rss",
|
|
||||||
"velocity": 0.066,
|
|
||||||
"version": "rss20"
|
|
||||||
}
|
|
@@ -1,21 +0,0 @@
|
|||||||
{
|
|
||||||
"bozo": 0,
|
|
||||||
"content_length": 1030773,
|
|
||||||
"content_type": "application/rss+xml; charset=utf-8",
|
|
||||||
"description": "Industry veterans, degenerate gamblers & besties Chamath Palihapitiya, Jason Calacanis, David Sacks & David Friedberg cover all things economic, tech, political, social & poker.",
|
|
||||||
"favicon": null,
|
|
||||||
"hubs": [],
|
|
||||||
"is_podcast": true,
|
|
||||||
"is_push": false,
|
|
||||||
"item_count": 124,
|
|
||||||
"last_seen": "2023-01-11T12:44:53.606606+00:00",
|
|
||||||
"last_updated": "2023-01-06T10:51:00+00:00",
|
|
||||||
"score": 18,
|
|
||||||
"self_url": "https://allinchamathjason.libsyn.com/rss",
|
|
||||||
"site_name": "All-In with Chamath, Jason, Sacks & Friedberg",
|
|
||||||
"site_url": "https://allinchamathjason.libsyn.com",
|
|
||||||
"title": "All-In with Chamath, Jason, Sacks & Friedberg",
|
|
||||||
"url": "https://allinchamathjason.libsyn.com/rss",
|
|
||||||
"velocity": 0.12,
|
|
||||||
"version": "rss20"
|
|
||||||
}
|
|
@@ -1,23 +0,0 @@
|
|||||||
{
|
|
||||||
"bozo": 0,
|
|
||||||
"content_length": 13316,
|
|
||||||
"content_type": "application/rss+xml; charset=utf-8",
|
|
||||||
"description": "A podcast around the idea of creating a Civilizational Bootstrapper, a set of tools and technology that can be used to replicate the foundations of civilization along with itself.",
|
|
||||||
"favicon": null,
|
|
||||||
"hubs": [
|
|
||||||
"https://pubsubhubbub.appspot.com/"
|
|
||||||
],
|
|
||||||
"is_podcast": true,
|
|
||||||
"is_push": true,
|
|
||||||
"item_count": 6,
|
|
||||||
"last_seen": "2023-01-11T16:11:01.720399+00:00",
|
|
||||||
"last_updated": "2022-04-13T19:37:17+00:00",
|
|
||||||
"score": 22,
|
|
||||||
"self_url": "https://anchor.fm/s/34c7232c/podcast/rss",
|
|
||||||
"site_name": "Anchor",
|
|
||||||
"site_url": "https://anchor.fm",
|
|
||||||
"title": "Civboot",
|
|
||||||
"url": "https://anchor.fm/s/34c7232c/podcast/rss",
|
|
||||||
"velocity": 0.009,
|
|
||||||
"version": "rss20"
|
|
||||||
}
|
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user