about summary refs log tree commit diff
path: root/machines/profpatsch/legosi.nix
Commit message (Collapse)AuthorAgeFilesLines
* machines/legosi: disable syncthing for nowProfpatsch2022-11-011-18/+18
|
* machines/legosi: move to openssl 1.1 in nginx for nowProfpatsch2022-11-011-0/+3
| | | | | CVE patch is out already, but let’s wait until upstream has all the patches.
* machines/profpatsch: disable ipv6 on all serversProfpatsch2022-11-011-8/+8
|
* machines + modules: Fix Nix option definitionsaszlig2022-08-151-5/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Most of the options in nix.conf are now exposed as a submodule with a freeform type and since that change[1] got introduced, we get a bunch of warnings during machine evaluation: trace: warning: The option `nix.useSandbox' defined in `...' has been renamed to `nix.settings.sandbox'. trace: warning: The option `nix.maxJobs' defined in `...' has been renamed to `nix.settings.max-jobs'. trace: warning: The option `nix.buildCores' defined in `...' has been renamed to `nix.settings.cores'. To shut them up, I went through all machines and modules and renamed the remaining options that were not renamed back then when @devhell did some renames in a0297bf921399c3243dcca99626d8697f0735abe. This was done by looking through the output of: $ git grep -A 10 '\<nix\(\.\| *=\)' machines modules After that I tested the contents of the nix.conf of all the machines against the changes this commit introduced via the following command: $ nix-build --no-out-link -E ' with import <nixpkgs/lib>; map (m: m.eval.config.environment.etc."nix/nix.conf".source) (collect (m: m ? eval) (import ./machines)) ' I've sorted the resulting nix.conf files and diffed on that result and the only difference that showed up was the following: allowed-users = * -auto-optimise-store = false auto-optimise-store = true builders-use-substitutes = true cores = 0 This is because the previous way to generate the config was by concatenating strings whereas the new way works on an attribute set, so we get deduplication by design. [1]: https://github.com/NixOS/nixpkgs/pull/139075 Signed-off-by: aszlig <aszlig@nix.build> Cc: @devhell Cc: @Profpatsch Cc: @sternenseemann
* machines/legosi: disable duplicityProfpatsch2022-06-261-39/+38
| | | | | | Apparently one of its python dependencies went EOL and everything went to fuck because python is a crapfest and nixpkgs policies around it are stupid. yay.
* machines/legosi: Add notes and projects server to websiteProfpatsch2022-06-261-0/+30
| | | | | This is not pretty, some of the code lives in vuizvui, some lives in tvl depot. But at least it seems to work for now :)
* machines/legosi: some duplicity changesProfpatsch2022-06-261-1/+2
| | | | though the backup service is broken on the machine anyway, idk
* machines/legosi: fix renamed acme email option nameProfpatsch2022-06-261-1/+1
|
* machines/legosi: explicitely only expose xandikos over tailscaleProfpatsch2022-06-261-3/+11
|
* machines/legosi: add weechat-qwerkyProfpatsch2022-06-261-15/+22
| | | | | Changes the weechat setup so that I can have multiple instances, each gets their own unix user & separate weechat instance.
* machines/legosi: fix deprecated syncthing module structureProfpatsch2022-06-261-13/+11
|
* machines/profpatsch: use unfreeAndNonDistributablePkgs for convertProfpatsch2021-04-231-1/+1
|
* machines/profpatsch: remove wireguard from extraModulePackagessternenseemann2021-04-131-2/+0
| | | | | | | | Starting with Kernel 5.6 adding this package is no longer necessary. Since the kernelPackages.wireguard attribute returns `null` for that version, evaluation fails. cc @Profpatsch
* machines/legosi: add --name to duplicity invocationProfpatsch2021-03-051-0/+1
|
* services/profpatsch/weechat: start factoring out some optionsProfpatsch2021-03-051-1/+4
| | | | | | The goal is to be able to have multiple weechat services on one machine, so a bunch of people can run their weechat clients under different service users.
* machines/legosi: enable xandikos caldav/carddav serverProfpatsch2021-03-051-0/+17
|
* machines/{shiki,legosi}: enable tailscale moduleProfpatsch2021-03-051-0/+2
|
* modules/user/profpatsch: adjust naming schemesternenseemann2021-02-131-3/+3
| | | | | | | | | | | | | | | The general consensus seems to be to use vuizvui.user.<username>.<category>.<module name> instead of vuizvui.<category>.<user name>.<module name> Things done to test this change: * Checked build of machines.profpatsch.legosi.build * Checked evaluation of machines.profpatsch.shiki.build
* feat(machines/legosi): initial duplicity setupProfpatsch2021-02-131-0/+44
| | | | | This should backup every service in `/var/lib` and anything I add in the future that I might have missed.
* fix(machines/legosi): set nix path to latest nixpkgs unstableProfpatsch2021-02-131-6/+2
| | | | | | | | | | Previously I had actually rebuilt the system locally, but since I use the deploy script, I don’t need to have a full up-to-date nixpkgs checkout, and only copy over the system closure. Thus, set the path to only contain nixpkgs, and only a link to the latest github unstable tarball in case I really need it e.g. for a nix shell.
* machines/legosi: use gzip and optimization for nginxProfpatsch2020-09-161-0/+2
|
* machines/legosi: activate syncthing & connect mushuProfpatsch2020-08-201-0/+21
|
* machines/legosi: set min-free to 3G and optimize storeProfpatsch2020-08-201-8/+16
|
* machines/legosi: add v6 addressProfpatsch2020-06-291-0/+12
|
* machines/legosi: open firewall for http(s)Profpatsch2020-06-291-0/+7
|
* machines/profpatsch/legosi: serve the static website from nginxProfpatsch2020-06-291-11/+14
|
* machines/legosi: finish comment …Profpatsch2020-06-191-1/+1
|
* machines/legosi: wrapExecStart weechat with ip2unix for bitlbeeProfpatsch2020-06-191-0/+20
|
* machines/legosi: fix nixPath even betterProfpatsch2020-06-191-1/+1
|
* machines/legosi: fix nixPathProfpatsch2020-06-191-0/+1
|
* modules/user/profpatsch/services: add bitlbeeProfpatsch2020-06-191-11/+3
| | | | Also add the service to legosi so I can use it from the weechat user.
* machines/legosi: open bitlebee authMode for nowProfpatsch2020-06-191-2/+4
|
* machines/legosi: enable bitlbee serviceProfpatsch2020-06-191-1/+13
| | | | No libpurple for just XMPP, phew.
* machines/legosi: replace weechat package by moduleProfpatsch2020-06-151-3/+5
|
* machines/legosi: add weechatProfpatsch2020-06-151-0/+4
|
* legosi: Use modulesPath instead of <nixpkgs/nixos>aszlig2020-06-141-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | While it's fine to use <nixpkgs> on most systems, we deliberately want to avoid the use of <nixpkgs> to make sure that whenever we for example run <nixpkgs/nixos/lib/eval-config.nix> with a custom "pkgs" argument we are guaranteed that we get the version we specify. So this is one of the reason I used <nixpkgsSrc> on Hydra instead of <nixpkgs>, so that whenever we have such occasions where we can't guarantee such things, the evaluation will fail. And right now, it does: in job 'machines.profpatsch.legosi': file 'nixpkgs/nixos/modules/profiles/qemu-guest.nix' was not found in the Nix search path (add it using $NIX_PATH or -I), at .../machines/profpatsch/legosi.nix:12:5 Fortunately, there is modulesPath, which refers to <nixpkgs/nixos/modules> of the nixpkgs version passed via "pkgs". Signed-off-by: aszlig <aszlig@nix.build> Cc: @Profpatsch
* machines/profpatsch: add legosiProfpatsch2020-06-121-0/+46
Small Hetzner qemu virtual server.