pepe is not using flakes

This commit is contained in:
Ingolf Wagner 2021-09-27 18:53:45 +02:00
parent d29a43028b
commit 147d51f694
No known key found for this signature in database
GPG key ID: 76BF5F1928B9618B
15 changed files with 42 additions and 30 deletions

View file

@ -38,11 +38,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1632418649, "lastModified": 1632639184,
"narHash": "sha256-4rZspkiQU7zbsuciRRMgoEPkAF/+FSv2jx/VIPxPVx4=", "narHash": "sha256-fRLxre+gPxIkjFVj17O68pyAWU1cxT20XFOiulIWzRw=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "056a3c1fae30d06d14b171b9023743c21a23ec1a", "rev": "fd8a7fd07da0f3fc0e27575891f45c2f88e5dd44",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -62,7 +62,7 @@
"secrets": { "secrets": {
"flake": false, "flake": false,
"locked": { "locked": {
"narHash": "sha256-8e+AsdSyD971rHFL2j2VFxCATO9Oj16Ix8YZIrffd68=", "narHash": "sha256-GsEG/ZN4MRC7j2EkXlDD5bnYTpEW26D3P/Lgz/XWV78=",
"path": "/home/palo/dev/secrets", "path": "/home/palo/dev/secrets",
"type": "path" "type": "path"
}, },

View file

@ -2,7 +2,7 @@
imports = [ imports = [
<system/server> ../../system/server
./hardware-configuration.nix ./hardware-configuration.nix
#./home-assistant.nix #./home-assistant.nix
@ -16,7 +16,7 @@
]; ];
nixpkgs.config.permittedInsecurePackages = [ "homeassistant-0.114.4" ]; sops.defaultSopsFile = ../../secrets/pepe.yaml;
networking.hostName = "pepe"; networking.hostName = "pepe";

View file

@ -39,9 +39,11 @@ in {
} }
]; ];
sops.secrets.ftp_password = { };
# create user # create user
users.users.ftp-upload = { users.users.ftp-upload = {
passwordFile = toString <secrets/ftp/password>; passwordFile = config.sops.secrets.ftp_password.path;
isNormalUser = true; isNormalUser = true;
}; };

View file

@ -1,11 +1,10 @@
# Do not modify this file! It was generated by nixos-generate-config # Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes # and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead. # to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, ... }: { modulesPath, config, lib, pkgs, ... }:
{ {
imports = [ imports = [ "${modulesPath}/installer/scan/not-detected.nix"
<nixpkgs/nixos/modules/installer/scan/not-detected.nix>
(let mediaUUID = "29ebe5ba-7599-4dd3-99a3-37b9bf8e4d61"; (let mediaUUID = "29ebe5ba-7599-4dd3-99a3-37b9bf8e4d61";
in { in {

View file

@ -17,12 +17,15 @@
#}; #};
}; };
sops.secrets.syncthing_cert = { };
sops.secrets.syncthing_key = { };
services.syncthing = { services.syncthing = {
enable = true; enable = true;
openDefaultPorts = true; openDefaultPorts = true;
declarative = { declarative = {
cert = toString <secrets/syncthing/cert.pem>; cert = toString config.sops.secrets.syncthing_cert.path;
key = toString <secrets/syncthing/key.pem>; key = toString config.sops.secrets.syncthing_key.path;
overrideFolders = true; overrideFolders = true;
folders = { folders = {

View file

@ -1,10 +1,10 @@
{ config, pkgs, lib, ... }: { { config, pkgs, lib, ... }: {
imports = [ imports = [
<system/proxy> ../../system/proxy
./hardware-configuration.nix ./hardware-configuration.nix
<system/server/packages.nix> ../../system/server/packages.nix
./nginx.nix ./nginx.nix
./tinc.nix ./tinc.nix
./codimd.nix ./codimd.nix

View file

@ -1,10 +1,11 @@
# Do not modify this file! It was generated by nixos-generate-config # Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes # and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead. # to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, ... }: { modulesPath, config, lib, pkgs, ... }:
{ {
imports = [ <nixpkgs/nixos/modules/profiles/qemu-guest.nix> ]; #imports = [ <nixpkgs/nixos/modules/profiles/qemu-guest.nix> ];
imports = [ "${modulesPath}/profiles/qemu-guest.nix" ];
boot.initrd.availableKernelModules = boot.initrd.availableKernelModules =
[ "ata_piix" "uhci_hcd" "virtio_pci" "sd_mod" "sr_mod" ]; [ "ata_piix" "uhci_hcd" "virtio_pci" "sd_mod" "sr_mod" ];

View file

@ -2,7 +2,7 @@
imports = [ imports = [
<system/desktop> ../../system/desktop
./hardware-configuration.nix ./hardware-configuration.nix
./packages.nix ./packages.nix

View file

@ -1,11 +1,11 @@
# Do not modify this file! It was generated by nixos-generate-config # Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes # and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead. # to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, ... }: { modulesPath, config, lib, pkgs, ... }:
{ {
imports = [ <nixpkgs/nixos/modules/installer/scan/not-detected.nix> ]; imports = [ "${modulesPath}/installer/scan/not-detected.nix" ];
boot.initrd.availableKernelModules = boot.initrd.availableKernelModules =
[ "ehci_pci" "ahci" "xhci_pci" "usb_storage" "sd_mod" "sdhci_pci" ]; [ "ehci_pci" "ahci" "xhci_pci" "usb_storage" "sd_mod" "sdhci_pci" ];

View file

@ -1,7 +1,7 @@
{ lib, config, pkgs, ... }: { { lib, config, pkgs, ... }: {
imports = [ imports = [
<system/server> ../../system/server
./hardware-configuration.nix ./hardware-configuration.nix
./gogs.nix ./gogs.nix

View file

@ -461,11 +461,11 @@
"nixpkgs": "nixpkgs_2" "nixpkgs": "nixpkgs_2"
}, },
"locked": { "locked": {
"lastModified": 1632485730, "lastModified": 1632602278,
"narHash": "sha256-+anQTUUHxdpjLnTWqk9TJhWRYMI+1F2iVZKCq8SH4hg=", "narHash": "sha256-BJNUsxR+YwqCXMojsCK1gOnoxkLdJx5zqSYL1VMxws8=",
"owner": "Mic92", "owner": "Mic92",
"repo": "sops-nix", "repo": "sops-nix",
"rev": "64235a958b9ceedf98a3212c13b0dea3a504598f", "rev": "38e9270b774e50263ae1771922d7e4ff7d543aed",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -36,6 +36,15 @@
sops-nix.nixosModules.sops sops-nix.nixosModules.sops
{ imports = [ "${krops-lib}" "${cluster-module}" "${backup-module}" ]; } { imports = [ "${krops-lib}" "${cluster-module}" "${backup-module}" ]; }
({ pkgs, ... }: { ({ pkgs, ... }: {
nix = {
# no channesl needed this way
nixPath = [ "nixpkgs=${pkgs.path}" ];
# make flakes available
package = pkgs.nixUnstable;
extraOptions = ''
experimental-features = nix-command flakes
'';
};
# defined overlays injected by the nixflake # defined overlays injected by the nixflake
nixpkgs.overlays = [ nixpkgs.overlays = [
(_self: _super: { (_self: _super: {

View file

@ -44,8 +44,6 @@
repo = "borg@${server}:./${myHostname}"; repo = "borg@${server}:./${myHostname}";
encryption = { encryption = {
mode = "repokey-blake2"; mode = "repokey-blake2";
# todo rename
# passCommand = "cat ${toString <secrets/backup/repo>}";
passCommand = passCommand =
"cat ${config.sops.secrets.backup_repository_passphrase.path}"; "cat ${config.sops.secrets.backup_repository_passphrase.path}";
}; };

View file

@ -1,10 +1,10 @@
{ config, lib, pkgs, ... }: { { config, lib, pkgs, ... }: {
imports = [ imports = [
<system/all> ../../system/all
<system/server/netdata.nix> ../../system/server/netdata.nix
<system/server/graylog-exporter.nix> ../../system/server/graylog-exporter.nix
<system/server/prometheus-exporters.nix> ../../system/server/prometheus-exporters.nix
]; ];
services.sshguard.enable = true; services.sshguard.enable = true;

View file

@ -1,7 +1,7 @@
{ config, lib, pkgs, ... }: { { config, lib, pkgs, ... }: {
imports = [ imports = [
<system/all> ../../system/all
./netdata.nix ./netdata.nix
./initssh.nix ./initssh.nix
./graylog-exporter.nix ./graylog-exporter.nix