reconfigure sternchen

This commit is contained in:
Ingolf Wagner 2023-08-14 03:29:02 +02:00
parent 0c756f7749
commit b8af70ffc7
Signed by: palo
GPG key ID: 76BF5F1928B9618B
8 changed files with 34 additions and 118 deletions

View file

@ -281,6 +281,15 @@
nixosConfigurations = nixosConfigurations =
{ {
sternchen = nixosConfigurationSetup {
name = "sternchen";
modules = [
nixos-hardware.nixosModules.lenovo-thinkpad-x220
#retiolum.nixosModules.retiolum
#private_assets.nixosModules.jobrad
homeManagerModules
];
};
sterni = nixosConfigurationSetup { sterni = nixosConfigurationSetup {
name = "sterni"; name = "sterni";
modules = [ modules = [

View file

@ -33,7 +33,7 @@ in
}; };
cream = { cream = {
subnets = [{ address = hosts.cream; }]; subnets = [{ address = hosts.cream; }];
settings.Ed25519PublicKey = ""; settings.Ed25519PublicKey = "Y/YRA90mAlNEmdhUWlUTHjjsco6d6hlvW11sPtarIdL";
}; };
sterni = { sterni = {
subnets = [{ address = hosts.sterni; }]; subnets = [{ address = hosts.sterni; }];
@ -65,6 +65,10 @@ in
networking.extraHosts = concatStringsSep "\n" (mapAttrsToList (name: ip: "${ip} ${name}.${network}") hosts); networking.extraHosts = concatStringsSep "\n" (mapAttrsToList (name: ip: "${ip} ${name}.${network}") hosts);
services.openssh.knownHosts = { services.openssh.knownHosts = {
"cream.${network}" = {
hostNames = [ "cream.${network}" hosts.cream ];
publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIConHiCL7INgAhuN6Z9TqP0zP+xNpdV7+OHwUca4IRDD";
};
"sternchen.${network}" = { "sternchen.${network}" = {
hostNames = [ "sterni.${network}" hosts.sterni ]; hostNames = [ "sterni.${network}" hosts.sterni ];
publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILriD/0+65L1mkbjKENwpvB3wUMXz/rEf9J8wuJjJa0q"; publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILriD/0+65L1mkbjKENwpvB3wUMXz/rEf9J8wuJjJa0q";

View file

@ -11,15 +11,19 @@
]; ];
home-manager.users.mainUser.home.git-pull.enable = false;
sops.defaultSopsFile = ../../secrets/sternchen.yaml; sops.defaultSopsFile = ../../secrets/sternchen.yaml;
networking.hostName = "sternchen"; networking.hostName = "sternchen";
components.gui.enable = true;
components.terminal.enable = true;
components.network.enable = true;
components.network.wifi.enable = true;
components.mainUser.enable = true;
users.users.mainUser.extraGroups = [ "adbusers" "video" ];
home-manager.users.mainUser.home.git-pull.enable = false;
system.custom.mainUser.userName = "tina"; system.custom.mainUser.userName = "tina";
system.custom.wifi.interfaces = [ "wlp3s0" ]; #system.custom.wifi.interfaces = [ "wlp3s0" ];
security.wrappers = { security.wrappers = {
pmount = { pmount = {
@ -37,7 +41,7 @@
}; };
programs.custom.steam.enable = false; programs.custom.steam.enable = false;
programs.custom.video.enable = true; programs.custom.video.enable = false;
# keyboard fiddling # keyboard fiddling
i18n.defaultLocale = "de_DE.UTF-8"; i18n.defaultLocale = "de_DE.UTF-8";
@ -45,7 +49,7 @@
services.xserver.layout = "de,us"; services.xserver.layout = "de,us";
system.custom.suspend.enable = false; system.custom.suspend.enable = false;
services.printing.enable = true; services.printing.enable = false;
# fonts # fonts
# ----- # -----
@ -62,13 +66,13 @@
# for congress and streaming # for congress and streaming
hardware.opengl = { hardware.opengl = {
enable = true; enable = true;
extraPackages = [ pkgs.vaapiIntel ]; #extraPackages = [ pkgs.vaapiIntel ];
driSupport = true; driSupport = true;
driSupport32Bit = true; driSupport32Bit = true;
}; };
nixpkgs.config.packageOverrides = pkgs: { #nixpkgs.config.packageOverrides = pkgs: {
vaapiIntel = pkgs.vaapiIntel.override { enableHybridCodec = true; }; # vaapiIntel = pkgs.vaapiIntel.override { enableHybridCodec = true; };
}; #};
services.xserver.displayManager.defaultSession = "plasma"; services.xserver.displayManager.defaultSession = "plasma";
@ -76,7 +80,6 @@
services.xserver.desktopManager.xfce.enable = false; services.xserver.desktopManager.xfce.enable = false;
services.xserver.desktopManager.gnome.enable = false; services.xserver.desktopManager.gnome.enable = false;
services.xserver.desktopManager.cinnamon.enable = true; services.xserver.desktopManager.cinnamon.enable = true;
services.xserver.desktopManager.lxqt.enable = true; services.xserver.desktopManager.lxqt.enable = true;
services.xserver.desktopManager.mate.enable = true; services.xserver.desktopManager.mate.enable = true;
@ -93,13 +96,8 @@
}; };
}; };
# enable this to use sidequest
programs.adb.enable = false;
users.users.mainUser.extraGroups = [ "adbusers" "video" ];
virtualisation = { virtualisation = {
docker.enable = false; docker.enable = false;
virtualbox = { virtualbox = {
host.enable = false; host.enable = false;
guest.x11 = false; guest.x11 = false;

View file

@ -40,6 +40,8 @@
#synfigstudio #synfigstudio
valentina valentina
vscode
# kde programs # kde programs
okular okular
ark ark

View file

@ -1,18 +1,7 @@
{ config, lib, pkgs, ... }: { config, ... }:
with lib;
{ {
module.cluster.services.tinc = { tinc.secret.enable = true;
"secret" = { tinc.secret.ipv4 = "10.123.42.25";
enable = true;
openPort = true;
connectTo = [ "robi" ];
};
};
users.users."tinc.secret".group = "tinc.secret";
users.groups."tinc.secret" = { };
} }

View file

@ -1,85 +0,0 @@
{ lib, pkgs, ... }:
let
wifi = "wlp0s29u1u2";
ipAddress = "10.123.145.1";
prefixLength = 24;
servedAddressRange = "10.123.145.2,10.123.145.150,12h";
ssid = "bumbumbum";
wifiPassword = lib.fileContents <secrets/wifi-access-point>;
in
{
# todo only open needed ports
networking.firewall.trustedInterfaces = [ wifi ];
networking.networkmanager.unmanaged = [ wifi ];
networking.dhcpcd.denyInterfaces = [ wifi ];
networking.interfaces."${wifi}".ipv4.addresses = [{
address = ipAddress;
prefixLength = prefixLength;
}];
# forward traffic coming in trough the access point => provide internet and vpn network access
# todo : forward to own servers
boot.kernel.sysctl = {
"net.ipv4.conf.${wifi}.forwarding" = true;
"net.ipv6.conf.${wifi}.forwarding" = true;
};
systemd.services.hostapd = {
description = "hostapd wireless AP";
path = [ pkgs.hostapd ];
# start manual
# wantedBy = [ "network.target" ];
after = [
"${wifi}-cfg.service"
"nat.service"
"bind.service"
"dhcpd.service"
"sys-subsystem-net-devices-${wifi}.device"
];
serviceConfig = {
ExecStart = "${pkgs.hostapd}/bin/hostapd ${
pkgs.writeText "hostapd.conf" ''
interface=${wifi}
hw_mode=g
channel=10
ieee80211d=1
country_code=DE
ieee80211n=1
wmm_enabled=1
ssid=${ssid}
auth_algs=1
wpa=2
wpa_key_mgmt=WPA-PSK
rsn_pairwise=CCMP
wpa_passphrase=${wifiPassword}
''
}";
Restart = "always";
};
};
services.dnsmasq = {
enable = true;
extraConfig = ''
# Only listen to routers' LAN NIC. Doing so opens up tcp/udp port 53 to
# localhost and udp port 67 to world:
interface=${wifi}
# Explicitly specify the address to listen on
listen-address=${ipAddress}
# Dynamic range of IPs to make available to LAN PC and the lease time.
# Ideally set the lease time to 5m only at first to test everything works okay before you set long-lasting records.
dhcp-range=${servedAddressRange}
'';
};
}

View file

@ -26,7 +26,6 @@
components.mainUser.enable = true; components.mainUser.enable = true;
users.users.mainUser.extraGroups = [ "adbusers" "video" ]; users.users.mainUser.extraGroups = [ "adbusers" "video" ];
# todo
programs.custom.steam.enable = false; programs.custom.steam.enable = false;
programs.custom.video.enable = false; programs.custom.video.enable = false;
services.printing.enable = false; services.printing.enable = false;
@ -86,7 +85,7 @@
}; };
# enable this to use sidequest # enable this to use sidequest
programs.adb.enable = true; # programs.adb.enable = false;
# for congress and streaming # for congress and streaming
hardware.opengl = { hardware.opengl = {