fix taskwarrior-pushover problems

This commit is contained in:
Ingolf Wagner 2022-01-15 09:32:59 +01:00
parent 3c1a5938ad
commit e752805f52
No known key found for this signature in database
GPG key ID: 76BF5F1928B9618B
15 changed files with 130 additions and 113 deletions

View file

@ -68,12 +68,12 @@
"rev": "16bbe8a0157d5aa669b2572cda7186a2f108e676",
"revCount": 27,
"type": "git",
"url": "ssh://gitlab@gitlab.ingolf-wagner.de/palo/nixos-secrets"
"url": "ssh://gitea@git.ingolf-wagner.de/palo/nixos-secrets.git"
},
"original": {
"ref": "main",
"type": "git",
"url": "ssh://gitlab@gitlab.ingolf-wagner.de/palo/nixos-secrets"
"url": "ssh://gitea@git.ingolf-wagner.de/palo/nixos-secrets.git"
}
}
},

View file

@ -4,7 +4,7 @@
inputs = {
secrets = {
url = "git+ssh://gitlab@gitlab.ingolf-wagner.de/palo/nixos-secrets?ref=main";
url = "git+ssh://gitea@git.ingolf-wagner.de/palo/nixos-secrets.git?ref=main";
flake = false;
};
nixpkgs.url = "github:nixos/nixpkgs/nixos-21.05";

View file

@ -51,9 +51,9 @@
# nix-shell -p speedtest_cli --run speedtest
configuration.fireqos = {
enable = true;
interface = "wlp3s0";
input = 80000;
output = 2500;
interface = "enp0s25";
input = 200000;
output = 2000;
balance = false;
};

View file

@ -19,7 +19,10 @@
users.users."spotifyd" = {
isSystemUser = true;
group = "spotifyd";
};
users.groups.spotifyd = { };
sops.secrets.spotify_pass = {
owner = "spotifyd";

View file

@ -5,12 +5,12 @@
custom.samba-share = {
enable = true;
folders = {
movies = config.services.syncthing.declarative.folders.movies.path;
music = config.services.syncthing.declarative.folders.music-library.path;
samples = config.services.syncthing.declarative.folders.samples.path;
series = config.services.syncthing.declarative.folders.series.path;
movies = config.services.syncthing.folders.movies.path;
music = config.services.syncthing.folders.music-library.path;
samples = config.services.syncthing.folders.samples.path;
series = config.services.syncthing.folders.series.path;
series2 = "/media/series";
books = config.services.syncthing.declarative.folders.books.path;
books = config.services.syncthing.folders.books.path;
};
#private.test = {
# folder = ;
@ -24,7 +24,6 @@
services.syncthing = {
enable = true;
openDefaultPorts = true;
declarative = {
cert = toString config.sops.secrets.syncthing_cert.path;
key = toString config.sops.secrets.syncthing_key.path;
@ -118,7 +117,6 @@
};
};
};
system.permown."/home/syncthing" = {
owner = "syncthing";

View file

@ -1,7 +1,6 @@
{ config, lib, pkgs, ... }:
{
users.users."taskwarrior-pushover".isSystemUser = true;
sops.secrets.pushoverApiToken.owner = "taskwarrior-pushover";
sops.secrets.pushoverUserKey.owner = "taskwarrior-pushover";

View file

@ -18,4 +18,6 @@ with lib;
sops.secrets.tinc_retiolum_ed25519_key = { };
sops.secrets.tinc_retiolum_rsa_key = { };
users.users."tinc.retiolum".group = "tinc.retiolum";
users.groups."tinc.retiolum" = { };
}

View file

@ -1,6 +1,7 @@
{ config, pkgs, lib, ... }: {
services.bitwarden_rs = {
services.vaultwarden = {
enable = true;
# backupDir =
config = {
domain = "https://bitwarden.ingolf-wagner.de";
signupsAllowed = false;

View file

@ -30,4 +30,6 @@
};
#backup.dirs = [ config.services.gogs.repositoryRoot ];
};
}

View file

@ -20,9 +20,6 @@
system.custom.wifi.interfaces = [ "wlp3s0" ];
sops.secrets.tinc_retiolum_ed25519_key = { };
sops.secrets.tinc_retiolum_rsa_key = { };
security.wrappers = {
pmount = {
source = "${pkgs.pmount}/bin/pmount";

View file

@ -20,8 +20,13 @@ with lib;
connectTo = [ "sputnik" ];
};
};
sops.secrets.tinc_retiolum_ed25519_key = { };
sops.secrets.tinc_retiolum_rsa_key = { };
users.users."tinc.retiolum".group = "tinc.retiolum";
users.groups."tinc.retiolum" = { };
users.users."tinc.secret".group = "tinc.secret";
users.groups."tinc.secret" = { };

View file

@ -95,7 +95,9 @@ in
description = "smb guest user";
home = "/home/smbguest";
createHome = true;
group = "smbguest";
};
users.groups.smbguest = { };
})
# todo : maybe better to have a parameter for this

View file

@ -49,19 +49,27 @@ in
};
config = mkIf cfg.enable {
users.users.${name} = {
isSystemUser = true;
home = "/var/lib/${name}";
group = name;
};
users.groups.${name} = { };
systemd.services.taskwarrior-pushover = {
enable = true;
serviceConfig = {
DynamicUser = true;
User = name;
StateDirectory = name;
};
script =
let
taskwarriorCommand = pkgs.writers.writeDash "taskwarrior-push" ''
${pkgs.taskwarrior}/bin/task \
rc.recurrence=${cfg.recurrence} \
rc:/var/lib/${name}/.taskrc \
rc.data.location=/var/lib/${name}/${cfg.dataDir} \
rc.recurrence=${cfg.recurrence} \
rc.taskd.ca=${cfg.caFile} \
rc.taskd.certificate=${cfg.certificateFile} \
rc.taskd.credentials="${cfg.credentials}" \
@ -73,7 +81,7 @@ in
''
if [ -d /var/lib/${name}/${cfg.dataDir} ]
then
echo "synchronize {cfg.dataDir}"
echo "synchronize ${cfg.dataDir}"
${taskwarriorCommand} sync
else
echo "initialize ${cfg.dataDir}"

View file

@ -10,8 +10,8 @@ with lib; {
"${name}" = {
name = name;
id = id;
addresses =
[ "tcp://${name}.private:22000" ];
#addresses =
# [ "tcp://${name}.private:22000" ];
};
};
in

View file

@ -23,7 +23,7 @@ in
};
port = mkOption {
default = 22;
default = 2222;
type = with types; int;
};