fix taskwarrior-pushover problems
This commit is contained in:
parent
3c1a5938ad
commit
e752805f52
15 changed files with 130 additions and 113 deletions
|
@ -68,12 +68,12 @@
|
|||
"rev": "16bbe8a0157d5aa669b2572cda7186a2f108e676",
|
||||
"revCount": 27,
|
||||
"type": "git",
|
||||
"url": "ssh://gitlab@gitlab.ingolf-wagner.de/palo/nixos-secrets"
|
||||
"url": "ssh://gitea@git.ingolf-wagner.de/palo/nixos-secrets.git"
|
||||
},
|
||||
"original": {
|
||||
"ref": "main",
|
||||
"type": "git",
|
||||
"url": "ssh://gitlab@gitlab.ingolf-wagner.de/palo/nixos-secrets"
|
||||
"url": "ssh://gitea@git.ingolf-wagner.de/palo/nixos-secrets.git"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
|
||||
inputs = {
|
||||
secrets = {
|
||||
url = "git+ssh://gitlab@gitlab.ingolf-wagner.de/palo/nixos-secrets?ref=main";
|
||||
url = "git+ssh://gitea@git.ingolf-wagner.de/palo/nixos-secrets.git?ref=main";
|
||||
flake = false;
|
||||
};
|
||||
nixpkgs.url = "github:nixos/nixpkgs/nixos-21.05";
|
||||
|
|
|
@ -51,9 +51,9 @@
|
|||
# nix-shell -p speedtest_cli --run speedtest
|
||||
configuration.fireqos = {
|
||||
enable = true;
|
||||
interface = "wlp3s0";
|
||||
input = 80000;
|
||||
output = 2500;
|
||||
interface = "enp0s25";
|
||||
input = 200000;
|
||||
output = 2000;
|
||||
balance = false;
|
||||
};
|
||||
|
||||
|
|
|
@ -19,7 +19,10 @@
|
|||
|
||||
users.users."spotifyd" = {
|
||||
isSystemUser = true;
|
||||
group = "spotifyd";
|
||||
};
|
||||
users.groups.spotifyd = { };
|
||||
|
||||
|
||||
sops.secrets.spotify_pass = {
|
||||
owner = "spotifyd";
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
custom.samba-share = {
|
||||
enable = true;
|
||||
folders = {
|
||||
movies = config.services.syncthing.declarative.folders.movies.path;
|
||||
music = config.services.syncthing.declarative.folders.music-library.path;
|
||||
samples = config.services.syncthing.declarative.folders.samples.path;
|
||||
series = config.services.syncthing.declarative.folders.series.path;
|
||||
movies = config.services.syncthing.folders.movies.path;
|
||||
music = config.services.syncthing.folders.music-library.path;
|
||||
samples = config.services.syncthing.folders.samples.path;
|
||||
series = config.services.syncthing.folders.series.path;
|
||||
series2 = "/media/series";
|
||||
books = config.services.syncthing.declarative.folders.books.path;
|
||||
books = config.services.syncthing.folders.books.path;
|
||||
};
|
||||
#private.test = {
|
||||
# folder = ;
|
||||
|
@ -24,7 +24,6 @@
|
|||
services.syncthing = {
|
||||
enable = true;
|
||||
openDefaultPorts = true;
|
||||
declarative = {
|
||||
cert = toString config.sops.secrets.syncthing_cert.path;
|
||||
key = toString config.sops.secrets.syncthing_key.path;
|
||||
|
||||
|
@ -118,7 +117,6 @@
|
|||
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
system.permown."/home/syncthing" = {
|
||||
owner = "syncthing";
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
{
|
||||
users.users."taskwarrior-pushover".isSystemUser = true;
|
||||
|
||||
sops.secrets.pushoverApiToken.owner = "taskwarrior-pushover";
|
||||
sops.secrets.pushoverUserKey.owner = "taskwarrior-pushover";
|
||||
|
|
|
@ -18,4 +18,6 @@ with lib;
|
|||
sops.secrets.tinc_retiolum_ed25519_key = { };
|
||||
sops.secrets.tinc_retiolum_rsa_key = { };
|
||||
|
||||
users.users."tinc.retiolum".group = "tinc.retiolum";
|
||||
users.groups."tinc.retiolum" = { };
|
||||
}
|
||||
|
|
|
@ -1,6 +1,7 @@
|
|||
{ config, pkgs, lib, ... }: {
|
||||
services.bitwarden_rs = {
|
||||
services.vaultwarden = {
|
||||
enable = true;
|
||||
# backupDir =
|
||||
config = {
|
||||
domain = "https://bitwarden.ingolf-wagner.de";
|
||||
signupsAllowed = false;
|
||||
|
|
|
@ -30,4 +30,6 @@
|
|||
};
|
||||
|
||||
#backup.dirs = [ config.services.gogs.repositoryRoot ];
|
||||
};
|
||||
|
||||
}
|
||||
|
|
|
@ -20,9 +20,6 @@
|
|||
|
||||
system.custom.wifi.interfaces = [ "wlp3s0" ];
|
||||
|
||||
sops.secrets.tinc_retiolum_ed25519_key = { };
|
||||
sops.secrets.tinc_retiolum_rsa_key = { };
|
||||
|
||||
security.wrappers = {
|
||||
pmount = {
|
||||
source = "${pkgs.pmount}/bin/pmount";
|
||||
|
|
|
@ -20,8 +20,13 @@ with lib;
|
|||
connectTo = [ "sputnik" ];
|
||||
};
|
||||
};
|
||||
|
||||
sops.secrets.tinc_retiolum_ed25519_key = { };
|
||||
sops.secrets.tinc_retiolum_rsa_key = { };
|
||||
|
||||
users.users."tinc.retiolum".group = "tinc.retiolum";
|
||||
users.groups."tinc.retiolum" = { };
|
||||
|
||||
users.users."tinc.secret".group = "tinc.secret";
|
||||
users.groups."tinc.secret" = { };
|
||||
|
||||
|
|
|
@ -95,7 +95,9 @@ in
|
|||
description = "smb guest user";
|
||||
home = "/home/smbguest";
|
||||
createHome = true;
|
||||
group = "smbguest";
|
||||
};
|
||||
users.groups.smbguest = { };
|
||||
|
||||
})
|
||||
# todo : maybe better to have a parameter for this
|
||||
|
|
|
@ -49,19 +49,27 @@ in
|
|||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
|
||||
users.users.${name} = {
|
||||
isSystemUser = true;
|
||||
home = "/var/lib/${name}";
|
||||
group = name;
|
||||
};
|
||||
users.groups.${name} = { };
|
||||
|
||||
systemd.services.taskwarrior-pushover = {
|
||||
enable = true;
|
||||
serviceConfig = {
|
||||
DynamicUser = true;
|
||||
User = name;
|
||||
StateDirectory = name;
|
||||
};
|
||||
script =
|
||||
let
|
||||
taskwarriorCommand = pkgs.writers.writeDash "taskwarrior-push" ''
|
||||
${pkgs.taskwarrior}/bin/task \
|
||||
rc.recurrence=${cfg.recurrence} \
|
||||
rc:/var/lib/${name}/.taskrc \
|
||||
rc.data.location=/var/lib/${name}/${cfg.dataDir} \
|
||||
rc.recurrence=${cfg.recurrence} \
|
||||
rc.taskd.ca=${cfg.caFile} \
|
||||
rc.taskd.certificate=${cfg.certificateFile} \
|
||||
rc.taskd.credentials="${cfg.credentials}" \
|
||||
|
@ -73,7 +81,7 @@ in
|
|||
''
|
||||
if [ -d /var/lib/${name}/${cfg.dataDir} ]
|
||||
then
|
||||
echo "synchronize {cfg.dataDir}"
|
||||
echo "synchronize ${cfg.dataDir}"
|
||||
${taskwarriorCommand} sync
|
||||
else
|
||||
echo "initialize ${cfg.dataDir}"
|
||||
|
|
|
@ -10,8 +10,8 @@ with lib; {
|
|||
"${name}" = {
|
||||
name = name;
|
||||
id = id;
|
||||
addresses =
|
||||
[ "tcp://${name}.private:22000" ];
|
||||
#addresses =
|
||||
# [ "tcp://${name}.private:22000" ];
|
||||
};
|
||||
};
|
||||
in
|
||||
|
|
|
@ -23,7 +23,7 @@ in
|
|||
};
|
||||
|
||||
port = mkOption {
|
||||
default = 22;
|
||||
default = 2222;
|
||||
type = with types; int;
|
||||
};
|
||||
|
||||
|
|
Loading…
Reference in a new issue