diff --git a/flake.lock b/flake.lock index f585606..060187c 100644 --- a/flake.lock +++ b/flake.lock @@ -1165,21 +1165,6 @@ "url": "ssh://forgejo@git.ingolf-wagner.de:2222/palo/nixos-private-parts.git" } }, - "retiolum": { - "locked": { - "lastModified": 1737987273, - "narHash": "sha256-WQCLoDbthUO5PcdYDBxZZQgpQbEXab50EcwChkukxN4=", - "owner": "Mic92", - "repo": "retiolum", - "rev": "514fe96610f745435b89355822691b1961dc4857", - "type": "github" - }, - "original": { - "owner": "Mic92", - "repo": "retiolum", - "type": "github" - } - }, "root": { "inputs": { "clan-core": "clan-core", @@ -1198,7 +1183,6 @@ "permown": "permown", "polygon-art": "polygon-art", "private-parts": "private-parts", - "retiolum": "retiolum", "share-http": "share-http", "srvos": "srvos", "stylix": "stylix", diff --git a/flake.nix b/flake.nix index 6544df5..9d7d3b3 100644 --- a/flake.nix +++ b/flake.nix @@ -30,7 +30,6 @@ private-parts.inputs.nixpkgs.follows = "nixpkgs"; # only private input private-parts.url = "git+ssh://forgejo@git.ingolf-wagner.de:2222/palo/nixos-private-parts.git?ref=main"; #private-parts.url = "git+file:///home/palo/dev/nixos/nixos-private-parts"; - retiolum.url = "github:Mic92/retiolum"; share-http.inputs.nixpkgs.follows = "nixpkgs"; # only private input share-http.url = "git+ssh://forgejo@git.ingolf-wagner.de:2222/palo/share-host.git?ref=main"; srvos.url = "github:nix-community/srvos"; @@ -72,7 +71,6 @@ permown, polygon-art, private-parts, - retiolum, self, share-http, srvos, @@ -275,7 +273,6 @@ # inputs.stylix.nixosModules.stylix # fixme: not working permown.nixosModules.permown home-manager.nixosModules.home-manager - # retiolum.nixosModules.retiolum # fixme: not working ]; boot.loader.systemd-boot.configurationLimit = lib.mkDefault 10; @@ -413,7 +410,6 @@ healthchecks.nixosModules.default zerotierModules nixos-hardware.nixosModules.framework-13th-gen-intel - retiolum.nixosModules.retiolum private-parts.nixosModules.cherry homeManagerModules stylixModules @@ -446,7 +442,6 @@ zerotierControllerModule homeManagerModules stylixModules - retiolum.nixosModules.retiolum private-parts.nixosModules.chungus { home-manager.users.mainUser = import ./homes/palo; diff --git a/machines/cherry/configuration.nix b/machines/cherry/configuration.nix index 7c432da..5dba8f9 100644 --- a/machines/cherry/configuration.nix +++ b/machines/cherry/configuration.nix @@ -13,7 +13,6 @@ ./syncthing.nix ./network-tinc.nix - ./network-tinc_retiolum.nix ./network-wireguard-wg0.nix ./network-wireguard-wg1.nix diff --git a/machines/cherry/network-tinc_retiolum.nix b/machines/cherry/network-tinc_retiolum.nix deleted file mode 100644 index 1006e81..0000000 --- a/machines/cherry/network-tinc_retiolum.nix +++ /dev/null @@ -1,38 +0,0 @@ -{ - config, - factsGenerator, - pkgs, - ... -}: -{ - - clan.core.facts.services.tinc_retiolum = factsGenerator.tinc { name = "retiolum"; }; - - networking.retiolum.port = 720; - networking.retiolum.nodename = "cherry"; - - healthchecks.localCommands.ping-retiolum = pkgs.writers.writeBash "ping-retiolum" '' - ping -c 1 -W 5 ${config.networking.retiolum.nodename}.r - ''; - - services.tinc.networks.retiolum = { - ed25519PrivateKeyFile = - config.clan.core.facts.services.tinc_retiolum.secret."tinc.retiolum.ed25519_key.priv".path; - rsaPrivateKeyFile = - config.clan.core.facts.services.tinc_retiolum.secret."tinc.retiolum.rsa_key.priv".path; - }; - - #fileSystems."/retiolum/sicily" = { - # device = "//sicily.r/tonne"; - # fsType = "cifs"; - # options = [ - # "guest" - # "nofail" - # "noauto" - # "ro" - # "rsize=16777216" - # "cache=loose" - # "x-systemd.after=network.target" - # ]; - #}; -} diff --git a/machines/chungus/configuration.nix b/machines/chungus/configuration.nix index 4634521..e0b9012 100644 --- a/machines/chungus/configuration.nix +++ b/machines/chungus/configuration.nix @@ -15,7 +15,6 @@ ./packages.nix - ./network-tinc-retiolum.nix # make sure no service is open for this vpn! ./network-tinc.nix ./network-wireguard.nix @@ -77,7 +76,6 @@ networking.firewall.interfaces.wg0.allowedUDPPorts = [ 4317 ]; healthchecks.closed.wg0.host = "10.100.0.2"; - healthchecks.closed.retiolum.host = "centauri.r"; services.printing.enable = false; diff --git a/machines/chungus/hass-mqtt.nix b/machines/chungus/hass-mqtt.nix index db16169..c82e0ee 100644 --- a/machines/chungus/hass-mqtt.nix +++ b/machines/chungus/hass-mqtt.nix @@ -16,5 +16,4 @@ networking.firewall.interfaces.enp0s31f6.allowedTCPPorts = [ 1883 ]; networking.firewall.interfaces.wg0.allowedTCPPorts = [ 1883 ]; - healthchecks.closed.retiolum.ports.mqtt = [ 1883 ]; } diff --git a/machines/chungus/hass-zigbee2mqtt.nix b/machines/chungus/hass-zigbee2mqtt.nix index 964dcaf..f47d73e 100644 --- a/machines/chungus/hass-zigbee2mqtt.nix +++ b/machines/chungus/hass-zigbee2mqtt.nix @@ -8,11 +8,6 @@ { imports = [ ./hass-mqtt.nix ]; - healthchecks.closed.retiolum.ports.zigbee2mqtt = [ - 1337 - 9666 - ]; - services.zigbee2mqtt = { enable = true; dataDir = "/srv2/zigbee2mqtt"; diff --git a/machines/chungus/hass.nix b/machines/chungus/hass.nix index a59b3e9..868b969 100644 --- a/machines/chungus/hass.nix +++ b/machines/chungus/hass.nix @@ -18,6 +18,4 @@ networking.firewall.interfaces.wg0.allowedTCPPorts = [ 8123 ]; networking.firewall.interfaces.wg0.allowedUDPPorts = [ 8123 ]; - healthchecks.closed.retiolum.ports.hass = [ 8123 ]; - } diff --git a/machines/chungus/media-audiobookshelf.nix b/machines/chungus/media-audiobookshelf.nix index 07af2be..e1505c3 100644 --- a/machines/chungus/media-audiobookshelf.nix +++ b/machines/chungus/media-audiobookshelf.nix @@ -15,10 +15,6 @@ in group = group; }; - # make available in retiolum - #networking.firewall.interfaces."tinc.retiolum".allowedTCPPorts = [ port ]; - #networking.firewall.interfaces."tinc.retiolum".allowedUDPPorts = [ port ]; - networking.firewall.interfaces.enp0s31f6.allowedTCPPorts = [ port ]; networking.firewall.interfaces.enp0s31f6.allowedUDPPorts = [ port ]; diff --git a/machines/chungus/media-jellyfin.nix b/machines/chungus/media-jellyfin.nix index e9d634e..fb4cf9a 100644 --- a/machines/chungus/media-jellyfin.nix +++ b/machines/chungus/media-jellyfin.nix @@ -7,7 +7,7 @@ { services.jellyfin = { enable = true; - openFirewall = true; # todo: will open for retiolum as well + openFirewall = true; group = "media"; user = "media"; }; @@ -15,7 +15,6 @@ healthchecks.http.jellyfin = { url = "flix.${config.networking.hostName}.private"; }; - healthchecks.closed.retiolum.ports.jellyfin = [ 8096 ]; services.nginx = { enable = true; diff --git a/machines/chungus/media-navidrome.nix b/machines/chungus/media-navidrome.nix index 5fd290e..d0181d7 100644 --- a/machines/chungus/media-navidrome.nix +++ b/machines/chungus/media-navidrome.nix @@ -11,8 +11,6 @@ expectedContent = "Navidrome"; }; - healthchecks.closed.retiolum.ports.navidrome = [ config.services.navidrome.settings.Port ]; - services.navidrome = { enable = true; openFirewall = true; diff --git a/machines/chungus/media-share.nix b/machines/chungus/media-share.nix index f9b4313..012c25b 100644 --- a/machines/chungus/media-share.nix +++ b/machines/chungus/media-share.nix @@ -1,12 +1,6 @@ { config, ... }: { - healthchecks.closed.retiolum.ports.share = [ - 137 - 138 - 139 - 445 - ]; networking.firewall.interfaces.enp0s31f6.allowedTCPPorts = [ 445 139 diff --git a/machines/chungus/media-syncthing.nix b/machines/chungus/media-syncthing.nix index d83c42a..e266204 100644 --- a/machines/chungus/media-syncthing.nix +++ b/machines/chungus/media-syncthing.nix @@ -10,7 +10,6 @@ url = config.services.syncthing.guiAddress; expectedContent = "syncthing"; }; - healthchecks.closed.retiolum.ports.syncthing-gui = [ 8384 ]; services.syncthing = { enable = true; diff --git a/machines/chungus/network-tinc-retiolum.nix b/machines/chungus/network-tinc-retiolum.nix deleted file mode 100644 index faa62f7..0000000 --- a/machines/chungus/network-tinc-retiolum.nix +++ /dev/null @@ -1,23 +0,0 @@ -{ - config, - factsGenerator, - pkgs, - ... -}: -{ - clan.core.facts.services.tinc_retiolum = factsGenerator.tinc { name = "retiolum"; }; - - networking.retiolum.port = 720; - networking.retiolum.nodename = "chungus"; - - healthchecks.localCommands.ping-retiolum = pkgs.writers.writeBash "ping-retiolum" '' - ping -c 1 -W 5 ${config.networking.retiolum.nodename}.r - ''; - - services.tinc.networks.retiolum = { - ed25519PrivateKeyFile = - config.clan.core.facts.services.tinc_retiolum.secret."tinc.retiolum.ed25519_key.priv".path; - rsaPrivateKeyFile = - config.clan.core.facts.services.tinc_retiolum.secret."tinc.retiolum.rsa_key.priv".path; - }; -} diff --git a/machines/chungus/service-atuin.nix b/machines/chungus/service-atuin.nix index 5aa20f9..1a5c059 100644 --- a/machines/chungus/service-atuin.nix +++ b/machines/chungus/service-atuin.nix @@ -6,8 +6,6 @@ }: { - healthchecks.closed.retiolum.ports.atuin = [ config.services.atuin.port ]; - services.atuin = { enable = true; host = "0.0.0.0"; diff --git a/machines/chungus/service-forgejo.nix b/machines/chungus/service-forgejo.nix index bb5e528..49dc36f 100644 --- a/machines/chungus/service-forgejo.nix +++ b/machines/chungus/service-forgejo.nix @@ -10,8 +10,6 @@ expectedContent = "nixinate"; }; - healthchecks.closed.retiolum.ports.forgejo = [ config.services.forgejo.settings.server.HTTP_PORT ]; - services.nginx = { enable = true; statusPage = true; diff --git a/machines/chungus/service-paperless-healthchecks.nix b/machines/chungus/service-paperless-healthchecks.nix index 7dac6ff..e8b6ebb 100644 --- a/machines/chungus/service-paperless-healthchecks.nix +++ b/machines/chungus/service-paperless-healthchecks.nix @@ -11,6 +11,5 @@ url = "http://paperless.chungus.private/accounts/login/?next=/"; expectedContent = "paperless.chungus.private"; }; - healthchecks.closed.retiolum.ports.paperless = [ config.services.paperless.port ]; } diff --git a/machines/chungus/service-s3.nix b/machines/chungus/service-s3.nix index c151459..c542f5c 100644 --- a/machines/chungus/service-s3.nix +++ b/machines/chungus/service-s3.nix @@ -1,11 +1,6 @@ { config, factsGenerator, ... }: { - healthchecks.closed.retiolum.ports.s3 = [ - 9000 - 9001 - ]; - healthchecks.http.s3 = { url = "http://s3.chungus.private:9001/login"; expectedContent = "minio"; diff --git a/machines/chungus/service-taskwarrior.nix b/machines/chungus/service-taskwarrior.nix index 654e4e4..31c8812 100644 --- a/machines/chungus/service-taskwarrior.nix +++ b/machines/chungus/service-taskwarrior.nix @@ -6,8 +6,6 @@ }: { - healthchecks.closed.retiolum.ports.taskwarrior-webui = [ 8080 ]; - virtualisation.oci-containers = { containers.taskwarrior-webui = { volumes = [ diff --git a/machines/chungus/service-vault.nix b/machines/chungus/service-vault.nix index b62a55a..382fbf4 100644 --- a/machines/chungus/service-vault.nix +++ b/machines/chungus/service-vault.nix @@ -1,8 +1,6 @@ { pkgs, ... }: { - healthchecks.closed.retiolum.ports.vault = [ 8200 ]; - services.vault = { enable = true; #adress = "chungus.private:8200"; diff --git a/machines/chungus/topology.nix b/machines/chungus/topology.nix index 1b84aac..27868b8 100644 --- a/machines/chungus/topology.nix +++ b/machines/chungus/topology.nix @@ -22,11 +22,5 @@ with config.lib.topology; # type = "tinc"; virtual = true; }; - interfaces."tinc.retiolum" = { - network = "tinc.retiolum"; - # type = "tinc"; - virtual = true; - }; - }; } diff --git a/machines/chungus/zerotier-controller.nix b/machines/chungus/zerotier-controller.nix index f05fea9..1818e72 100644 --- a/machines/chungus/zerotier-controller.nix +++ b/machines/chungus/zerotier-controller.nix @@ -22,8 +22,6 @@ let in { - healthchecks.closed.retiolum.ports.vault = [ 9993 ]; - environment.systemPackages = [ (zerotierCommand "zerotier-script-members" '' curl "http://localhost:9993/controller/network/''${NWID}/member" -H "X-ZT1-AUTH: ''${TOKEN}" | gojq diff --git a/machines/usbstick/hardware-configuration/hardware-configuration.nix b/machines/usbstick/hardware-configuration/hardware-configuration.nix index 66f2d26..1acf884 100644 --- a/machines/usbstick/hardware-configuration/hardware-configuration.nix +++ b/machines/usbstick/hardware-configuration/hardware-configuration.nix @@ -50,7 +50,6 @@ networking.useDHCP = lib.mkDefault true; # networking.interfaces.enp0s25.useDHCP = lib.mkDefault true; # networking.interfaces.tinc.private.useDHCP = lib.mkDefault true; - # networking.interfaces.tinc.retiolum.useDHCP = lib.mkDefault true; # networking.interfaces.tinc.secret.useDHCP = lib.mkDefault true; # networking.interfaces.virbr0.useDHCP = lib.mkDefault true; # networking.interfaces.wlp3s0.useDHCP = lib.mkDefault true; diff --git a/nix/topology/networks.nix b/nix/topology/networks.nix index 9671e1c..4ee72b1 100644 --- a/nix/topology/networks.nix +++ b/nix/topology/networks.nix @@ -20,8 +20,4 @@ with config.lib.topology; cidrv4 = "10.23.42.0/24"; }; - networks."tinc.retiolum" = { - name = "tinc retiolum"; - }; - } diff --git a/system/all/on-failure.nix b/system/all/on-failure.nix deleted file mode 100644 index 1abdc3b..0000000 --- a/system/all/on-failure.nix +++ /dev/null @@ -1,17 +0,0 @@ -{ lib, ... }: -{ - #on-failure = { - # enable = true; - # plans = { - # tinc_private.name = "tinc.private"; - # tinc_retiolum.name = "tinc.retiolum"; - # sshd.name = "sshd"; - # tor.name = "tor"; - # dnsmasq.name = "dnsmasq"; - # #backup_on_workhorse.name = "backup.on-workhorse.private"; - # #backup_on_workout.name = "backup.on-workout.private"; - # #backup_on_porani.name = "backup.on-porani.private"; - # syncthing.name = "syncthing"; - # }; - #}; -}