Compare commits
32 Commits
2016-10-17
...
2016-11-01
| Author | SHA1 | Date | |
|---|---|---|---|
| 6ce50aea40 | |||
| 012cc8626c | |||
| bdbf858a11 | |||
| a4b166f1f8 | |||
| bb5ee98bc3 | |||
| dd9f52b997 | |||
| bb617fbf13 | |||
| 021b1d5c26 | |||
|
|
31f57965f9 | ||
|
|
0a3d820dd6 | ||
|
|
f0f266cb55 | ||
|
|
1916d6eb90 | ||
| fa32aed569 | |||
| 9201266575 | |||
| 756a18b2e8 | |||
| 3b04c2edb0 | |||
| 2982725e0b | |||
| 9e8d3b24b3 | |||
| dba3a46ebd | |||
| 7d28694819 | |||
| ed5420e1b0 | |||
| d6bfe1c706 | |||
| 7dada8a3e6 | |||
| bd0076b9d1 | |||
| 6800de18af | |||
| 5d831cf7be | |||
| 2ffdaf0a53 | |||
| 7dbfccf2f4 | |||
| e2e15cad39 | |||
| 2d770067b7 | |||
| 46e61f0fed | |||
|
|
99d5886aff |
2
Makefile
2
Makefile
@@ -37,7 +37,7 @@ push: submodules-push
|
||||
|
||||
submodules-update:
|
||||
#git submodule update --remote
|
||||
#git submodule foreach git co master
|
||||
git submodule foreach git co master
|
||||
git submodule foreach git ff
|
||||
|
||||
submodules-push:
|
||||
|
||||
@@ -1,5 +1,7 @@
|
||||
# nixos-template-base
|
||||
|
||||
Version de nixos supportée : NixOs 16.09
|
||||
|
||||
Ce dépôt stocke une configuration générique des machines.
|
||||
Une recette dite "config-generator" adapte la configuration selon le nom de la machine (FQDN).
|
||||
|
||||
|
||||
@@ -41,7 +41,11 @@ in
|
||||
edition-musique = mkEnableOption "Profil pour la création/édition de musique.";
|
||||
edition-photo = mkEnableOption "Profil pour la création/édition de photos.";
|
||||
edition-video = mkEnableOption "Profil pour la création/édition de video.";
|
||||
elasticsearch = mkEnableOption "Profil pour activer le service elasticsearch.";
|
||||
fail2ban = mkEnableOption "Profil pour activer Fail2ban.";
|
||||
hydra-builder = mkEnableOption "Profil pour une machine qui compile pour hydra.";
|
||||
hydra-core = mkEnableOption "Profil pour un serveur hydra.";
|
||||
kibana = mkEnableOption "Profil pour activer le service kibana.";
|
||||
jeux = mkEnableOption "Profil pour les jeux vidéos.";
|
||||
laptop = mkEnableOption "Profil pour les outils spécifiques aux ordinateurs portables..";
|
||||
locate = mkEnableOption "Profil pour activer la fonction locate.";
|
||||
@@ -53,10 +57,27 @@ in
|
||||
online-ipv6 = mkEnableOption "Profil pour activer l'IPv6 de online.net";
|
||||
print = mkEnableOption "Profil pour activer cups & pouvoir imprimer.";
|
||||
rabbitmq = mkEnableOption "Profil pour activer le service de messagerie AMQP.";
|
||||
radicale = mkEnableOption "Profil pour activer le service d'hébergement de calendrier + tâches & contacts.";
|
||||
swap = mkEnableOption "Profil pour que le swap soit activé.";
|
||||
virtualbox = mkEnableOption "Profil pour l'utilisation de VirtualBox.";
|
||||
xmonad = mkEnableOption "Profil pour activer le gestionnaire de fenêtres xmonad.";
|
||||
znc = mkEnableOption "Profil pour activer le relais IRC ZNC.";
|
||||
|
||||
tincAddress = mkOption {
|
||||
default = "";
|
||||
example = "192.168.1.1";
|
||||
description = "Adresse du noeud tinc local";
|
||||
type = lib.types.string;
|
||||
};
|
||||
tincExtraConfig = mkOption {
|
||||
default = "";
|
||||
example = ''
|
||||
Mode = router
|
||||
ConnecTo = bar
|
||||
'';
|
||||
description = "Configuration supplémentaire pour tinc";
|
||||
type = lib.types.string;
|
||||
};
|
||||
};
|
||||
#* Utilisé pour avoir des raccourcis de machine
|
||||
r6d.computers = {
|
||||
@@ -171,6 +192,7 @@ in
|
||||
|
||||
r6d.config-generator = {
|
||||
docker = true;
|
||||
radicale = true;
|
||||
};
|
||||
})
|
||||
(mkIf comp.isRadx {
|
||||
@@ -181,6 +203,10 @@ in
|
||||
};
|
||||
|
||||
r6d.config-generator = {
|
||||
elasticsearch = true;
|
||||
hydra-builder = true;
|
||||
hydra-core = true;
|
||||
kibana = true;
|
||||
print = true;
|
||||
virtualbox = true;
|
||||
};
|
||||
@@ -201,6 +227,8 @@ in
|
||||
|
||||
r6d.config-generator = {
|
||||
laptop = true;
|
||||
tincAddress = "192.168.12.2/24";
|
||||
tincExtraConfig = "ConnectTo = phenom_dubronetwork_fr";
|
||||
};
|
||||
})
|
||||
(mkIf comp.isMonstre {
|
||||
@@ -254,6 +282,7 @@ in
|
||||
nix-serve-server = true;
|
||||
laptop = true;
|
||||
edition-photo = true;
|
||||
tincAddress = "192.168.12.1/24";
|
||||
};
|
||||
})
|
||||
(mkIf comp.isRollo {
|
||||
|
||||
@@ -23,6 +23,9 @@ in
|
||||
# Lancement de dbus pour les utilisateurs
|
||||
services.dbus.socketActivated = true;
|
||||
|
||||
# NixOS Hardening
|
||||
#security.grsecurity.enable = true;
|
||||
|
||||
# Paquets
|
||||
environment = {
|
||||
systemPackages = with pkgs; [
|
||||
@@ -42,6 +45,7 @@ in
|
||||
p7zip # compression de fichier
|
||||
parted # partitionnement de disque
|
||||
pciutils
|
||||
pinentry # pour taper les mots de passe gpg
|
||||
psmisc # fournis les utilitaires comme killall, fuser, pstree
|
||||
python # python -- python -m SimpleHTTPServer 8000
|
||||
python34Packages.glances # monitoring
|
||||
@@ -56,6 +60,7 @@ in
|
||||
];
|
||||
shellAliases = {
|
||||
byobu = "byobu-tmux";
|
||||
gpg = "gpg2";
|
||||
jacques-a-dit = "sudo";
|
||||
tree = "tree -C";
|
||||
tree1 = "tree -d -L 1";
|
||||
|
||||
@@ -34,6 +34,10 @@ in
|
||||
./auto-upgrade.nix # mise à jour automatique du système
|
||||
./laptop.nix # appli & configuration adaptée pour un PC portable
|
||||
./print.nix # configuration de base de cups
|
||||
./service-elasticsearch.nix # service de stockage et recher de données
|
||||
./service-hydra-build.nix # service de construction de paquet. -> la machine compile des paquets
|
||||
./service-hydra-core.nix # service pour l'instance d'hydra
|
||||
./service-kibana.nix # service de visualisation de données stockées dans elasticsearch
|
||||
./service-laptop.nix # services spécifiques aux pc portables
|
||||
./service-locate.nix # service locate
|
||||
./swap.nix # définition de l'utilisation du swap
|
||||
|
||||
34
public/service-elasticsearch.nix
Normal file
34
public/service-elasticsearch.nix
Normal file
@@ -0,0 +1,34 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
inherit (lib) mkIf mkMerge mkThenElse;
|
||||
cfg = config.r6d.config-generator;
|
||||
computers = config.r6d.computers;
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
mkIf cfg.elasticsearch {
|
||||
|
||||
# Paquets
|
||||
environment.systemPackages = with pkgs; [
|
||||
];
|
||||
|
||||
# Services
|
||||
|
||||
## E : http://localhost:9200/_cat/indices?v
|
||||
services.elasticsearch = {
|
||||
enable = true;
|
||||
port = 9200;
|
||||
listenAddress = "127.0.0.1";
|
||||
#listenAddress = "_site_";
|
||||
};
|
||||
|
||||
# Réseau
|
||||
# -> Aucun port n'est ouvert caril est recommandé de mettre un proxy HTTP devant
|
||||
networking.firewall = {
|
||||
allowedTCPPorts = [
|
||||
];
|
||||
allowedUDPPorts = [
|
||||
];
|
||||
};
|
||||
}
|
||||
32
public/service-hydra-build.nix
Normal file
32
public/service-hydra-build.nix
Normal file
@@ -0,0 +1,32 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
inherit (lib) mkIf mkMerge mkThenElse;
|
||||
cfg = config.r6d.config-generator;
|
||||
computers = config.r6d.computers;
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
mkIf cfg.hydra-builder {
|
||||
|
||||
# Paquets
|
||||
environment.systemPackages = with pkgs; [
|
||||
];
|
||||
|
||||
# Services
|
||||
|
||||
|
||||
virtualisation.virtualbox.host.enable = true;
|
||||
nix.gc.automatic = true;
|
||||
|
||||
users.users."hydrabld" = {
|
||||
description = "Execution des jobs hydra";
|
||||
group = "nixbld";
|
||||
extraGroups = [ "nixbld" ];
|
||||
isNormalUser = true;
|
||||
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGYpjcWJCf8dXpv2LmoIaNVbwZXEC50QUU6Az+lqeD89 hydra radx"
|
||||
];
|
||||
};
|
||||
}
|
||||
71
public/service-hydra-core.nix
Normal file
71
public/service-hydra-core.nix
Normal file
@@ -0,0 +1,71 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
inherit (lib) mkIf mkMerge mkThenElse;
|
||||
cfg = config.r6d.config-generator;
|
||||
computers = config.r6d.computers;
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
mkIf cfg.hydra-core {
|
||||
|
||||
# Paquets
|
||||
environment.systemPackages = with pkgs; [
|
||||
];
|
||||
|
||||
# Documentation HYDRA
|
||||
|
||||
## Installation
|
||||
|
||||
# 1. créer clef SSH :
|
||||
# ssh-keygen -C "hydra@pedro.dubronetwork.fr" -N "" -f /etc/nixos/id_buildfarm
|
||||
# 2. récupérer la clef publique du serveur ssh + l'ajouter dans les `knownHosts` :
|
||||
# ssh-keyscan localhost
|
||||
# 3. créer un utilisateur pour gérer hydra
|
||||
# su - hydra
|
||||
# hydra-create-user jpierre03 --password xxx --role 'admin'
|
||||
# 4. relancer hydra
|
||||
# 5. ajouter un vhost à nginx
|
||||
# 6. relancer nginx
|
||||
# 7. le service accessible à hydra.<nom de machine>
|
||||
|
||||
## Tutoriel
|
||||
# * https://github.com/peti/hydra-tutorial
|
||||
|
||||
# Services
|
||||
|
||||
## Hydra
|
||||
|
||||
services.hydra = {
|
||||
enable = true;
|
||||
hydraURL = "http://hydra.${config.networking.hostName}";
|
||||
notificationSender = "hydra@${config.networking.hostName}";
|
||||
listenHost = "localhost";
|
||||
minimumDiskFree = 50; # Go
|
||||
smtpHost = "localhost";
|
||||
};
|
||||
|
||||
## Ménage
|
||||
#nix.gc.automatic = true;
|
||||
|
||||
## Délégation des actions de compilation à la ferme de compilation
|
||||
|
||||
### Machines connues
|
||||
|
||||
programs.ssh.knownHosts = {
|
||||
"monstre.dubronetwork.fr".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBTTrLhq1Cwm0rpnwEIxSLqVrJWZnt+/9dt+SKd8NiIc";
|
||||
"pedro.dubronetwork.fr".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIM7fjo2ysLqlfSo6BKnc6I6m1ayoPrbwEEyTKZmUzsOD";
|
||||
"ocean.prunetwork.fr".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINCaRuTl8iCTUE4XInOpkSlwQj5Re4w4Iq+gNIlJe8pA";
|
||||
"radx.prunetwork.fr".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGyoXdTEnxSgZTMfRfVH+bpOGZJtJpydAijcRGsZik7U";
|
||||
"rollo.dubronetwork.fr".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID4lWgS/sVdcZvnAAN+lBSOcCL9ISdAUsjp1kh9lalNu";
|
||||
};
|
||||
|
||||
### La liste des machines utilisées
|
||||
nix = {
|
||||
distributedBuilds = false;
|
||||
buildMachines = [
|
||||
# { hostName = "pedro.dubronetwork.fr"; maxJobs = 5; speedFactor = 10; sshKey = "/etc/nixos/id_buildfarm"; sshUser = "root"; system = "x86_64-linux"; }
|
||||
];
|
||||
extraOptions = "auto-optimise-store = true";
|
||||
};
|
||||
}
|
||||
33
public/service-kibana.nix
Normal file
33
public/service-kibana.nix
Normal file
@@ -0,0 +1,33 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
inherit (lib) mkIf mkMerge mkThenElse;
|
||||
cfg = config.r6d.config-generator;
|
||||
computers = config.r6d.computers;
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
mkIf cfg.kibana {
|
||||
|
||||
# Paquets
|
||||
environment.systemPackages = with pkgs; [
|
||||
];
|
||||
|
||||
# Services
|
||||
|
||||
# K : http://localhost:8000
|
||||
services.kibana = {
|
||||
enable = true;
|
||||
elasticsearch.url = "http://127.0.0.1:9200";
|
||||
port = 8000;
|
||||
};
|
||||
|
||||
# Réseau
|
||||
# -> Aucun port n'est ouvert caril est recommandé de mettre un proxy HTTP devant
|
||||
networking.firewall = {
|
||||
allowedTCPPorts = [
|
||||
];
|
||||
allowedUDPPorts = [
|
||||
];
|
||||
};
|
||||
}
|
||||
Reference in New Issue
Block a user