Compare commits
43 Commits
2017-02-11
...
2017-03-02
| Author | SHA1 | Date | |
|---|---|---|---|
| 464da39592 | |||
| 963c818875 | |||
|
|
2f99508331 | ||
|
|
b6a7f50ebd | ||
|
|
2fdaf24fae | ||
|
|
c193d944d9 | ||
|
|
7750d1a266 | ||
|
|
08195188b2 | ||
|
|
b12e1f9ae5 | ||
|
|
d0b3497ccb | ||
|
|
ba0d43670d | ||
| 06aaf3cc23 | |||
| 0e1a1b0107 | |||
| c500c59732 | |||
| 9e3b1d163f | |||
| 9bdaae4593 | |||
| 1a80e445ce | |||
| 50d486565c | |||
| b6cf3b2674 | |||
| c0427bb622 | |||
|
|
5be0164cb9 | ||
|
|
9d0c04810c | ||
|
|
e5de46f1d3 | ||
|
|
2a2c0a56fe | ||
| 8ef6642024 | |||
| e77df9816d | |||
|
|
ba09f97684 | ||
|
|
b0696f1983 | ||
|
|
2d9c9415a2 | ||
|
|
7e7736b631 | ||
|
|
52670ebd9c | ||
|
|
8845300555 | ||
| dce783708c | |||
| f2305d0a81 | |||
| a6e957afae | |||
| edfac07129 | |||
| 7799eb106f | |||
|
|
754a1ec934 | ||
|
|
80f7b32af6 | ||
|
|
5cd1cd0e6f | ||
|
|
fae4a8237c | ||
|
|
5f09c0896d | ||
|
|
2244b917ac |
2
base.nix
2
base.nix
@@ -10,8 +10,6 @@ in
|
||||
{
|
||||
imports = [
|
||||
# recettes
|
||||
./base/base.nix
|
||||
./desktop/desktop.nix
|
||||
./public/public.nix
|
||||
|
||||
# moulinette de configuration
|
||||
|
||||
@@ -1 +0,0 @@
|
||||
/etc/nixos/base/Makefile
|
||||
@@ -1,25 +0,0 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
inherit (lib) mkIf mkMerge mkThenElse;
|
||||
cfg = config.r6d.config-generator;
|
||||
computers = config.r6d.computers;
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
mkIf cfg.nix-serve-client {
|
||||
|
||||
nix = {
|
||||
# Cache http pour le store
|
||||
requireSignedBinaryCaches = false;
|
||||
binaryCaches = [
|
||||
(mkIf (profiles.isDubronetwork && (! computers.isPedro) && (! computers.isRollo)) "http://nix-cache.dubronetwork.fr:5001")
|
||||
|
||||
(mkIf profiles.isPrunetwork "https://cache.nixos.org/")
|
||||
(mkIf (profiles.isPrunetwork && !profiles.isServer) "http://nix-cache.dubronetwork.fr:5001")
|
||||
];
|
||||
extraOptions = ''
|
||||
connect-timeout = 5
|
||||
'';
|
||||
};
|
||||
}
|
||||
@@ -1,31 +0,0 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
inherit (lib) mkIf mkMerge mkThenElse;
|
||||
cfg = config.r6d.config-generator;
|
||||
computers = config.r6d.computers;
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
mkIf cfg.nix-serve-server {
|
||||
|
||||
# Cache http pour le store
|
||||
|
||||
# Services
|
||||
services.nix-serve = {
|
||||
enable = true;
|
||||
};
|
||||
|
||||
# Réseau
|
||||
networking.firewall = {
|
||||
allowedTCPPorts = [
|
||||
#5000 # ouvert sur tinc
|
||||
];
|
||||
allowedUDPPorts = [
|
||||
];
|
||||
extraCommands = ''
|
||||
iptables -A INPUT -i tinc.grudunet -p tcp --dport 5000 -j ACCEPT
|
||||
ip6tables -A INPUT -i tinc.grudunet -p tcp --dport 5000 -j ACCEPT
|
||||
'';
|
||||
};
|
||||
}
|
||||
@@ -1,64 +0,0 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
inherit (lib) mkIf mkMerge mkThenElse;
|
||||
cfg = config.r6d.config-generator;
|
||||
computers = config.r6d.computers;
|
||||
profiles = config.r6d.profiles;
|
||||
|
||||
ignoreip = "pedro.dubronetwork.fr cube.dubronetwork.fr voyage.prunetwork.fr xray.prunetwork.fr 192.168.0.0/16 172.16.0.0/16";
|
||||
destemail = "admins@dubronetwork.fr";
|
||||
in
|
||||
|
||||
mkIf cfg.fail2ban {
|
||||
|
||||
# Gestion de fail2ban
|
||||
|
||||
# Paquets
|
||||
environment.systemPackages = with pkgs; [
|
||||
mailutils
|
||||
whois
|
||||
];
|
||||
|
||||
|
||||
# Services
|
||||
services = {
|
||||
fail2ban = {
|
||||
enable = true;
|
||||
jails = {
|
||||
DEFAULT = ''
|
||||
# "ignoreip" can be an IP address, a CIDR mask or a DNS host
|
||||
ignoreip = 127.0.0.1/8 ${ignoreip}
|
||||
|
||||
# 1 jour
|
||||
# bantime = 86400
|
||||
# 5 jours
|
||||
bantime = 432000
|
||||
|
||||
maxretry = 3
|
||||
|
||||
destemail = ${destemail}
|
||||
|
||||
# https://github.com/Baughn/nixpkgs/blob/master/nixos/modules/services/security/fail2ban.nix
|
||||
findtime = 600
|
||||
maxretry = 3
|
||||
backend = systemd
|
||||
enabled = true
|
||||
'';
|
||||
ssh-route = ''
|
||||
filter = sshd
|
||||
action = route[blocktype=blackhole]
|
||||
'';
|
||||
# désactivation car souci de PATH avec les commandes mail ou sendmail. Nécessite un path motifiable
|
||||
# ticket à ouvrir
|
||||
#ssh-mail = ''
|
||||
# filter = sshd
|
||||
# action = sendmail[sendername=Fail2ban @${config.networking.hostName}]
|
||||
#'';
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
# https://github.com/NixOS/nixpkgs/issues/8437
|
||||
services.fail2ban.jails.ssh-iptables = "enabled = true";
|
||||
}
|
||||
File diff suppressed because one or more lines are too long
@@ -1,20 +0,0 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
#inherit (lib) mkIf mkMerge mkThenElse;
|
||||
cfg = config.r6d.config-generator;
|
||||
computers = config.r6d.computers;
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
{
|
||||
imports = [
|
||||
./network-dns.nix
|
||||
|
||||
# inclusion conditionnelle
|
||||
./activation-manuelle/service-fail2ban.nix
|
||||
./activation-manuelle/nix-serve-client.nix
|
||||
./activation-manuelle/nix-serve-server.nix
|
||||
./activation-manuelle/users.nix
|
||||
];
|
||||
}
|
||||
@@ -1,22 +0,0 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
inherit (lib) mkIf mkMerge mkThenElse;
|
||||
cfg = config.r6d.config-generator;
|
||||
computers = config.r6d.computers;
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
mkIf true {
|
||||
|
||||
# Définition des domaines utilisés lorsque un identifiant non-FQDN est donné (ping, nslookup)
|
||||
networking = {
|
||||
search = [
|
||||
"dubronetwork.fr"
|
||||
"prunetwork.fr"
|
||||
"teleragno.fr"
|
||||
"teleragno.net"
|
||||
];
|
||||
dnsExtensionMechanism = true;
|
||||
};
|
||||
}
|
||||
34
byobu-adminsys
Executable file
34
byobu-adminsys
Executable file
@@ -0,0 +1,34 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
SESSION_NAME="Adminsys"
|
||||
PROJECT_DIR="/etc/nixos"
|
||||
PROJECT_MODULES="base private server"
|
||||
HEAD_ADDITIONNAL_TABS="git config"
|
||||
TAIL_ADDITIONNAL_TABS="glances htop"
|
||||
|
||||
# création de la session
|
||||
byobu new-session -d -s ${SESSION_NAME} -n 'run' -c ${PROJECT_DIR};
|
||||
|
||||
# définition des onglets
|
||||
|
||||
## onglets courants au début. Positionnés dans dossier projet
|
||||
for i in ${HEAD_ADDITIONNAL_TABS}
|
||||
do
|
||||
byobu new-window -n ${i} -c ${PROJECT_DIR};
|
||||
done
|
||||
|
||||
## onglets spécifiques au projet. Positionnés dans les dossiers enfants
|
||||
for i in ${PROJECT_MODULES}
|
||||
do
|
||||
byobu new-window -n ${i} -c ${PROJECT_DIR}/${i};
|
||||
done
|
||||
|
||||
## onglets courants à la fin. Positionnés dans dossier projet. Lance la commande du même nom que l'onglet
|
||||
for i in ${TAIL_ADDITIONNAL_TABS}
|
||||
do
|
||||
byobu new-window -n ${i} -c ${PROJECT_DIR} ${i};
|
||||
done
|
||||
|
||||
# affiche la session
|
||||
byobu -2 attach-session -t ${SESSION_NAME};
|
||||
|
||||
@@ -9,6 +9,7 @@ let
|
||||
in
|
||||
|
||||
{
|
||||
# TODO: ménage
|
||||
###### interface
|
||||
|
||||
options = {
|
||||
@@ -103,25 +104,7 @@ in
|
||||
# https://nixos.org/releases/nixos/14.12-small/nixos-14.12.374.61adf9e/manual/sec-writing-modules.html
|
||||
# https://nixos.org/wiki/NixOS:extend_NixOS
|
||||
config = mkMerge
|
||||
[ # Unconditional stuff.
|
||||
{
|
||||
#r6d.config-generator.enable = true;
|
||||
# r6d.computers = {
|
||||
# isHydra = host == "hydra.prunetwork.fr";
|
||||
# isLatitude = host == "latitude.dubronetwork.fr";
|
||||
# isMonstre = host == "monstre.dubronetwork.fr";
|
||||
# isNeoNomade = host == "neo-nomade.dubronetwork.fr";
|
||||
# isNomade = host == "nomade.dubronetwork.fr";
|
||||
# isOcean = host == "ocean.prunetwork.fr";
|
||||
# isPedro = host == "pedro.dubronetwork.fr";
|
||||
# isPhenom = host == "phenom.dubronetwork.fr";
|
||||
# isRadx = host == "radx.prunetwork.fr";
|
||||
# isRollo = host == "rollo.dubronetwork.fr";
|
||||
# };
|
||||
}
|
||||
|
||||
# Conditional stuff
|
||||
|
||||
[
|
||||
## Définition des profils génériques
|
||||
(mkIf pfl.isDesktop {
|
||||
r6d.config-generator = {
|
||||
@@ -197,16 +180,16 @@ in
|
||||
(mkIf (pfl.isPrunetwork && pfl.isWorkstation) {
|
||||
r6d.config-generator = {
|
||||
cartographie = true;
|
||||
#conception-assistee = true;
|
||||
conception-assistee = true;
|
||||
docker = true;
|
||||
developpement = true;
|
||||
developpement-elm = true;
|
||||
#developpement-elm = true;
|
||||
developpement-haskell = true;
|
||||
developpement-java = true;
|
||||
#developpement-rust = true;
|
||||
#edition-musique = true;
|
||||
developpement-rust = true;
|
||||
edition-musique = true;
|
||||
edition-photo = true;
|
||||
#edition-video = true;
|
||||
edition-video = true;
|
||||
hydra-core = false; # DO NOT ENABLE ON WORKSTATION, YOU CAN CRASH YOUR SYSTEM
|
||||
print = true;
|
||||
#virtualbox = true;
|
||||
@@ -263,6 +246,8 @@ in
|
||||
hydra-builder = true;
|
||||
#hydra-core = false; # DO NOT ENABLE ON WORKSTATION
|
||||
kibana = true;
|
||||
nix-serve-client = true;
|
||||
nix-serve-server = true;
|
||||
rabbitmq = true;
|
||||
tincAddress = "192.168.12.3/24";
|
||||
tincExtraConfig = ''
|
||||
@@ -327,6 +312,8 @@ in
|
||||
'';
|
||||
};
|
||||
})
|
||||
# Dubro Vivo - St Malo
|
||||
#tincAddress = "192.168.12.8/24";
|
||||
(mkIf comp.isNomade{
|
||||
r6d.profiles.isDubronetwork = true;
|
||||
|
||||
@@ -355,6 +342,7 @@ in
|
||||
r6d.config-generator = {
|
||||
jetbrains-licensed = true;
|
||||
#hydra-core = true;
|
||||
nix-serve-client = true;
|
||||
nix-serve-server = true;
|
||||
edition-photo = true;
|
||||
tincAddress = "192.168.12.1/24";
|
||||
|
||||
@@ -12,6 +12,7 @@ mkIf true {
|
||||
# Paquets
|
||||
environment.systemPackages = with pkgs; [
|
||||
# Adminsys
|
||||
cowsay # pour ansible & 4lulz
|
||||
iotop
|
||||
lm_sensors
|
||||
lshw
|
||||
@@ -36,6 +37,7 @@ mkIf true {
|
||||
exfat # Pour monter les FAT avec Fuse
|
||||
hubicfuse # montage hubic
|
||||
ntfs3g # ntfs
|
||||
samba # partages windows
|
||||
squashfsTools # squashfs
|
||||
sshfsFuse # ssh
|
||||
|
||||
|
||||
@@ -7,6 +7,7 @@ let
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
# TODO: rc.lua par défaut (système)
|
||||
mkIf cfg.awesome {
|
||||
|
||||
environment.variables = {
|
||||
|
||||
@@ -1,24 +1,21 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
inherit (lib) mkIf mkMerge mkThenElse;
|
||||
cfg = config.r6d.config-generator;
|
||||
computers = config.r6d.computers;
|
||||
profiles = config.r6d.profiles;
|
||||
mkIf = lib.mkIf;
|
||||
in
|
||||
|
||||
{
|
||||
imports = [ # applications :
|
||||
# commandées par config-generator
|
||||
./activation-manuelle/xmonad/xmonad.nix # gestionnaire de fenêtres xmonad
|
||||
];
|
||||
mkIf profiles.isDesktop {
|
||||
|
||||
# Paquets
|
||||
environment.systemPackages = with pkgs; mkIf profiles.isDesktop [
|
||||
environment.systemPackages = with pkgs; [
|
||||
# Environement de bureau
|
||||
arandr # interface graphique pour xrandr
|
||||
wmname # pour définir le nom du gestionnaire de fenêtre (utile pour java)
|
||||
#kde4.ksnapshot # capture d'écran
|
||||
xclip # manipulation du clipboard X depuis la console
|
||||
xorg.xbacklight # pour gérer la luminosité de l'écran
|
||||
xorg.xev # pour repérer les codes + noms standard des actions clavier/souris
|
||||
xorg.xkill # pour 'tuer une application'
|
||||
@@ -29,18 +26,10 @@ in
|
||||
## Manipulation de fichier
|
||||
pcmanfm # gestionnaire de fichiers graphique
|
||||
spaceFM # gestionnaire de fichiers graphique
|
||||
vifm # gestionnaire de fichiers basé sur VIM (console)
|
||||
#vifm # gestionnaire de fichiers basé sur VIM (console)
|
||||
|
||||
## Terminal
|
||||
sakura # terminal
|
||||
|
||||
# A trier
|
||||
cowsay
|
||||
fgallery # générateur de gallerie statique http://www.thregr.org/~wavexx/software/fgallery/
|
||||
samba
|
||||
taskwarrior # gestionnaire de tâches en console
|
||||
udevil # pour le montage des media amovibles
|
||||
xclip # manipulation du clipboard X depuis la console
|
||||
];
|
||||
|
||||
# Polices supplémentaires
|
||||
@@ -52,17 +41,10 @@ in
|
||||
hasklig # police dérivée de source-code-pro mais avec des ligatures
|
||||
];
|
||||
|
||||
nixpkgs.config.packageOverrides = pkgs: {
|
||||
clawsMail = pkgs.clawsMail.override {
|
||||
enablePluginFancy = true;
|
||||
enablePluginPdf = true;
|
||||
enablePluginRavatar = true;
|
||||
enablePluginSmime = true;
|
||||
enablePluginVcalendar = true;
|
||||
enableSpellcheck = true;
|
||||
};
|
||||
mumble = pkgs.mumble.override { pulseSupport = true; };
|
||||
# Paquets avec setuid root
|
||||
security.wrappers = {
|
||||
# pour le montage des media amovibles
|
||||
devmon.source = "${pkgs.udevil}/bin/devmon";
|
||||
udevil.source = "${pkgs.udevil}/bin/udevil"; # utilisé par spacefm
|
||||
};
|
||||
|
||||
security.setuidPrograms = [ "udevil" ];
|
||||
}
|
||||
@@ -16,6 +16,9 @@ mkIf profiles.isDesktop {
|
||||
gnumeric # tableur
|
||||
#kde4.ksnapshot# réalisation de capture d'écran
|
||||
|
||||
# Gestion de tâche
|
||||
taskwarrior # gestionnaire de tâches en console
|
||||
|
||||
## Cartes mentales
|
||||
freemind
|
||||
|
||||
|
||||
@@ -6,7 +6,7 @@ let
|
||||
computers = config.r6d.computers;
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
# TODO: ménage
|
||||
mkIf profiles.isDesktop {
|
||||
|
||||
# Paquets
|
||||
@@ -37,4 +37,21 @@ environment.systemPackages = with pkgs; [
|
||||
transmission_gtk
|
||||
transmission_remote_gtk
|
||||
];
|
||||
|
||||
nixpkgs.config.packageOverrides = pkgs: {
|
||||
clawsMail = pkgs.clawsMail.override {
|
||||
enablePluginFancy = false; # nécessite wekitgtk qui est troué
|
||||
enablePluginPdf = true;
|
||||
enablePluginRavatar = true;
|
||||
enablePluginSmime = true;
|
||||
enablePluginVcalendar = true;
|
||||
enableSpellcheck = true;
|
||||
};
|
||||
mumble = pkgs.mumble.override { pulseSupport = true; };
|
||||
};
|
||||
|
||||
#nixpkgs.config.permittedInsecurePackages = [
|
||||
# "webkitgtk-2.4.11" # pour que le plugin fancy de claws-mail fonctionne
|
||||
#];
|
||||
|
||||
}
|
||||
|
||||
@@ -20,6 +20,7 @@ mkIf cfg.developpement-haskell {
|
||||
haskellPackages.stylish-haskell # qualité de code
|
||||
haskellPackages.hindent
|
||||
haskellPackages.hlint
|
||||
haskellPackages.threadscope
|
||||
|
||||
# Application perso
|
||||
haskellPackages.hahp
|
||||
|
||||
@@ -16,5 +16,6 @@ mkIf cfg.developpement-java {
|
||||
|
||||
# Java
|
||||
maven
|
||||
zulu
|
||||
];
|
||||
}
|
||||
|
||||
@@ -21,11 +21,16 @@ mkIf true {
|
||||
## Diagnostic
|
||||
arp-scan
|
||||
nmap # outil de scan de port réseau
|
||||
mtr # outil de diagnostic réseau
|
||||
#wireshark
|
||||
whois
|
||||
];
|
||||
|
||||
# Paquets avec setuid root
|
||||
security.wrappers = {
|
||||
# outil de diagnostic réseau
|
||||
mtr.source = "${pkgs.mtr}/bin/mtr";
|
||||
};
|
||||
|
||||
networking.firewall = {
|
||||
allowedTCPPorts = [
|
||||
5201 # iperf
|
||||
|
||||
@@ -15,8 +15,12 @@ mkIf profiles.isDesktop {
|
||||
gnome3.seahorse # gestionnaire graphique de clef GPG
|
||||
pass # gestionnaire de mots de passe
|
||||
pwgen # générateur de mots de passe
|
||||
slock # vérouiller l''écran. "cannot disable the out-of-memory killer for this process (make sure to suid or sgid slock)" --> en root
|
||||
#yubikey-personalization-gui # utilisation de la clef Yubikey
|
||||
];
|
||||
security.setuidPrograms = [ "slock" ];
|
||||
|
||||
# Paquets avec setui root
|
||||
security.wrappers = {
|
||||
# vérouiller l''écran. "cannot disable the out-of-memory killer for this process (make sure to suid or sgid slock)" --> en root
|
||||
slock.source = "${pkgs.slock}/bin/slock";
|
||||
};
|
||||
}
|
||||
|
||||
@@ -343,8 +343,8 @@ globalkeys = awful.util.table.join(
|
||||
awful.key({ modkey }, "F7", function () awful.util.spawn("claws-mail") end),
|
||||
awful.key({ modkey }, "F12", function () awful.util.spawn("slock") end),
|
||||
awful.key({ modkey, "Shift" }, "F1", function () awful.util.spawn("claws-mail") end),
|
||||
awful.key({ modkey, "Shift" }, "F3", function () awful.util.spawn("pcmanfm") end)
|
||||
-- awful.key({ modkey }, "F11", function () awful.util.spawn("/home/taeradan/bin/xrandr-auto") end),
|
||||
awful.key({ modkey, "Shift" }, "F3", function () awful.util.spawn("pcmanfm") end),
|
||||
awful.key({ modkey }, "F11", function () awful.util.spawn("xrandr-auto") end)
|
||||
-- awful.key({ modkey, "Shift" }, "F11", function () awful.util.spawn("/home/taeradan/bin/xrandr-left") end),
|
||||
-- awful.key({ modkey, "Control" }, "F11", function () awful.util.spawn("/home/taeradan/bin/xrandr-right") end),
|
||||
|
||||
@@ -564,6 +564,6 @@ client.connect_signal("unfocus", function(c) c.border_color = beautiful.border_n
|
||||
-- }}}
|
||||
|
||||
-- Au démarrage
|
||||
-- awful.util.spawn_with_shell("/home/taeradan/bin/xrandr-auto")
|
||||
awful.util.spawn_with_shell("xrandr-auto || true")
|
||||
-- awful.util.spawn_with_shell("gnome-sound-applet")
|
||||
-- awful.util.spawn_with_shell("nm-applet")
|
||||
|
||||
@@ -7,6 +7,7 @@ let
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
# TODO: ménage
|
||||
{
|
||||
# Nombre de process d'installation en parrallèle effectués par Nix
|
||||
nix.buildCores = 0;
|
||||
@@ -47,7 +48,7 @@ in
|
||||
pinentry # pour taper les mots de passe gpg
|
||||
psmisc # fournis les utilitaires comme killall, fuser, pstree
|
||||
python # python -- python -m SimpleHTTPServer 8000
|
||||
python34Packages.glances # monitoring
|
||||
#python34Packages.glances # monitoring
|
||||
pwgen # générateur de mot de passe
|
||||
rtorrent # TODO outil de téléchargement de torrent & magnet
|
||||
tmux # nécessaire pour byobu
|
||||
@@ -69,13 +70,10 @@ in
|
||||
#git-loc = "git ls-files | while read f; do git blame --line-porcelain "${f}" | grep '^author '; done | sort -f | uniq -ic | sort -n";
|
||||
grep = "grep --color=auto";
|
||||
vi = "vim";
|
||||
byobu-adminsys = "/etc/nixos/base/byobu-adminsys";
|
||||
};
|
||||
etc.gitconfig.text = builtins.readFile ./gitconfig;
|
||||
};
|
||||
# programmes qui n'ont pas besoin de sudo pour fonctionner
|
||||
security.setuidPrograms = [
|
||||
"mtr"
|
||||
];
|
||||
programs.bash = {
|
||||
enableCompletion = true;
|
||||
promptInit = builtins.readFile ./bash-prompt.sh;
|
||||
|
||||
3
public/munin-muttrc
Normal file
3
public/munin-muttrc
Normal file
@@ -0,0 +1,3 @@
|
||||
set copy=no
|
||||
set realname = "Munin daemon"
|
||||
|
||||
@@ -14,7 +14,6 @@ in
|
||||
./localisation.nix
|
||||
./network.nix
|
||||
#./network-ipv6.nix
|
||||
./sudo.nix
|
||||
./service-haveged.nix
|
||||
./service-monitoring-munin.nix
|
||||
./service-monitoring-smokeping.nix
|
||||
@@ -23,7 +22,7 @@ in
|
||||
|
||||
# commandées par config-generator
|
||||
## option de configuration spécifique
|
||||
./app-awesome.nix # pour les profils awesome
|
||||
./app-awesome.nix # pour le gestionaire de fenêtres awesome
|
||||
./app-cao.nix # de conception assisté par ordinateur & modélisation
|
||||
./app-cartographie.nix # manipuler les données géographiques & cartes
|
||||
./app-developpement.nix # développer des programmes/scripts
|
||||
@@ -48,9 +47,11 @@ in
|
||||
./service-laptop.nix # services spécifiques aux pc portables
|
||||
./service-locate.nix # service locate
|
||||
./swap.nix # définition de l'utilisation du swap
|
||||
./xmonad/xmonad.nix # pour le gestionaire de fenêtre xmonad
|
||||
|
||||
## if isDesktop
|
||||
./app-adminsys.nix # pour gérer le système dans son ensemble et les services
|
||||
./app-bureau.nix # éléments pour avoir un environement graphique minimal utilisable
|
||||
./app-bureautique.nix # dédiée à la bureautique (traitement de texte, dessin, ...)
|
||||
./app-client-internet.nix # pour accéder & utiliser des ressources par le réseau
|
||||
./app-multimedia.nix # pour gérer le son, l'image et la vidéo
|
||||
|
||||
@@ -6,7 +6,7 @@ let
|
||||
computers = config.r6d.computers;
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
# TODO: ménage
|
||||
mkIf cfg.hydra-builder {
|
||||
|
||||
# Paquets
|
||||
|
||||
@@ -22,6 +22,7 @@ let
|
||||
# information pour l'état de hydra :
|
||||
# hydra-queue-runner --status | json_pp
|
||||
in
|
||||
# TODO: passe de ménage
|
||||
mkIf cfg.hydra-core {
|
||||
|
||||
# Paquets
|
||||
|
||||
@@ -7,6 +7,8 @@ let
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
# TODO: ajouter option
|
||||
# TODO: changer adresse mail
|
||||
mkIf true {
|
||||
|
||||
# Paquets
|
||||
@@ -22,8 +24,8 @@ mkIf true {
|
||||
enable = true;
|
||||
};
|
||||
systemd.services.munin-node = {
|
||||
path = [ pkgs.munin pkgs.lm_sensors ];
|
||||
serviceConfig.TimeoutStartSec = "1min";
|
||||
path = with pkgs; [ munin lm_sensors ];
|
||||
serviceConfig.TimeoutStartSec = "3min";
|
||||
};
|
||||
|
||||
## Munin server -- generate /var/www/munin
|
||||
@@ -34,7 +36,7 @@ mkIf true {
|
||||
address 127.0.0.1
|
||||
'';
|
||||
extraGlobalConfig = ''
|
||||
contact.email.command mail -s "Munin notification for ''${var:host}" root@${config.networking.hostName}
|
||||
contact.email.command ${pkgs.mutt}/bin/mutt -F /etc/nixos/base/public/munin-muttrc -s "Munin notification for ''${var:host}" jean-pierre@ocean.prunetwork.fr
|
||||
'';
|
||||
};
|
||||
|
||||
|
||||
@@ -7,6 +7,7 @@ let
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
# TODO: ajouter option
|
||||
mkIf true {
|
||||
|
||||
# Paquets
|
||||
@@ -14,7 +15,11 @@ mkIf true {
|
||||
bind
|
||||
];
|
||||
|
||||
security.setuidPrograms = [ "fping" ];
|
||||
# Paquets avec setuid root
|
||||
security.wrappers = {
|
||||
# outil de diagnostic réseau
|
||||
fping.source = "${pkgs.fping}/bin/fping";
|
||||
};
|
||||
|
||||
# Services
|
||||
|
||||
|
||||
@@ -15,5 +15,4 @@ mkIf profiles.isDesktop {
|
||||
support32Bit = true;
|
||||
daemon.config = { flat-volumes = "no"; };
|
||||
};
|
||||
#environment.etc."pulse/daemon.conf".text = "flat-volumes = no";
|
||||
}
|
||||
|
||||
@@ -1,18 +0,0 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
inherit (lib) mkIf mkMerge mkThenElse;
|
||||
cfg = config.r6d.config-generator;
|
||||
computers = config.r6d.computers;
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
mkIf true {
|
||||
|
||||
# Authorisation de certaines applications par sudo sans mot de passe
|
||||
|
||||
security.sudo.extraConfig = ''
|
||||
%users ALL = NOPASSWD: ${pkgs.mtr}/bin/mtr
|
||||
%users ALL = NOPASSWD: ${pkgs.slock}/bin/slock
|
||||
'';
|
||||
}
|
||||
@@ -7,7 +7,7 @@ let
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
{
|
||||
mkIf false {
|
||||
# Définition du IO Scheduler pour les SSD
|
||||
services.udev.extraRules = ''
|
||||
# set deadline scheduler for non-rotating disks
|
||||
|
||||
Reference in New Issue
Block a user