Compare commits
1 Commits
2017-02-27
...
2017-01-20
| Author | SHA1 | Date | |
|---|---|---|---|
| 09f970266e |
5
Makefile
5
Makefile
@@ -25,9 +25,6 @@ optimise:
|
|||||||
rebuild-switch:
|
rebuild-switch:
|
||||||
nixos-rebuild switch --fallback --show-trace
|
nixos-rebuild switch --fallback --show-trace
|
||||||
|
|
||||||
show-roots:
|
|
||||||
nix-store --gc --print-roots
|
|
||||||
|
|
||||||
store-repair:
|
store-repair:
|
||||||
nix-store --verify --check-contents --repair
|
nix-store --verify --check-contents --repair
|
||||||
|
|
||||||
@@ -48,7 +45,7 @@ push: submodules-push
|
|||||||
|
|
||||||
submodules-update:
|
submodules-update:
|
||||||
#git submodule update --remote
|
#git submodule update --remote
|
||||||
#$(GSF) git co master
|
$(GSF) git co master
|
||||||
$(GSF) git ff
|
$(GSF) git ff
|
||||||
$(GSF) git gc --auto
|
$(GSF) git gc --auto
|
||||||
|
|
||||||
|
|||||||
@@ -13,11 +13,6 @@ mkIf cfg.nix-serve-client {
|
|||||||
# Cache http pour le store
|
# Cache http pour le store
|
||||||
requireSignedBinaryCaches = false;
|
requireSignedBinaryCaches = false;
|
||||||
binaryCaches = [
|
binaryCaches = [
|
||||||
#(mkIf (computers.isRollo) "http://ocean.grudu.net:5001/")
|
|
||||||
(mkIf (computers.isRollo) "http://192.168.12.6:5000/")
|
|
||||||
#(mkIf (computers.isOcean) "http://rollo.grudu.net:5001/")
|
|
||||||
(mkIf (computers.isOcean) "http://192.168.12.5:5000/")
|
|
||||||
|
|
||||||
(mkIf (profiles.isDubronetwork && (! computers.isPedro) && (! computers.isRollo)) "http://nix-cache.dubronetwork.fr:5001")
|
(mkIf (profiles.isDubronetwork && (! computers.isPedro) && (! computers.isRollo)) "http://nix-cache.dubronetwork.fr:5001")
|
||||||
|
|
||||||
(mkIf profiles.isPrunetwork "https://cache.nixos.org/")
|
(mkIf profiles.isPrunetwork "https://cache.nixos.org/")
|
||||||
|
|||||||
@@ -19,13 +19,9 @@ mkIf cfg.nix-serve-server {
|
|||||||
# Réseau
|
# Réseau
|
||||||
networking.firewall = {
|
networking.firewall = {
|
||||||
allowedTCPPorts = [
|
allowedTCPPorts = [
|
||||||
#5000 # ouvert sur tinc
|
5000
|
||||||
];
|
];
|
||||||
allowedUDPPorts = [
|
allowedUDPPorts = [
|
||||||
];
|
];
|
||||||
extraCommands = ''
|
|
||||||
iptables -A INPUT -i tinc.grudunet -p tcp --dport 5000 -j ACCEPT
|
|
||||||
ip6tables -A INPUT -i tinc.grudunet -p tcp --dport 5000 -j ACCEPT
|
|
||||||
'';
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -49,9 +49,8 @@ in
|
|||||||
hydra-builder = mkEnableOption "Profil pour une machine qui compile pour hydra.";
|
hydra-builder = mkEnableOption "Profil pour une machine qui compile pour hydra.";
|
||||||
hydra-core = mkEnableOption "Profil pour un serveur hydra.";
|
hydra-core = mkEnableOption "Profil pour un serveur hydra.";
|
||||||
kibana = mkEnableOption "Profil pour activer le service kibana.";
|
kibana = mkEnableOption "Profil pour activer le service kibana.";
|
||||||
jetbrains-licensed = mkEnableOption "Profil pour la suite de développement Jetbrains payante (sous-ensemble).";
|
|
||||||
jeux = mkEnableOption "Profil pour les jeux vidéos.";
|
jeux = mkEnableOption "Profil pour les jeux vidéos.";
|
||||||
laptop = mkEnableOption "Profil pour les outils spécifiques aux ordinateurs portables.";
|
laptop = mkEnableOption "Profil pour les outils spécifiques aux ordinateurs portables..";
|
||||||
locate = mkEnableOption "Profil pour activer la fonction locate.";
|
locate = mkEnableOption "Profil pour activer la fonction locate.";
|
||||||
mailboxes = mkEnableOption "Profil pour stocker les mails dans des boîtes aux lettres.";
|
mailboxes = mkEnableOption "Profil pour stocker les mails dans des boîtes aux lettres.";
|
||||||
murmur = mkEnableOption "Profil pour activer un serveur Mumble (murmur)";
|
murmur = mkEnableOption "Profil pour activer un serveur Mumble (murmur)";
|
||||||
@@ -85,7 +84,6 @@ in
|
|||||||
};
|
};
|
||||||
#* Utilisé pour avoir des raccourcis de machine
|
#* Utilisé pour avoir des raccourcis de machine
|
||||||
r6d.computers = {
|
r6d.computers = {
|
||||||
isHydra = mkEnableOption "Identification du nom de machine.";
|
|
||||||
isLatitude = mkEnableOption "Identification du nom de machine.";
|
isLatitude = mkEnableOption "Identification du nom de machine.";
|
||||||
isMonstre = mkEnableOption "Identification du nom de machine.";
|
isMonstre = mkEnableOption "Identification du nom de machine.";
|
||||||
isNeoNomade = mkEnableOption "Identification du nom de machine.";
|
isNeoNomade = mkEnableOption "Identification du nom de machine.";
|
||||||
@@ -106,7 +104,6 @@ in
|
|||||||
{
|
{
|
||||||
r6d.config-generator.enable = true;
|
r6d.config-generator.enable = true;
|
||||||
r6d.computers = {
|
r6d.computers = {
|
||||||
isHydra = host == "hydra.prunetwork.fr";
|
|
||||||
isLatitude = host == "latitude.dubronetwork.fr";
|
isLatitude = host == "latitude.dubronetwork.fr";
|
||||||
isMonstre = host == "monstre.dubronetwork.fr";
|
isMonstre = host == "monstre.dubronetwork.fr";
|
||||||
isNeoNomade = host == "neo-nomade.dubronetwork.fr";
|
isNeoNomade = host == "neo-nomade.dubronetwork.fr";
|
||||||
@@ -209,23 +206,6 @@ in
|
|||||||
|
|
||||||
|
|
||||||
## Affectation des profils aux machines
|
## Affectation des profils aux machines
|
||||||
(mkIf comp.isHydra {
|
|
||||||
r6d.profiles = {
|
|
||||||
isPrunetwork = true;
|
|
||||||
isServer = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
r6d.config-generator = {
|
|
||||||
docker = true;
|
|
||||||
hydra-builder = true;
|
|
||||||
hydra-core = true;
|
|
||||||
tincAddress = "192.168.12.8/24";
|
|
||||||
tincExtraConfig = ''
|
|
||||||
ConnectTo = rollo_dubronetwork_fr
|
|
||||||
ConnectTo = ocean_prunetwork_fr
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
})
|
|
||||||
(mkIf comp.isOcean {
|
(mkIf comp.isOcean {
|
||||||
r6d.profiles = {
|
r6d.profiles = {
|
||||||
isPrunetwork = true;
|
isPrunetwork = true;
|
||||||
@@ -235,8 +215,6 @@ in
|
|||||||
r6d.config-generator = {
|
r6d.config-generator = {
|
||||||
docker = true;
|
docker = true;
|
||||||
radicale = true;
|
radicale = true;
|
||||||
nix-serve-client = true;
|
|
||||||
nix-serve-server = true;
|
|
||||||
tincAddress = "192.168.12.6/24";
|
tincAddress = "192.168.12.6/24";
|
||||||
tincExtraConfig = ''
|
tincExtraConfig = ''
|
||||||
ConnectTo = rollo_dubronetwork_fr
|
ConnectTo = rollo_dubronetwork_fr
|
||||||
@@ -273,7 +251,6 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
r6d.config-generator = {
|
r6d.config-generator = {
|
||||||
jetbrains-licensed = true;
|
|
||||||
laptop = true;
|
laptop = true;
|
||||||
tincAddress = "192.168.12.2/24";
|
tincAddress = "192.168.12.2/24";
|
||||||
tincExtraConfig = ''
|
tincExtraConfig = ''
|
||||||
@@ -281,7 +258,6 @@ in
|
|||||||
ConnectTo = rollo_dubronetwork_fr
|
ConnectTo = rollo_dubronetwork_fr
|
||||||
ConnectTo = ocean_prunetwork_fr
|
ConnectTo = ocean_prunetwork_fr
|
||||||
'';
|
'';
|
||||||
nix-serve-server = true;
|
|
||||||
};
|
};
|
||||||
})
|
})
|
||||||
(mkIf comp.isMonstre {
|
(mkIf comp.isMonstre {
|
||||||
@@ -294,7 +270,6 @@ in
|
|||||||
fail2ban = true;
|
fail2ban = true;
|
||||||
murmur = true;
|
murmur = true;
|
||||||
nix-serve-client = true;
|
nix-serve-client = true;
|
||||||
nix-serve-server = true;
|
|
||||||
nixStoreProxyCache = true;
|
nixStoreProxyCache = true;
|
||||||
tincAddress = "192.168.12.4/24";
|
tincAddress = "192.168.12.4/24";
|
||||||
tincExtraConfig = ''
|
tincExtraConfig = ''
|
||||||
@@ -344,8 +319,6 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
r6d.config-generator = {
|
r6d.config-generator = {
|
||||||
jetbrains-licensed = true;
|
|
||||||
hydra-core = true;
|
|
||||||
nix-serve-server = true;
|
nix-serve-server = true;
|
||||||
edition-photo = true;
|
edition-photo = true;
|
||||||
tincAddress = "192.168.12.1/24";
|
tincAddress = "192.168.12.1/24";
|
||||||
@@ -367,8 +340,6 @@ in
|
|||||||
fail2ban = true;
|
fail2ban = true;
|
||||||
mailboxes = true;
|
mailboxes = true;
|
||||||
murmur = true;
|
murmur = true;
|
||||||
nix-serve-client = true;
|
|
||||||
nix-serve-server = true;
|
|
||||||
tincAddress = "192.168.12.5/24";
|
tincAddress = "192.168.12.5/24";
|
||||||
tincExtraConfig = ''
|
tincExtraConfig = ''
|
||||||
ConnectTo = ocean_prunetwork_fr
|
ConnectTo = ocean_prunetwork_fr
|
||||||
|
|||||||
@@ -18,7 +18,6 @@ mkIf cfg.developpement-haskell {
|
|||||||
stack # pour les paquets en LTS de stackage
|
stack # pour les paquets en LTS de stackage
|
||||||
|
|
||||||
haskellPackages.stylish-haskell # qualité de code
|
haskellPackages.stylish-haskell # qualité de code
|
||||||
haskellPackages.hindent
|
|
||||||
|
|
||||||
# Application perso
|
# Application perso
|
||||||
haskellPackages.hahp
|
haskellPackages.hahp
|
||||||
|
|||||||
@@ -1,19 +0,0 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
inherit (lib) mkIf mkMerge mkThenElse;
|
|
||||||
cfg = config.r6d.config-generator;
|
|
||||||
computers = config.r6d.computers;
|
|
||||||
profiles = config.r6d.profiles;
|
|
||||||
in
|
|
||||||
|
|
||||||
mkIf cfg.jetbrains-licensed {
|
|
||||||
|
|
||||||
# Paquets
|
|
||||||
environment.systemPackages = with pkgs; [
|
|
||||||
idea.idea-ultimate
|
|
||||||
idea.clion
|
|
||||||
idea.datagrip
|
|
||||||
idea.pycharm-professional
|
|
||||||
];
|
|
||||||
}
|
|
||||||
@@ -28,7 +28,6 @@ in
|
|||||||
./app-developpement.nix # développer des programmes/scripts
|
./app-developpement.nix # développer des programmes/scripts
|
||||||
./app-developpement-haskell.nix # développer en haskell
|
./app-developpement-haskell.nix # développer en haskell
|
||||||
./app-developpement-java.nix # développer en java
|
./app-developpement-java.nix # développer en java
|
||||||
./app-developpement-jetbrains.nix # outils jetbrains
|
|
||||||
./app-developpement-rust.nix # développer en rust
|
./app-developpement-rust.nix # développer en rust
|
||||||
./app-docker.nix # activer docker
|
./app-docker.nix # activer docker
|
||||||
./app-edition-musique.nix # modifier les fichiers musicaux
|
./app-edition-musique.nix # modifier les fichiers musicaux
|
||||||
|
|||||||
@@ -73,7 +73,6 @@ mkIf cfg.hydra-core {
|
|||||||
### Machines connues
|
### Machines connues
|
||||||
|
|
||||||
programs.ssh.knownHosts = {
|
programs.ssh.knownHosts = {
|
||||||
"hydra.prunetwork.fr".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMhXFlj2oyArVyEwEwDxNXthB/JljHkq+UhTLxbekkMB";
|
|
||||||
"monstre.dubronetwork.fr".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBTTrLhq1Cwm0rpnwEIxSLqVrJWZnt+/9dt+SKd8NiIc";
|
"monstre.dubronetwork.fr".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBTTrLhq1Cwm0rpnwEIxSLqVrJWZnt+/9dt+SKd8NiIc";
|
||||||
"pedro.dubronetwork.fr".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIM7fjo2ysLqlfSo6BKnc6I6m1ayoPrbwEEyTKZmUzsOD";
|
"pedro.dubronetwork.fr".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIM7fjo2ysLqlfSo6BKnc6I6m1ayoPrbwEEyTKZmUzsOD";
|
||||||
"ocean.prunetwork.fr".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINCaRuTl8iCTUE4XInOpkSlwQj5Re4w4Iq+gNIlJe8pA";
|
"ocean.prunetwork.fr".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINCaRuTl8iCTUE4XInOpkSlwQj5Re4w4Iq+gNIlJe8pA";
|
||||||
|
|||||||
@@ -11,7 +11,6 @@ mkIf true {
|
|||||||
|
|
||||||
# Paquets
|
# Paquets
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
bc
|
|
||||||
mailutils
|
mailutils
|
||||||
];
|
];
|
||||||
|
|
||||||
@@ -21,7 +20,6 @@ mkIf true {
|
|||||||
services.munin-node = {
|
services.munin-node = {
|
||||||
enable = true;
|
enable = true;
|
||||||
};
|
};
|
||||||
systemd.services.munin-node.serviceConfig.TimeoutStartSec = "3min";
|
|
||||||
|
|
||||||
## Munin server -- generate /var/www/munin
|
## Munin server -- generate /var/www/munin
|
||||||
services.munin-cron = {
|
services.munin-cron = {
|
||||||
|
|||||||
@@ -13,6 +13,7 @@ mkIf profiles.isDesktop {
|
|||||||
hardware.pulseaudio = {
|
hardware.pulseaudio = {
|
||||||
enable = true;
|
enable = true;
|
||||||
support32Bit = true;
|
support32Bit = true;
|
||||||
|
daemon.config = { flat-volumes = "no"; };
|
||||||
};
|
};
|
||||||
environment.etc."pulse/daemon.conf".text = "flat-volumes = no";
|
#environment.etc."pulse/daemon.conf".text = "flat-volumes = no";
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user