Compare commits
7 Commits
2017-05-11
...
2017-05-19
| Author | SHA1 | Date | |
|---|---|---|---|
| ff733c5d08 | |||
| d3f1f2121e | |||
|
|
cdd75e063d | ||
| a816a81b9e | |||
| aa6ae3cc8d | |||
| 419a1cbf53 | |||
| b03d4acfe2 |
@@ -18,7 +18,7 @@ Actuellement, les scripts contiennent un peu de configuration spécifique pour l
|
||||
* mettre à jour les dépôts avec les dernières versions, `make submodules-update`
|
||||
* tester la configuration : `nixos-rebuild build`
|
||||
* corriger et ajouter les éléments manquant (notamment dans `private/annuaire.nix` )
|
||||
* vérifier que `configuration.nix` ne contient pas `services.xserver.enable = true;`
|
||||
* vérifier que `configuration.nix` contient `services.xserver.enable = true;` pour les machines avec interface graphique
|
||||
* lorsque tout semble bon, vérifier :
|
||||
* qu'il y a toujours des utilisateurs dans la configuration
|
||||
* que le moyen d'accéder à la machine n'a pas été supprimé (surtout les machines distantes)
|
||||
|
||||
@@ -32,6 +32,7 @@ mkIf true {
|
||||
#python34Packages.glances # monitoring
|
||||
pwgen # générateur de mot de passe
|
||||
rtorrent # TODO outil de téléchargement de torrent & magnet
|
||||
shared_mime_info # MIME info
|
||||
tmux # nécessaire pour byobu
|
||||
tree # affiche une arborescence de fichiers et dossiers
|
||||
usbutils
|
||||
|
||||
@@ -138,25 +138,6 @@ in
|
||||
|
||||
|
||||
## Affectation des profils aux machines
|
||||
(mkIf comp.isHydra {
|
||||
networking.hostName = "hydra.prunetwork.fr"; # Define your hostname.
|
||||
r6d.profiles = {
|
||||
isPrunetwork = true;
|
||||
isServer = true;
|
||||
};
|
||||
|
||||
r6d.config-generator = {
|
||||
docker = true;
|
||||
hydra-builder = true;
|
||||
hydra-core = true;
|
||||
nix-serve-server = true;
|
||||
tincAddress = "192.168.12.9/24";
|
||||
tincExtraConfig = ''
|
||||
ConnectTo = rollo_dubronetwork_fr
|
||||
ConnectTo = ocean_prunetwork_fr
|
||||
'';
|
||||
};
|
||||
})
|
||||
(mkIf comp.isOcean {
|
||||
networking.hostName = "ocean.prunetwork.fr"; # Define your hostname.
|
||||
r6d.profiles = {
|
||||
@@ -177,31 +158,6 @@ in
|
||||
'';
|
||||
};
|
||||
})
|
||||
(mkIf comp.isRadx {
|
||||
networking.hostName = "radx.prunetwork.fr"; # Define your hostname.
|
||||
r6d.profiles = {
|
||||
isPrunetwork = true;
|
||||
isWorkstation = true;
|
||||
};
|
||||
|
||||
r6d.config-generator = {
|
||||
database_postgres = true;
|
||||
elasticsearch = true;
|
||||
#hydra-core = false; # DO NOT ENABLE ON WORKSTATION
|
||||
kibana = true;
|
||||
nix-serve-client = true;
|
||||
nix-serve-server = true;
|
||||
#rabbitmq = true;
|
||||
tincAddress = "192.168.12.3/24";
|
||||
tincExtraConfig = ''
|
||||
ConnectTo = monstre_dubronetwork_fr
|
||||
ConnectTo = rollo_dubronetwork_fr
|
||||
ConnectTo = hydra_prunetwork_fr
|
||||
ConnectTo = ocean_prunetwork_fr
|
||||
'';
|
||||
virtualbox = true;
|
||||
};
|
||||
})
|
||||
|
||||
(mkIf comp.isLatitude {
|
||||
networking.hostName = "latitude.dubronetwork.fr"; # Define your hostname.
|
||||
@@ -224,27 +180,7 @@ in
|
||||
'';
|
||||
};
|
||||
})
|
||||
(mkIf comp.isMonstre {
|
||||
networking.hostName = "monstre.dubronetwork.fr"; # Define your hostname.
|
||||
r6d.profiles = {
|
||||
isDubronetwork = true;
|
||||
isServer = true;
|
||||
};
|
||||
|
||||
r6d.config-generator = {
|
||||
fail2ban = true;
|
||||
murmur = true;
|
||||
nix-serve-client = true;
|
||||
nix-serve-server = true;
|
||||
nixStoreProxyCache = true;
|
||||
tincAddress = "192.168.12.4/24";
|
||||
tincExtraConfig = ''
|
||||
ConnectTo = rollo_dubronetwork_fr
|
||||
ConnectTo = hydra_prunetwork_fr
|
||||
ConnectTo = ocean_prunetwork_fr
|
||||
'';
|
||||
};
|
||||
})
|
||||
(mkIf comp.isNeoNomade{
|
||||
networking.hostName = "neo-nomade.dubronetwork.fr"; # Define your hostname.
|
||||
r6d.profiles = {
|
||||
|
||||
38
options.nix
38
options.nix
@@ -128,6 +128,10 @@ let
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
annuaire = config.r6d.machines;
|
||||
currentMachine = annuaire."${config.networking.hostName}";
|
||||
flags = currentMachine.configuration-flags;
|
||||
in
|
||||
|
||||
{
|
||||
@@ -139,4 +143,38 @@ in
|
||||
'';
|
||||
};
|
||||
};
|
||||
|
||||
config = {
|
||||
/**
|
||||
prototype : (expression A ) && tests || !(expression A) -> réalise le test si A est satisfait, et continue sinon = pas de politique
|
||||
*/
|
||||
assertions = [
|
||||
{
|
||||
assertion = (currentMachine.profiles.isWorkstation && (currentMachine.profiles.isDesktopEnvironment == true))
|
||||
|| (!currentMachine.profiles.isWorkstation);
|
||||
message = "A workstation requires a graphical environement.";
|
||||
}
|
||||
{
|
||||
assertion = (currentMachine.profiles.isDesktopEnvironment && (config.services.xserver.enable == true))
|
||||
|| (!currentMachine.profiles.isDesktopEnvironment);
|
||||
message = "You need to enable xserver manually.";
|
||||
}
|
||||
{
|
||||
assertion = (currentMachine.profiles.isServer && (currentMachine.profiles.isDesktopEnvironment == false))
|
||||
|| (!currentMachine.profiles.isServer);
|
||||
message = "A graphical environment is not required for a server.";
|
||||
}
|
||||
{
|
||||
/* At least one (authorité or resolveur) */
|
||||
assertion = flags.dns_autorite || flags.dns_resolveur;
|
||||
message = "DNS service is disabled. You must enable a dns recursor or autoritative.";
|
||||
}
|
||||
{
|
||||
/* authorité xor resolveur */
|
||||
assertion = (flags.dns_autorite && ! flags.dns_resolveur)
|
||||
|| (!flags.dns_autorite && flags.dns_resolveur);
|
||||
message = "Both authoritative and recursor DNS services can't be live simultaneously. Choose only one!";
|
||||
}
|
||||
];
|
||||
};
|
||||
}
|
||||
|
||||
@@ -13,6 +13,7 @@ in
|
||||
./haveged.nix
|
||||
./monitoring-munin.nix
|
||||
./ssh.nix
|
||||
./yubikey.nix
|
||||
|
||||
# commandées par config-generator
|
||||
## option de configuration spécifique
|
||||
|
||||
42
services/yubikey.nix
Normal file
42
services/yubikey.nix
Normal file
@@ -0,0 +1,42 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
inherit (lib) mkIf mkMerge mkThenElse;
|
||||
annuaire = config.r6d.machines;
|
||||
currentMachine = annuaire."${config.networking.hostName}";
|
||||
flags = currentMachine.configuration-flags;
|
||||
in
|
||||
|
||||
mkIf true {
|
||||
|
||||
# Services
|
||||
# https://github.com/NixOS/nixpkgs/issues/15960
|
||||
|
||||
services = {
|
||||
pcscd.enable = true;
|
||||
|
||||
udev.packages = with pkgs; [
|
||||
libu2f-host
|
||||
yubikey-personalization
|
||||
];
|
||||
|
||||
xserver.displayManager.sessionCommands = ''
|
||||
# https://github.com/NixOS/nixpkgs/commit/5391882ebd781149e213e8817fba6ac3c503740c
|
||||
gpg-connect-agent /bye
|
||||
GPG_TTY=$(tty)
|
||||
export GPG_TTY
|
||||
'';
|
||||
};
|
||||
users.extraGroups.yubikey = {};
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
gnupg opensc pcsctools libu2f-host yubikey-personalization
|
||||
];
|
||||
|
||||
security.pam.enableU2F = true;
|
||||
|
||||
/*users.extraUsers.joko = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "wheel" "input" "audio" "video" ];
|
||||
};*/
|
||||
}
|
||||
Reference in New Issue
Block a user