format files with nix fmt
This commit is contained in:
parent
1283d7664f
commit
39b73b0926
|
@ -21,7 +21,8 @@ let
|
||||||
app = "dokuwiki";
|
app = "dokuwiki";
|
||||||
domain = "eh22.easterhegg.eu";
|
domain = "eh22.easterhegg.eu";
|
||||||
dataDir = "/srv/www/${domain}";
|
dataDir = "/srv/www/${domain}";
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
systemd.tmpfiles.rules = [
|
systemd.tmpfiles.rules = [
|
||||||
"d ${dataDir} 0755 ${app} ${app}"
|
"d ${dataDir} 0755 ${app} ${app}"
|
||||||
];
|
];
|
||||||
|
@ -76,7 +77,7 @@ in {
|
||||||
default = true;
|
default = true;
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
serverName = "${domain}";
|
serverName = "${domain}";
|
||||||
|
|
||||||
listen = [
|
listen = [
|
||||||
{
|
{
|
||||||
addr = "0.0.0.0";
|
addr = "0.0.0.0";
|
||||||
|
|
|
@ -1,10 +1,10 @@
|
||||||
{ ... }:
|
{ ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
networking = {
|
networking = {
|
||||||
hostName = "mqtt";
|
hostName = "mqtt";
|
||||||
domain = "z9.ccchh.net";
|
domain = "z9.ccchh.net";
|
||||||
};
|
};
|
||||||
|
|
||||||
system.stateVersion = "23.11";
|
system.stateVersion = "23.11";
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,9 +1,9 @@
|
||||||
{ pkgs, ... }:
|
{ pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./configuration.nix
|
./configuration.nix
|
||||||
./networking.nix
|
./networking.nix
|
||||||
./mosquitto.nix
|
./mosquitto.nix
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
|
@ -5,29 +5,29 @@
|
||||||
{ ... }:
|
{ ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
services.mosquitto = {
|
services.mosquitto = {
|
||||||
enable = true;
|
enable = true;
|
||||||
persistence = true;
|
persistence = true;
|
||||||
|
|
||||||
# set config for all listeners
|
# set config for all listeners
|
||||||
listeners = [ {
|
listeners = [{
|
||||||
settings.allow_anonymous = true;
|
settings.allow_anonymous = true;
|
||||||
omitPasswordAuth = true;
|
omitPasswordAuth = true;
|
||||||
acl = ["topic readwrite #"];
|
acl = [ "topic readwrite #" ];
|
||||||
} ];
|
}];
|
||||||
|
|
||||||
bridges.winkekatz = {
|
bridges.winkekatz = {
|
||||||
addresses = [
|
addresses = [
|
||||||
{ address = "mqtt.winkekatze24.de"; }
|
{ address = "mqtt.winkekatze24.de"; }
|
||||||
];
|
];
|
||||||
topics = [
|
topics = [
|
||||||
"winkekatze/allcats/eye/set in 2"
|
"winkekatze/allcats/eye/set in 2"
|
||||||
"winkekatze/allcats in 2"
|
"winkekatze/allcats in 2"
|
||||||
"+/status out 2 winkekatze/ \"\""
|
"+/status out 2 winkekatze/ \"\""
|
||||||
"+/connected out 2 winkekatze/ \"\""
|
"+/connected out 2 winkekatze/ \"\""
|
||||||
];
|
];
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
};
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 1883 ];
|
networking.firewall.allowedTCPPorts = [ 1883 ];
|
||||||
}
|
}
|
||||||
|
|
|
@ -26,7 +26,7 @@
|
||||||
};
|
};
|
||||||
yuri = {
|
yuri = {
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
openssh.authorizedKeys.keys = [
|
openssh.authorizedKeys.keys = [
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDdk3FLQRoCWxdOxg4kHcPqAu3QQOs/rY9na2Al2ilGl yuri@violet"
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDdk3FLQRoCWxdOxg4kHcPqAu3QQOs/rY9na2Al2ilGl yuri@violet"
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJEvM35w+UaSpDTuaG5pGPgfHcfwscr+wSZN9Z5Jle82 yuri@kiara"
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJEvM35w+UaSpDTuaG5pGPgfHcfwscr+wSZN9Z5Jle82 yuri@kiara"
|
||||||
];
|
];
|
||||||
|
|
|
@ -4,7 +4,8 @@ let
|
||||||
domain = "hacker.tours";
|
domain = "hacker.tours";
|
||||||
dataDir = "/var/www/${domain}";
|
dataDir = "/var/www/${domain}";
|
||||||
deployUser = "hackertours-website-deploy";
|
deployUser = "hackertours-website-deploy";
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services.nginx.virtualHosts = {
|
services.nginx.virtualHosts = {
|
||||||
"acme-${domain}" = {
|
"acme-${domain}" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
|
|
|
@ -4,7 +4,8 @@ let
|
||||||
domain = "hackertours.hamburg.ccc.de";
|
domain = "hackertours.hamburg.ccc.de";
|
||||||
dataDir = "/var/www/${domain}";
|
dataDir = "/var/www/${domain}";
|
||||||
deployUser = "ht-ccchh-website-deploy";
|
deployUser = "ht-ccchh-website-deploy";
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services.nginx.virtualHosts = {
|
services.nginx.virtualHosts = {
|
||||||
"acme-${domain}" = {
|
"acme-${domain}" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{...}:
|
{ ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
|
@ -9,4 +9,4 @@
|
||||||
./eh11.nix
|
./eh11.nix
|
||||||
./eh20.nix
|
./eh20.nix
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
|
@ -6,7 +6,7 @@ let
|
||||||
rev = "74977c56486cd060566bf06678a936e801952f9e";
|
rev = "74977c56486cd060566bf06678a936e801952f9e";
|
||||||
hash = "sha256-ded/NO+Jex2Sa4yWAIRpqANsv8i0vKmJSkM5r9KxaVk=";
|
hash = "sha256-ded/NO+Jex2Sa4yWAIRpqANsv8i0vKmJSkM5r9KxaVk=";
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
security.acme.certs."eh03.easterhegg.eu".extraDomainNames = [
|
security.acme.certs."eh03.easterhegg.eu".extraDomainNames = [
|
||||||
"eh2003.hamburg.ccc.de"
|
"eh2003.hamburg.ccc.de"
|
||||||
|
@ -48,7 +48,7 @@ in
|
||||||
}];
|
}];
|
||||||
|
|
||||||
locations."/".return = "302 https://eh03.easterhegg.eu";
|
locations."/".return = "302 https://eh03.easterhegg.eu";
|
||||||
|
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
# Make use of the ngx_http_realip_module to set the $remote_addr and
|
# Make use of the ngx_http_realip_module to set the $remote_addr and
|
||||||
# $remote_port to the client address and client port, when using proxy
|
# $remote_port to the client address and client port, when using proxy
|
||||||
|
|
|
@ -48,7 +48,7 @@ in
|
||||||
}];
|
}];
|
||||||
|
|
||||||
locations."/".return = "302 https://eh05.easterhegg.eu";
|
locations."/".return = "302 https://eh05.easterhegg.eu";
|
||||||
|
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
# Make use of the ngx_http_realip_module to set the $remote_addr and
|
# Make use of the ngx_http_realip_module to set the $remote_addr and
|
||||||
# $remote_port to the client address and client port, when using proxy
|
# $remote_port to the client address and client port, when using proxy
|
||||||
|
@ -60,7 +60,7 @@ in
|
||||||
real_ip_header proxy_protocol;
|
real_ip_header proxy_protocol;
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
"eh05.easterhegg.eu" = {
|
"eh05.easterhegg.eu" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
useACMEHost = "eh05.easterhegg.eu";
|
useACMEHost = "eh05.easterhegg.eu";
|
||||||
|
@ -71,7 +71,7 @@ in
|
||||||
ssl = true;
|
ssl = true;
|
||||||
proxyProtocol = true;
|
proxyProtocol = true;
|
||||||
}];
|
}];
|
||||||
|
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
index = "index.shtml";
|
index = "index.shtml";
|
||||||
root = eh05;
|
root = eh05;
|
||||||
|
@ -80,7 +80,7 @@ in
|
||||||
default_type text/html;
|
default_type text/html;
|
||||||
# Enable SSI
|
# Enable SSI
|
||||||
ssi on;
|
ssi on;
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
|
|
|
@ -54,7 +54,7 @@ in
|
||||||
}];
|
}];
|
||||||
|
|
||||||
locations."/".return = "302 https://eh07.easterhegg.eu";
|
locations."/".return = "302 https://eh07.easterhegg.eu";
|
||||||
|
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
# Make use of the ngx_http_realip_module to set the $remote_addr and
|
# Make use of the ngx_http_realip_module to set the $remote_addr and
|
||||||
# $remote_port to the client address and client port, when using proxy
|
# $remote_port to the client address and client port, when using proxy
|
||||||
|
@ -86,7 +86,7 @@ in
|
||||||
default_type text/html;
|
default_type text/html;
|
||||||
# Enable SSI
|
# Enable SSI
|
||||||
ssi on;
|
ssi on;
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
|
|
|
@ -54,7 +54,7 @@ in
|
||||||
}];
|
}];
|
||||||
|
|
||||||
locations."/".return = "302 https://eh09.easterhegg.eu";
|
locations."/".return = "302 https://eh09.easterhegg.eu";
|
||||||
|
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
# Make use of the ngx_http_realip_module to set the $remote_addr and
|
# Make use of the ngx_http_realip_module to set the $remote_addr and
|
||||||
# $remote_port to the client address and client port, when using proxy
|
# $remote_port to the client address and client port, when using proxy
|
||||||
|
@ -86,7 +86,7 @@ in
|
||||||
default_type text/html;
|
default_type text/html;
|
||||||
# Enable SSI
|
# Enable SSI
|
||||||
ssi on;
|
ssi on;
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
# Make use of the ngx_http_realip_module to set the $remote_addr and
|
# Make use of the ngx_http_realip_module to set the $remote_addr and
|
||||||
|
|
|
@ -54,7 +54,7 @@ in
|
||||||
}];
|
}];
|
||||||
|
|
||||||
locations."/".return = "302 https://eh11.easterhegg.eu";
|
locations."/".return = "302 https://eh11.easterhegg.eu";
|
||||||
|
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
# Make use of the ngx_http_realip_module to set the $remote_addr and
|
# Make use of the ngx_http_realip_module to set the $remote_addr and
|
||||||
# $remote_port to the client address and client port, when using proxy
|
# $remote_port to the client address and client port, when using proxy
|
||||||
|
@ -86,7 +86,7 @@ in
|
||||||
default_type text/html;
|
default_type text/html;
|
||||||
# Enable SSI
|
# Enable SSI
|
||||||
ssi on;
|
ssi on;
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
|
|
|
@ -4,7 +4,8 @@ let
|
||||||
domain = "staging.hacker.tours";
|
domain = "staging.hacker.tours";
|
||||||
dataDir = "/var/www/${domain}";
|
dataDir = "/var/www/${domain}";
|
||||||
deployUser = "hackertours-website-deploy";
|
deployUser = "hackertours-website-deploy";
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services.nginx.virtualHosts = {
|
services.nginx.virtualHosts = {
|
||||||
"acme-${domain}" = {
|
"acme-${domain}" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
|
|
|
@ -4,7 +4,8 @@ let
|
||||||
domain = "staging.hackertours.hamburg.ccc.de";
|
domain = "staging.hackertours.hamburg.ccc.de";
|
||||||
dataDir = "/var/www/${domain}";
|
dataDir = "/var/www/${domain}";
|
||||||
deployUser = "ht-ccchh-website-deploy";
|
deployUser = "ht-ccchh-website-deploy";
|
||||||
in {
|
in
|
||||||
|
{
|
||||||
services.nginx.virtualHosts = {
|
services.nginx.virtualHosts = {
|
||||||
"acme-${domain}" = {
|
"acme-${domain}" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
|
|
|
@ -6,16 +6,16 @@
|
||||||
description = "Yate telehony engine";
|
description = "Yate telehony engine";
|
||||||
unitConfig = {
|
unitConfig = {
|
||||||
Type = "simple";
|
Type = "simple";
|
||||||
After="network.target";
|
After = "network.target";
|
||||||
};
|
};
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
ExecStart = "${pkgs.yate}/bin/yate -c /yate -e /yate/share -Do";
|
ExecStart = "${pkgs.yate}/bin/yate -c /yate -e /yate/share -Do";
|
||||||
Type="simple";
|
Type = "simple";
|
||||||
Restart="always";
|
Restart = "always";
|
||||||
# ...
|
# ...
|
||||||
};
|
};
|
||||||
wantedBy = [ "default.target" ];
|
wantedBy = [ "default.target" ];
|
||||||
requiredBy = [ "network.target" ];
|
requiredBy = [ "network.target" ];
|
||||||
# ...
|
# ...
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue