2b276b2c97
Use an agent token for Woodpecker agent to stop it from re-registering
...
With the shared system token, every time the Woodpecker host would
restart, a new Woodpecker agent registration would be created, because
the agent receives a unique ID on first connection using the system
token, which it couldn't store however, because it doesn't have a
writable config file in NixOS.
Use an agent token now, which doesn't require the agent to store a
unique ID in a wrtiable config, therefore not making it re-register.
Also see:
https://woodpecker-ci.org/docs/administration/agent-config#agent-registration
2024-10-21 17:49:03 +02:00
4ec5afa360
Disable mjolnirs verbose logging to have it not spam the management room
2024-10-21 17:49:03 +02:00
b574cc09ab
Add woodpecker host running a woodpecker-server and -agent for CI
2024-10-21 17:49:03 +02:00
4e1700e8bb
flake.lock: Update
...
Flake lock file updates:
• Updated input 'nixos-generators':
'github:nix-community/nixos-generators/d14b286322c7f4f897ca4b1726ce38cb68596c94?narHash=sha256-iqQa3omRcHGpWb1ds75jS9ruA5R39FTmAkeR3J%2Bve1w%3D' (2024-05-20)
→ 'github:nix-community/nixos-generators/35c20ba421dfa5059e20e0ef2343c875372bdcf3?narHash=sha256-WZ1gdKq/9u1Ns/oXuNsDm%2BW0salonVA0VY1amw8urJ4%3D' (2024-06-10)
• Updated input 'nixpkgs':
'github:nixos/nixpkgs/de0ae76b011bf0000d58ab71821199ce310128b2?narHash=sha256-/VAxV/4lvtOtq4Zxq0MrqTGj7g8aSR/eJQDXB37ozvs%3D' (2024-06-16)
→ 'github:nixos/nixpkgs/201ed88e66f7f34d5c74e46d2e4399cc4bea1501?narHash=sha256-3vNXv4zrblZFobrxz1P3RwLpHl6X3/GzfArdTxq0%2BnI%3D' (2024-06-21)
• Updated input 'nixpkgs-unstable':
'github:nixos/nixpkgs/2ee89d5a0167a8aa0f2a5615d2b8aefb1f299cd4?narHash=sha256-2eh7rYxQOntkUjFXtlPH7lBuUDd4isu/YHRjNJW7u1Q%3D' (2024-05-23)
→ 'github:nixos/nixpkgs/1c0bec249943cd3e03f876554b8af7d1e32a09e1?narHash=sha256-uIZlOpCIi/GZ3xrkA87CAHqbTvsTbVQV1JjnP33slxs%3D' (2024-06-21)
• Updated input 'sops-nix':
'github:Mic92/sops-nix/b549832718b8946e875c016a4785d204fcfc2e53?narHash=sha256-0lMkIk9h3AzOHs1dCL9RXvvN4PM8VBKb%2BcyGsqOKa4c%3D' (2024-05-22)
→ 'github:Mic92/sops-nix/797ce4c1f45a85df6dd3d9abdc53f2691bea9251?narHash=sha256-Pm9I/BMQHbsucdWf6y9G3xBZh3TMlThGo4KBbeoeczg%3D' (2024-06-16)
• Updated input 'sops-nix/nixpkgs-stable':
'github:NixOS/nixpkgs/e7cc61784ddf51c81487637b3031a6dd2d6673a2?narHash=sha256-H0eCta7ahEgloGIwE/ihkyGstOGu%2BkQwAiHvwVoXaA0%3D' (2024-05-18)
→ 'github:NixOS/nixpkgs/c884223af91820615a6146af1ae1fea25c107005?narHash=sha256-v43N1gZLcGkhg3PdcrKUNIZ1L0FBzB2JqhIYEyKAHEs%3D' (2024-06-15)
2024-10-21 17:49:03 +02:00
024451942e
Add mjolnir host running mjolnir for Matrix moderation
...
Also see:
https://wiki.hamburg.ccc.de/infrastructure:services:mjolnir
2024-10-21 17:49:02 +02:00
2ee045a296
Use forgejo package from stable (24.05) instead of from unstable
2024-10-21 17:47:58 +02:00
49a2dc6306
Upgrade to NixOS 24.05
...
Also bump the default state version to 24.05.
See the release notes of the 24.05 release for more information:
https://nixos.org/manual/nixos/stable/release-notes#sec-release-24.05
2024-10-21 17:47:58 +02:00
b6d48859cc
Add hacker.tours and a staging env. similar to the CCCHH website one
2024-10-21 17:47:58 +02:00
8a6820a418
Add mqtt server (mosquitto)
...
The config was based on the exsisting mosquitto setup.
2024-10-21 17:47:58 +02:00
c556475efd
Bump element-web to 1.11.68
2024-10-21 17:47:58 +02:00
2492eb970f
Mark nix code blocks as containing nix code for syntax highlighting
2024-10-21 17:47:58 +02:00
903725dc18
Document where a secret is then actually available on the host
2024-10-21 17:47:58 +02:00
549c9b1e33
Add ssh-to-age to the admin tooling
2024-10-21 17:47:58 +02:00
a355321979
Document how to use sops and sops-nix
2024-10-21 17:47:58 +02:00
e24b5b6fb1
fix yate-config not pulling
2024-09-08 21:08:17 +02:00
fb458e244b
fix yate deploy key
2024-09-08 21:07:47 +02:00
f9f258a212
change yate-config repo
2024-09-08 18:52:22 +02:00
c62f722899
make sure source is available before deleting config
2024-08-08 20:11:42 +02:00
c9967f73c0
decolour the log because of blob data
2024-08-07 18:53:15 +02:00
3b83a5d8ab
recreate the full config everytime
2024-08-07 18:51:12 +02:00
149f846d32
create yate service user
2024-08-07 18:03:17 +02:00
fd525ee06f
make yate systemd service
2024-08-06 22:06:26 +02:00
1ef4c1cd48
Fix config via git
2024-08-05 20:58:09 +02:00
b4de5dbb53
introduce /etc/yate, clone/reset on service start
2024-06-09 18:26:27 +02:00
2037a1b647
add yate service for autostart
2024-06-08 23:53:52 +02:00
579b63fe89
Update authorizedKeysRepo rev in common/users.nix
...
to add echtnurich secondary device key
2024-06-08 21:39:24 +02:00
ef1710b09f
Configure basic yate host
2024-06-08 20:18:59 +02:00
46e43e51aa
Add deployment_configuration to make deployment using infra-rebuild work
...
Also document usage of infra-rebuild and its configuration file.
2024-06-08 19:57:40 +02:00
9d7f9d0ec8
Emulate aarch64-linux on nix-box-june to be able to build aarch64 pkgs
2024-06-06 20:17:00 +02:00
41f04732c2
Switch from colmena to standard nixosConfigurations
...
Those can then be deployed using for example nixos-rebuild or bij.
Also ensure all hosts have an fqdn, where possible, in order for bij to
be able to work with them more easily. Tho not really, since for actual
deployment one still needs to set the target manually to set usage of
the colmena-deploy user.
https://git.clerie.de/clerie/bij
2024-05-27 01:43:53 +02:00
a7541eefa8
Add tools and other stuff for a more comf. admin enviorn. on the hosts
2024-05-26 18:32:55 +02:00
58ec317b02
Use IP address for eh22-wiki, which isn't already in use
2024-05-26 18:00:20 +02:00
7c7da0db05
Add a nix box managed by June
...
Every admin can login as its own user with the keys listed here:
https://git.hamburg.ccc.de/CCCHH/infrastructure-authorized-keys/src/branch/trunk/authorized_keys
2024-05-26 14:39:28 +02:00
3aae597752
Switch the public-web-static hosts secret mngmt from colmena to sops-nix
2024-05-26 03:49:43 +02:00
dc439abefe
Switch the netbox hosts secret management from colmena to sops-nix
2024-05-26 03:14:31 +02:00
154edc1972
Switch the matrix hosts secret management from colmena to sops-nix
2024-05-26 03:01:34 +02:00
361ccac69f
Switch the forgejo-actions-runners secret mngmt from colmena to sops-nix
2024-05-26 02:50:08 +02:00
88e3da11a6
Introduce sops and sops-nix for secret management
...
Use the GPG keys used for the password-store noc directory for the admin
keys.
Switch the git hosts secret management from colmena to sops-nix.
https://github.com/getsops/sops
https://github.com/Mic92/sops-nix
2024-05-25 16:47:34 +02:00
eab3523033
Make MPD be put into pause mode instead of start. playback after startup
2024-05-23 22:25:32 +02:00
ca816ba50b
flake.lock: Update
...
Flake lock file updates:
• Updated input 'nixos-generators':
'github:nix-community/nixos-generators/722b512eb7e6915882f39fff0e4c9dd44f42b77e?narHash=sha256-3yh0nqI1avYUmmtqqTW3EVfwaLE%2B9ytRWxsA5aWtmyI%3D' (2024-04-22)
→ 'github:nix-community/nixos-generators/d14b286322c7f4f897ca4b1726ce38cb68596c94?narHash=sha256-iqQa3omRcHGpWb1ds75jS9ruA5R39FTmAkeR3J%2Bve1w%3D' (2024-05-20)
• Updated input 'nixpkgs':
'github:nixos/nixpkgs/8a4282c38b6cbea9f0989c0eafc6ce1837a26442?narHash=sha256-t1t39%2B9F0NSrUQQsvrQ0Ym/BfnOtjgXnJVn8daI3968%3D' (2024-05-13)
→ 'github:nixos/nixpkgs/dff68ababdd2c2616d03f26546ba632f5f09d3c6?narHash=sha256-e4pjcLqe1Dexz7enk/%2Bui0aVdcoSiWnrTGjk7KLtAPw%3D' (2024-05-22)
• Updated input 'nixpkgs-unstable':
'github:nixos/nixpkgs/7ed944be63682d0c5bc37e66f3c997390d0bbd8e?narHash=sha256-ncgLV/zSzXGx8XXEM8QlovDftzzcV11MnLeRUL63Szw%3D' (2024-05-13)
→ 'github:nixos/nixpkgs/2ee89d5a0167a8aa0f2a5615d2b8aefb1f299cd4?narHash=sha256-2eh7rYxQOntkUjFXtlPH7lBuUDd4isu/YHRjNJW7u1Q%3D' (2024-05-23)
2024-05-23 21:25:22 +02:00
475ab8cc66
Configure EH22 Wiki
2024-05-17 20:42:48 +02:00
320f4afb4a
flake.lock: Update
...
Flake lock file updates:
• Updated input 'nixpkgs':
'github:nixos/nixpkgs/d4df7c26d03e94dbdabbd350cb89c9565cae07bb?narHash=sha256-TFRzgAjRgwXpDucaPZfVz9mRyH2wGM6oYABe1q/20iI%3D' (2024-04-22)
→ 'github:nixos/nixpkgs/8a4282c38b6cbea9f0989c0eafc6ce1837a26442?narHash=sha256-t1t39%2B9F0NSrUQQsvrQ0Ym/BfnOtjgXnJVn8daI3968%3D' (2024-05-13)
• Updated input 'nixpkgs-unstable':
'github:nixos/nixpkgs/de52a47e961d45f6a8c7f9f086c60ff89ecdddaf?narHash=sha256-HLpr4EgxIRB1UJCpupvF%2BAi8pFa93BJh8anPJ68FwOI%3D' (2024-04-22)
→ 'github:nixos/nixpkgs/7ed944be63682d0c5bc37e66f3c997390d0bbd8e?narHash=sha256-ncgLV/zSzXGx8XXEM8QlovDftzzcV11MnLeRUL63Szw%3D' (2024-05-13)
2024-05-14 03:46:01 +02:00
c378fc64c6
Deploy shairport-sync with more verbosity for easier debugging
2024-04-28 19:51:45 +02:00
c96486aa91
Let MPD mix the audio itself to work around PW/WP restore bug
...
jtbx discovered that MPD is using the Pipewire stream volume for volume
control, but that when Pipewire/Wireplumber restores the stream volumes
on restart, it wrongly assigns the MPD stream volume to the Shaireport
Sync stream as well.
Work around that bug by making MPD mix itself and not through
Pipewire/Wireplumber.
2024-04-27 23:28:31 +02:00
14bbdea9dc
Add MPD to audio service module
2024-04-23 19:12:16 +02:00
856c4ac696
flake.lock: Update
...
Flake lock file updates:
• Updated input 'nixos-generators':
'github:nix-community/nixos-generators/d942db8df8ee860556a38754f15b8d03bf7e6933?narHash=sha256-yYlxv1sg/TNl6hghjAe0ct%2B/p5PwXiT1mpuaExjhR88%3D' (2024-04-08)
→ 'github:nix-community/nixos-generators/722b512eb7e6915882f39fff0e4c9dd44f42b77e?narHash=sha256-3yh0nqI1avYUmmtqqTW3EVfwaLE%2B9ytRWxsA5aWtmyI%3D' (2024-04-22)
• Updated input 'nixpkgs':
'github:nixos/nixpkgs/6ec8515bc79f396159a67b2ed8012b2e988d9dc6?narHash=sha256-x4RVSeo0qq099PEdCOGHrJ/mpUKIhTCJDTy4hI1U%2BGs%3D' (2024-04-14)
→ 'github:nixos/nixpkgs/d4df7c26d03e94dbdabbd350cb89c9565cae07bb?narHash=sha256-TFRzgAjRgwXpDucaPZfVz9mRyH2wGM6oYABe1q/20iI%3D' (2024-04-22)
• Updated input 'nixpkgs-unstable':
'github:nixos/nixpkgs/bc59f72803cf40fb50f05cb73068d85b5ce21297?narHash=sha256-goBKZ4CKodTfkKaEGhpYOz545gnXmLfmn8gjiq7PLpU%3D' (2024-04-14)
→ 'github:nixos/nixpkgs/de52a47e961d45f6a8c7f9f086c60ff89ecdddaf?narHash=sha256-HLpr4EgxIRB1UJCpupvF%2BAi8pFa93BJh8anPJ68FwOI%3D' (2024-04-22)
2024-04-22 21:13:11 +02:00
bc6af32a36
Update spaceapid to latest commit and use correct logo URL
2024-04-15 17:07:50 +02:00
b229494eac
flake.lock: Update
...
Flake lock file updates:
• Updated input 'nixos-generators':
'github:nix-community/nixos-generators/bef32a05496d9480b02be586fa7827748b9e597b?narHash=sha256-803UIoB8%2BvGkm/VK/g55aBAAOf/ncTGvxXyjTF4ydm0%3D' (2024-03-08)
→ 'github:nix-community/nixos-generators/d942db8df8ee860556a38754f15b8d03bf7e6933?narHash=sha256-yYlxv1sg/TNl6hghjAe0ct%2B/p5PwXiT1mpuaExjhR88%3D' (2024-04-08)
• Updated input 'nixos-generators/nixlib':
'github:nix-community/nixpkgs.lib/7873d84a89ae6e4841528ff7f5697ddcb5bdfe6c?narHash=sha256-jLBZmwXf0WYHzLkmEMq33bqhX55YtT5edvluFr0RcSA%3D' (2024-03-03)
→ 'github:nix-community/nixpkgs.lib/3c62b6a12571c9a7f65ab037173ee153d539905f?narHash=sha256-K6IkdtMtq9xktmYPj0uaYc8NsIqHuaAoRBaMgu9Fvrw%3D' (2024-04-07)
• Updated input 'nixpkgs':
'github:nixos/nixpkgs/fcaa81ed3c273237217330cf342ef1873b77c80a?narHash=sha256-LW84B4vM1cn7E6cDNQn2LndT9iJXI1dRE5fwbNFbQa8%3D' (2024-03-09)
→ 'github:nixos/nixpkgs/6ec8515bc79f396159a67b2ed8012b2e988d9dc6?narHash=sha256-x4RVSeo0qq099PEdCOGHrJ/mpUKIhTCJDTy4hI1U%2BGs%3D' (2024-04-14)
• Updated input 'nixpkgs-unstable':
'github:nixos/nixpkgs/e389a1133d14925b942e0ad76ce75f32637db20d?narHash=sha256-W3KoCToX0gnwpZARkRteYd8Ns0Kie3C4u057YepUP5I%3D' (2024-03-09)
→ 'github:nixos/nixpkgs/bc59f72803cf40fb50f05cb73068d85b5ce21297?narHash=sha256-goBKZ4CKodTfkKaEGhpYOz545gnXmLfmn8gjiq7PLpU%3D' (2024-04-14)
2024-04-14 18:50:13 +02:00
c97f169b77
Add print server for label printer to have it easily usable via SSH
...
Add and configure a print server for the Brother P-touch QL 500 label
printer, so that it can be easily used via SSH.
Do the following to make that work:
- Configure the print server host.
- Package printer-driver-ptouch to have a working driver for the label
printer.
- Configure CUPS.
- Add a script "forcecommand-lpr-wrapper", which works together with the
ForceCommand sshd_config option and wraps lpr to provide an easy
interface to use the Brother QL 500 label printer via SSH.
- Add a print user and configure SSH to have the
"forcecommand-lpr-wrapper" script accessible without a password using
the print user via SSH.
2024-04-14 18:46:51 +02:00
6a0218c132
Serve old easterhegg pages from public-web-static.
...
The old easterhegg pages from 2003, 2005, 2007, 2009, 2011 are served on the
easterhegg.eu domain and all old subdomains under hamburg.ccc.de
redirect to the corresponding pages under easterhegg.eu
2024-03-29 16:16:13 +01:00