Author: eelco
Date: Wed Oct 5 13:14:51 2011
New Revision: 29660
URL: https://ssl.nixos.org/websvn/nix/?rev=29660&sc=1
Log:
Modified:
configurations/trunk/tud/cartman.nix
Modified: configurations/trunk/tud/cartman.nix
==============================================================================
--- configurations/trunk/tud/cartman.nix Wed Oct 5 12:33:40 2011
(r29659)
+++ configurations/trunk/tud/cartman.nix Wed Oct 5 13:14:51 2011
(r29660)
@@ -37,6 +37,8 @@
loader.grub.copyKernels = true;
initrd.kernelModules = ["arcmsr"];
kernelModules = ["kvm-intel"];
+ vesa = false; # otherwise "out of sync" on the KVM switch
+ blacklistedKernelModules = [ "i915" ];
};
fileSystems =
@@ -86,10 +88,14 @@
extraHosts = "192.168.1.5 cartman";
firewall.enable = true;
- firewall.allowedTCPPorts = [ 80 443 10051 ];
+ firewall.allowedTCPPorts = [ 80 443 843 10051 5999 ];
firewall.allowedUDPPorts = [ 53 67 ];
firewall.rejectPackets = true;
firewall.allowPing = true;
+ firewall.extraCommands =
+ ''
+ ip46tables -I nixos-fw-accept -p tcp --dport 843 --syn -j LOG
--log-level info --log-prefix "POLICY REQUEST: "
+ '';
nat.enable = true;
nat.internalIPs = "192.168.1.0/22";
@@ -98,8 +104,10 @@
localCommands =
''
+ ${pkgs.iptables}/sbin/iptables -t nat -F PREROUTING
+
# lucifer ssh (to give Karl/Armijn access for the BAT project)
- #iptables -t nat -A PREROUTING -p tcp -i eth1 --dport 22222 -j DNAT
--to 192.168.1.25:22
+ ${pkgs.iptables}/sbin/iptables -t nat -A PREROUTING -p tcp -d ${myIP}
--dport 5950 -j DNAT --to 192.168.1.26:22
# Cleanup.
ip -6 route flush dev sixxs
@@ -107,7 +115,7 @@
ip tunnel del sixxs
# Set up a SixXS tunnel for IPv6 connectivity.
- ip tunnel add sixxs mode sit local 130.161.158.181 remote
192.87.102.107 ttl 64
+ ip tunnel add sixxs mode sit local ${myIP} remote 192.87.102.107 ttl 64
ip link set dev sixxs mtu 1280 up
ip -6 addr add 2001:610:600:88d::2/64 dev sixxs
ip -6 route add default via 2001:610:600:88d::1 dev sixxs
@@ -120,6 +128,10 @@
# Forward traffic to our Nova cloud to "stan".
ip -6 route add 2001:610:685:2::/64 via
2001:610:685:1:222:19ff:fe55:bf2e
+
+ # Amazon MTurk experiment.
+ ${pkgs.iptables}/sbin/iptables -t nat -A PREROUTING -p tcp -d ${myIP}
--dport 5998 -j DNAT --to 192.168.1.26:5998
+ ${pkgs.iptables}/sbin/iptables -t nat -A PREROUTING -p tcp -d ${myIP}
--dport 5999 -j DNAT --to 192.168.1.26:5999
'';
};
@@ -141,8 +153,8 @@
mailto = "[email protected]";
systemCronJobs =
[
- "15 0 * * * root (TZ=CET date; ${pkgs.rsync}/bin/rsync -razv
--numeric-ids --delete /data/postgresql /data/webserver/tarballs
unixhome.st.ewi.tudelft.nl::bfarm/) >> /var/log/backup.log 2>&1"
- "00 03 * * * root ${pkgs.nixUnstable}/bin/nix-collect-garbage
--max-atime $(date +\\%s -d '2 weeks ago') > /var/log/gc.log 2>&1"
+ #"15 0 * * * root (TZ=CET date; ${pkgs.rsync}/bin/rsync -razv
--numeric-ids --delete /data/postgresql /data/webserver/tarballs
unixhome.st.ewi.tudelft.nl::bfarm/) >> /var/log/backup.log 2>&1"
+ "0 3 * * * root nix-store --gc --max-freed \"$((50 * 1024**3 - 1024
* $(df /nix/store | tail -n 1 | awk '{ print $4 }')))\" > /var/log/gc.log 2>&1"
"* * * * * root ${pkgs.python}/bin/python ${ZabbixApacheUpdater}
-z 192.168.1.5 -c cartman"
# Force the sixxs tunnel to stay alive by periodically
@@ -152,59 +164,46 @@
];
};
- postgresql = {
- enable = true;
- enableTCPIP = true;
- dataDir = "/data/postgresql";
- authentication = ''
- local all mediawiki ident mediawiki-users
- local all all ident sameuser
- host all all 127.0.0.1/32 md5
- host all all ::1/128 md5
- host all all 192.168.1.18/32 md5
- host all all 130.161.159.80/32 md5
- host all all 94.208.32.143/32 md5
- '';
- };
-
httpd = {
enable = true;
logPerVirtualHost = true;
adminAddr = "[email protected]";
hostName = "localhost";
- sslServerCert = "/root/ssl-secrets/server.crt";
- sslServerKey = "/root/ssl-secrets/server.key";
-
- extraModules = ["deflate"];
- extraConfig = ''
- AddType application/nix-package .nixpkg
-
- SSLProtocol all -TLSv1
-
- <Location /server-status>
- SetHandler server-status
- Allow from 127.0.0.1 # If using a remote host for monitoring
replace 127.0.0.1 with its IP.
- Order deny,allow
- Deny from all
- </Location>
- ExtendedStatus On
- '';
+ extraModules = ["deflate"];
+ extraConfig =
+ ''
+ AddType application/nix-package .nixpkg
+
+ <Location /server-status>
+ SetHandler server-status
+ Allow from 127.0.0.1 # If using a remote host for monitoring
replace 127.0.0.1 with its IP.
+ Order deny,allow
+ Deny from all
+ </Location>
+
+ ExtendedStatus On
+ '';
- servedFiles = [
- { urlPath = "/releases.css";
- file = releasesCSS;
- }
- { urlPath = "/css/releases.css"; # legacy; old releases point here
- file = releasesCSS;
- }
- { urlPath = "/releases/css/releases.css"; # legacy; old releases point
here
- file = releasesCSS;
- }
- ];
+ servedFiles =
+ [ { urlPath = "/releases.css";
+ file = releasesCSS;
+ }
+ { urlPath = "/css/releases.css"; # legacy; old releases point here
+ file = releasesCSS;
+ }
+ { urlPath = "/releases/css/releases.css"; # legacy; old releases
point here
+ file = releasesCSS;
+ }
+ ];
virtualHosts = [
+ { # Catch-all site.
+ hostName = "www.nixos.org";
+ globalRedirect = "http://nixos.org/";
+ }
+
{ hostName = "buildfarm.st.ewi.tudelft.nl";
documentRoot = cleanSource ./webroot;
enableUserDir = true;
@@ -249,6 +248,8 @@
# go to svn.strategoxt.org.
{ hostName = "buildfarm.st.ewi.tudelft.nl";
enableSSL = true;
+ sslServerCert = "/root/ssl-secrets/server.crt";
+ sslServerKey = "/root/ssl-secrets/server.key";
globalRedirect = "http://buildfarm.st.ewi.tudelft.nl/";
}
@@ -275,6 +276,8 @@
{ hostName = "svn.strategoxt.org";
enableSSL = true;
+ sslServerCert = "/root/ssl-secrets/server.crt";
+ sslServerKey = "/root/ssl-secrets/server.key";
extraSubservices = [
{ function = import /etc/nixos/services/subversion;
id = "strategoxt";
@@ -322,6 +325,34 @@
documentRoot = "/data/webserver/dist/strategoxt2";
}
+ { hostName = "ssl.nixos.org";
+ serverAliases = [ "ipv6.nixos.org" ];
+ documentRoot = "/home/eelco/nix-homepage";
+ enableSSL = true;
+ sslServerCert = "/root/ssl-secrets/ssl-nixos-org.crt";
+ sslServerKey = "/root/ssl-secrets/ssl-nixos-org.key";
+ extraConfig =
+ ''
+ SSLCertificateChainFile /root/ssl-secrets/startssl-class1.pem
+ SSLCACertificateFile /root/ssl-secrets/startssl-ca.pem
+ '';
+ extraSubservices = [
+ { function = import /etc/nixos/services/subversion;
+ id = "nix";
+ urlPrefix = "";
+ toplevelRedirect = false;
+ dataDir = "/data/subversion-nix";
+ notificationSender = "[email protected]";
+ userCreationDomain = "st.ewi.tudelft.nl";
+ organisation = {
+ name = "Nix";
+ url = http://nixos.org/;
+ logo = http://nixos.org/logo/nixos-lores.png;
+ };
+ }
+ ];
+ }
+
{ hostName = "nixos.org";
serverAliases = [ "ipv6.nixos.org" ];
documentRoot = "/home/eelco/nix-homepage";
@@ -345,6 +376,18 @@
file = releasesCSS;
}
];
+
+ extraConfig = ''
+ <Proxy *>
+ Order deny,allow
+ Allow from all
+ </Proxy>
+
+ ProxyPass /mturk http://wendy:3000/mturk retry=5
+ ProxyPassReverse /mturk http://wendy:3000/mturk
+ ProxyPass /mturk-sandbox http://wendy:3001/mturk-sandbox
retry=5
+ ProxyPassReverse /mturk-sandbox http://wendy:3001/mturk-sandbox
+ '';
}
{ hostName = "syntax-definition.org";
@@ -360,12 +403,10 @@
];
}
- { hostName = "www.nixos.org";
- globalRedirect = "http://nixos.org/";
- }
-
{ hostName = "svn.nixos.org";
enableSSL = true;
+ sslServerCert = "/root/ssl-secrets/server.crt";
+ sslServerKey = "/root/ssl-secrets/server.key";
extraSubservices = [
{ function = import /etc/nixos/services/subversion;
id = "nix";
@@ -431,12 +472,16 @@
{ serviceType = "mediawiki";
siteName = "Nix Wiki";
logo = "http://nixos.org/logo/nix-wiki.png";
+ defaultSkin = "nixos";
extraConfig =
''
$wgEmailConfirmToEdit = true;
'';
enableUploads = true;
uploadDir = "/data/nixos-mediawiki-upload";
+ dbServer = "webdsl.org";
+ dbUser = "mediawiki";
+ dbPassword = import ./mediawiki-password.nix;
}
];
}
@@ -474,7 +519,7 @@
'';
}
- { hostName = "vnc.nixos.org";
+ { hostName = "mturk.nixos.org";
extraConfig = ''
<Proxy *>
Order deny,allow
@@ -483,8 +528,20 @@
ProxyRequests Off
ProxyPreserveHost On
- ProxyPass / http://stan:6080/ retry=5
- ProxyPassReverse / http://stan:6080/
+ ProxyPass / http://wendy/~mturk/ retry=5
+ ProxyPassReverse / http://wendy/~mturk/
+ '';
+ }
+
+ { hostName = "mturk-view.nixos.org";
+ extraConfig = ''
+ Redirect permanent / http://nixos.org/mturk/
+ '';
+ }
+
+ { hostName = "mturk-view-sandbox.nixos.org";
+ extraConfig = ''
+ Redirect permanent / http://nixos.org/mturk-sandbox/
'';
}
@@ -496,14 +553,10 @@
backups =
let genericBackup = { server = "webdata.tudelft.nl";
protocol = "webdav";
- https = true ;
+ https = true;
symlinks = "ignore";
};
in [
- ( genericBackup // { name = "postgresql";
- local =
config.services.postgresqlBackup.location;
- remote =
"/staff-groups/ewi/st/strategoxt/backup/postgresql";
- } )
( genericBackup // { name = "subversion";
local = "/data/subversion";
remote =
"/staff-groups/ewi/st/strategoxt/backup/subversion/subversion";
@@ -511,7 +564,6 @@
( genericBackup // { name = "subversion-nix";
local = "/data/subversion-nix";
remote =
"/staff-groups/ewi/st/strategoxt/backup/subversion/subversion-nix";
- period = "15 03 * * *";
} )
( genericBackup // { name = "subversion-ptg";
local = "/data/subversion-ptg";
@@ -520,27 +572,22 @@
( genericBackup // { name = "subversion-strategoxt";
local = "/data/subversion-strategoxt";
remote =
"/staff-groups/ewi/st/strategoxt/backup/subversion/subversion-strategoxt";
- period = "15 02 * * *";
} )
( genericBackup // { name = "webserver-dist-nix";
local = "/data/webserver/dist/nix";
remote =
"/staff-groups/ewi/st/strategoxt/backup/webserver-dist-nix";
- period = "5 03 * * *";
} )
# ( genericBackup // { name = "webserver-tarballs";
# local = "/data/webserver/tarballs";
# remote =
"/staff-groups/ewi/st/strategoxt/backup/webserver-tarballs";
-# period = "5 03 * * *";
# } )
( genericBackup // { name = "pt-wiki";
local = "/data/pt-wiki";
remote =
"/staff-groups/ewi/st/strategoxt/backup/pt-wiki";
- period = "55 02 * * *";
} )
( genericBackup // { name = "nixos-mediawiki-upload";
local = "/data/nixos-mediawiki-upload";
remote =
"/staff-groups/ewi/st/strategoxt/backup/nixos-mediawiki-upload";
- period = "20 03 * * *";
} )
];
};
@@ -548,9 +595,11 @@
zabbixAgent.enable = true;
zabbixServer.enable = true;
- zabbixServer.dbServer = "lucifer";
+ zabbixServer.dbServer = "webdsl.org";
zabbixServer.dbPassword = import ./zabbix-password.nix;
+ flashpolicyd.enable = true;
+
};
# Needed for the Nixpkgs mirror script.
@@ -585,8 +634,8 @@
(flip concatMapStrings machines (m: "${m.ipAddress} ${m.hostName}\n"));
in
- { startOn = "network-interfaces";
+ { startOn = "started network-interfaces";
exec = "${pkgs.dnsmasq}/bin/dnsmasq --conf-file=${confFile}";
};
-
+
}
_______________________________________________
nix-commits mailing list
[email protected]
http://lists.science.uu.nl/mailman/listinfo/nix-commits