REBRANDING. Shit is broken

This commit is contained in:
oxapentane - 2022-12-30 18:29:13 +01:00
parent 86cded905e
commit 76878887fe
Signed by: oxapentane
GPG Key ID: 91FA5E5BF9AA901C
44 changed files with 306 additions and 305 deletions

1
.gitignore vendored
View File

@ -1,2 +1,3 @@
result result
*.qcow2 *.qcow2
tmp

View File

@ -1,26 +1,60 @@
{ {
"nodes": { "nodes": {
"TLMS": {
"inputs": {
"click": "click",
"data-accumulator": "data-accumulator",
"datacare": "datacare",
"dvb-api": "dvb-api",
"funnel": "funnel",
"gnuradio-decoder": "gnuradio-decoder",
"naersk": "naersk",
"nixpkgs": [
"nixpkgs"
],
"stops": "stops",
"telegram-decoder": "telegram-decoder",
"tlms-rs": "tlms-rs",
"trekkie": "trekkie",
"utils": "utils_2",
"wartrammer": "wartrammer",
"windshield": "windshield"
},
"locked": {
"lastModified": 1672420816,
"narHash": "sha256-BEO2nrq/Zi0ZxevFt4CVrCj5R1LfkoC+aPM80lehKEY=",
"owner": "tlm-solutions",
"repo": "TLMS.nix",
"rev": "a24c94b0d77a32394e16300527f19dacecd9a606",
"type": "github"
},
"original": {
"owner": "tlm-solutions",
"repo": "TLMS.nix",
"type": "github"
}
},
"click": { "click": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
"dump-dvb", "TLMS",
"nixpkgs" "nixpkgs"
], ],
"utils": [ "utils": [
"dump-dvb", "TLMS",
"utils" "utils"
] ]
}, },
"locked": { "locked": {
"lastModified": 1670369433, "lastModified": 1670369433,
"narHash": "sha256-8dnqgBTs11RKG1wPxLX9KGlgEA3TO9cv77kai1TjZe4=", "narHash": "sha256-8dnqgBTs11RKG1wPxLX9KGlgEA3TO9cv77kai1TjZe4=",
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "click", "repo": "click",
"rev": "aef03393401e39d38afa5c9f316da150c9d32f42", "rev": "aef03393401e39d38afa5c9f316da150c9d32f42",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "click", "repo": "click",
"type": "github" "type": "github"
} }
@ -28,28 +62,28 @@
"data-accumulator": { "data-accumulator": {
"inputs": { "inputs": {
"naersk": [ "naersk": [
"dump-dvb", "TLMS",
"naersk" "naersk"
], ],
"nixpkgs": [ "nixpkgs": [
"dump-dvb", "TLMS",
"nixpkgs" "nixpkgs"
], ],
"utils": [ "utils": [
"dump-dvb", "TLMS",
"utils" "utils"
] ]
}, },
"locked": { "locked": {
"lastModified": 1671227082, "lastModified": 1672266234,
"narHash": "sha256-Hd51P4b0JkW5S4Qsqt/vumn5bPbwXM5XPXGk15+snZg=", "narHash": "sha256-EYxLJWJBOglOCjSwYvDlsq38FjaGJRfGMLS8shxr1sU=",
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "data-accumulator", "repo": "data-accumulator",
"rev": "c56795eb49f3194c938f2d1ff6d65ed03de79f51", "rev": "9ef2e1073bc88d35672323958ccd00ed52808176",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "data-accumulator", "repo": "data-accumulator",
"type": "github" "type": "github"
} }
@ -57,173 +91,73 @@
"datacare": { "datacare": {
"inputs": { "inputs": {
"naersk": [ "naersk": [
"dump-dvb", "TLMS",
"naersk" "naersk"
], ],
"nixpkgs": [ "nixpkgs": [
"dump-dvb", "TLMS",
"nixpkgs" "nixpkgs"
], ],
"utils": [ "utils": [
"dump-dvb", "TLMS",
"utils" "utils"
] ]
}, },
"locked": { "locked": {
"lastModified": 1671752356, "lastModified": 1671764363,
"narHash": "sha256-ERdozxCjRZFREBCjBx7DEnTcZtxp1J1N65OR8EdEOgY=", "narHash": "sha256-gQcZS0ZWqU2fdgQdVejik4P50L4kcKM7UOtlpOGAV8I=",
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "datacare", "repo": "datacare",
"rev": "9cd65246000b6de3fa83736c7f9c308eefd5b375", "rev": "b06a8e23ad417c908de03b64b84c896d3cf36cf2",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "datacare", "repo": "datacare",
"type": "github" "type": "github"
} }
}, },
"decode-server": {
"inputs": {
"naersk": [
"dump-dvb",
"naersk"
],
"nixpkgs": [
"dump-dvb",
"nixpkgs"
],
"utils": [
"dump-dvb",
"utils"
]
},
"locked": {
"lastModified": 1671229231,
"narHash": "sha256-wm7SxCWVNVt4QePTUOI9zUOwyy3xKaen7dAplWdTtw0=",
"owner": "dump-dvb",
"repo": "decode-server",
"rev": "9a68ed95825dcc147ebdac115ae15615af4d4c4f",
"type": "github"
},
"original": {
"owner": "dump-dvb",
"repo": "decode-server",
"type": "github"
}
},
"documentation-src": { "documentation-src": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1669248915, "lastModified": 1669248915,
"narHash": "sha256-+pJzcS8jraCdvXwbxjMCdVqK2kyXih+61gaCCPX+txg=", "narHash": "sha256-+pJzcS8jraCdvXwbxjMCdVqK2kyXih+61gaCCPX+txg=",
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "documentation", "repo": "documentation",
"rev": "c65ea26a7720e90fb54fc31fba5d0c048bd404be", "rev": "c65ea26a7720e90fb54fc31fba5d0c048bd404be",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "documentation", "repo": "documentation",
"type": "github" "type": "github"
} }
}, },
"dump-dvb": {
"inputs": {
"click": "click",
"data-accumulator": "data-accumulator",
"datacare": "datacare",
"decode-server": "decode-server",
"dump-dvb-rs": "dump-dvb-rs",
"dvb-api": "dvb-api",
"funnel": "funnel",
"naersk": "naersk",
"nixpkgs": [
"nixpkgs"
],
"radio-conf": "radio-conf",
"stops": "stops",
"trekkie": "trekkie",
"utils": "utils_2",
"wartrammer": "wartrammer",
"windshield": "windshield"
},
"locked": {
"lastModified": 1671753060,
"narHash": "sha256-U0xm5DVuEc9olOoH2TqtFxBfakp81X9iKiKSvHjXqiw=",
"owner": "dump-dvb",
"repo": "dump-dvb.nix",
"rev": "05d96871c917996ee5a6c73c4a4545a1580bd466",
"type": "github"
},
"original": {
"owner": "dump-dvb",
"repo": "dump-dvb.nix",
"type": "github"
}
},
"dump-dvb-rs": {
"inputs": {
"nixpkgs": [
"dump-dvb",
"nixpkgs"
]
},
"locked": {
"lastModified": 1671743049,
"narHash": "sha256-Z1Mt7TfgEmhM4ph7NMYQ/q3IbJX2Z4QeVYx5GvGbSJo=",
"owner": "dump-dvb",
"repo": "dump-dvb.rs",
"rev": "f6cf7e3cd00d2f1994748a75241986fbc59f028c",
"type": "github"
},
"original": {
"owner": "dump-dvb",
"repo": "dump-dvb.rs",
"type": "github"
}
},
"dump-dvb-rust": {
"flake": false,
"locked": {
"lastModified": 1670408159,
"narHash": "sha256-DKYCxY6rMYyLH/4ztx/H0vScUiQLgQq4Dr/WM03eSzw=",
"owner": "dump-dvb",
"repo": "dump-dvb.rs",
"rev": "cdf37215bff1614405516b13eb8c4e56219ea9da",
"type": "github"
},
"original": {
"owner": "dump-dvb",
"repo": "dump-dvb.rs",
"type": "github"
}
},
"dvb-api": { "dvb-api": {
"inputs": { "inputs": {
"naersk": [ "naersk": [
"dump-dvb", "TLMS",
"naersk" "naersk"
], ],
"nixpkgs": [ "nixpkgs": [
"dump-dvb", "TLMS",
"nixpkgs" "nixpkgs"
], ],
"utils": [ "utils": [
"dump-dvb", "TLMS",
"utils" "utils"
] ]
}, },
"locked": { "locked": {
"lastModified": 1670368765, "lastModified": 1670368765,
"narHash": "sha256-ZUH8slE8/h2M+sEcJaMbno6qFHcv6afjdhf+8RfN370=", "narHash": "sha256-ZUH8slE8/h2M+sEcJaMbno6qFHcv6afjdhf+8RfN370=",
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "dvb-api", "repo": "dvb-api",
"rev": "ce9925d5675c3ae372324694f73872df97c30a00", "rev": "ce9925d5675c3ae372324694f73872df97c30a00",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "dvb-api", "repo": "dvb-api",
"type": "github" "type": "github"
} }
@ -231,7 +165,7 @@
"fenix": { "fenix": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
"dump-dvb", "TLMS",
"stops", "stops",
"nixpkgs" "nixpkgs"
], ],
@ -268,39 +202,64 @@
}, },
"funnel": { "funnel": {
"inputs": { "inputs": {
"dump-dvb-rust": "dump-dvb-rust",
"json-structs": "json-structs", "json-structs": "json-structs",
"nixpkgs": [ "nixpkgs": [
"dump-dvb", "TLMS",
"nixpkgs" "nixpkgs"
], ],
"tlms-rust": "tlms-rust",
"utils": [ "utils": [
"dump-dvb", "TLMS",
"utils" "utils"
] ]
}, },
"locked": { "locked": {
"lastModified": 1671475854, "lastModified": 1672329711,
"narHash": "sha256-ZXhdb+dwIFkkgYzN7VJsBu3aCrfNIjYUePDTEfXl0Uk=", "narHash": "sha256-I4Sx4iwrfp0T/Vg+wCSquNuE46Yt+Zd5xmrkV9a3KNM=",
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "funnel", "repo": "funnel",
"rev": "24ba4397dbca6cbb9d08a566a639c3203b838871", "rev": "e49f2f4f1b9cdc3c887be0f35f2a45281b1c67c4",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "funnel", "repo": "funnel",
"type": "github" "type": "github"
} }
}, },
"gnuradio-decoder": {
"inputs": {
"nixpkgs": [
"TLMS",
"nixpkgs"
],
"utils": [
"TLMS",
"utils"
]
},
"locked": {
"lastModified": 1665616750,
"narHash": "sha256-LKkr9h805FuJ+wXUatQ+cz7Vt59S9I7gN/1yzwmraZE=",
"owner": "tlm-solutions",
"repo": "gnuradio-decoder",
"rev": "f6f42736cc1a1024c5da4cce69d56042499d81d3",
"type": "github"
},
"original": {
"owner": "tlm-solutions",
"repo": "gnuradio-decoder",
"type": "github"
}
},
"json-structs": { "json-structs": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1667607472, "lastModified": 1671005252,
"narHash": "sha256-lyeM+jkZRfclF7gCWj0ZGvuH5O/UAczPUd7rcVgh+T4=", "narHash": "sha256-U7rrOmDxigZFVxRQDj9g7S9WgLbrPeHZ+UKuZz+eGVU=",
"owner": "jorgen", "owner": "jorgen",
"repo": "json_struct", "repo": "json_struct",
"rev": "de80d452b3cc1688dfc2967dbfef5cb501e925d3", "rev": "09a790818c47c9d748c2381d37b94a697a53d2cd",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -317,11 +276,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1670897870, "lastModified": 1671934509,
"narHash": "sha256-nWLU48WlhVYm53cTUEDX8mZwZqdzObO6299hrCmdYcU=", "narHash": "sha256-flutX1FzFos0+Va7jCAE8F4g/3gzJ9DsOlYYRsQ+Kh4=",
"owner": "astro", "owner": "astro",
"repo": "microvm.nix", "repo": "microvm.nix",
"rev": "b12b4d426e1050479e9d571c81cda2b7ae0256da", "rev": "9bc97fe223048f09ec83de9b29b78766194e554c",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -333,7 +292,7 @@
"naersk": { "naersk": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
"dump-dvb", "TLMS",
"nixpkgs" "nixpkgs"
] ]
}, },
@ -353,11 +312,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1671525405, "lastModified": 1672353432,
"narHash": "sha256-MEgNxm/oRt5w4ycMENewfZQKOak0ixmjVPfXM96N1FA=", "narHash": "sha256-oZfgp/44/o2tWiylV30cR+DLyWTJ+5dhsdWZVpzs3e4=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "cbe419ed4c8f98bd82d169c321d339ea30904f1f", "rev": "913a47cd064cc06440ea84e5e0452039a85781f0",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -369,11 +328,11 @@
}, },
"nixpkgs-stable": { "nixpkgs-stable": {
"locked": { "locked": {
"lastModified": 1671459584, "lastModified": 1671923641,
"narHash": "sha256-6wRK7xmeHfClJ0ICOkax1avLZVGTDqBodQlkl/opccY=", "narHash": "sha256-flPauiL5UrfRJD+1oAcEefpEIUqTqnyKScWe/UUU+lE=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "87b58217c9a05edcf7630b9be32570f889217aef", "rev": "939c05a176b8485971463c18c44f48e56a7801c9",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -399,35 +358,10 @@
"type": "github" "type": "github"
} }
}, },
"radio-conf": {
"inputs": {
"nixpkgs": [
"dump-dvb",
"nixpkgs"
],
"utils": [
"dump-dvb",
"utils"
]
},
"locked": {
"lastModified": 1665616750,
"narHash": "sha256-LKkr9h805FuJ+wXUatQ+cz7Vt59S9I7gN/1yzwmraZE=",
"owner": "dump-dvb",
"repo": "radio-conf",
"rev": "f6f42736cc1a1024c5da4cce69d56042499d81d3",
"type": "github"
},
"original": {
"owner": "dump-dvb",
"repo": "radio-conf",
"type": "github"
}
},
"root": { "root": {
"inputs": { "inputs": {
"TLMS": "TLMS",
"documentation-src": "documentation-src", "documentation-src": "documentation-src",
"dump-dvb": "dump-dvb",
"microvm": "microvm", "microvm": "microvm",
"nixpkgs": "nixpkgs", "nixpkgs": "nixpkgs",
"sops-nix": "sops-nix" "sops-nix": "sops-nix"
@ -458,11 +392,11 @@
"nixpkgs-stable": "nixpkgs-stable" "nixpkgs-stable": "nixpkgs-stable"
}, },
"locked": { "locked": {
"lastModified": 1671472949, "lastModified": 1671937829,
"narHash": "sha256-9iHSGpljCX+RypahQssBXPwkru9onfKfceCTeVrMpH4=", "narHash": "sha256-YtaNB+mLw0d67JFYNjRWM+/AL3JCXuD/DGlnTlyX1tY=",
"owner": "Mic92", "owner": "Mic92",
"repo": "sops-nix", "repo": "sops-nix",
"rev": "32840f16ffa0856cdf9503a8658f2dd42bf70342", "rev": "855b8d51fc3991bd817978f0f093aa6ae0fae738",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -475,40 +409,106 @@
"inputs": { "inputs": {
"fenix": "fenix", "fenix": "fenix",
"naersk": [ "naersk": [
"dump-dvb", "TLMS",
"naersk" "naersk"
], ],
"nixpkgs": [ "nixpkgs": [
"dump-dvb", "TLMS",
"nixpkgs" "nixpkgs"
], ],
"utils": [ "utils": [
"dump-dvb", "TLMS",
"utils" "utils"
] ]
}, },
"locked": { "locked": {
"lastModified": 1670618313, "lastModified": 1670618313,
"narHash": "sha256-kWvB6v3qJbX+UfcR+lTTJBHo7GUA/9BljBufAlVSkrk=", "narHash": "sha256-kWvB6v3qJbX+UfcR+lTTJBHo7GUA/9BljBufAlVSkrk=",
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "stop-names", "repo": "stop-names",
"rev": "b04e91e0f3f74f6f92626a5af513abfdf8b989df", "rev": "b04e91e0f3f74f6f92626a5af513abfdf8b989df",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "stop-names", "repo": "stop-names",
"type": "github" "type": "github"
} }
}, },
"telegram-decoder": {
"inputs": {
"naersk": [
"TLMS",
"naersk"
],
"nixpkgs": [
"TLMS",
"nixpkgs"
],
"utils": [
"TLMS",
"utils"
]
},
"locked": {
"lastModified": 1671229231,
"narHash": "sha256-wm7SxCWVNVt4QePTUOI9zUOwyy3xKaen7dAplWdTtw0=",
"owner": "tlm-solutions",
"repo": "telegram-decoder",
"rev": "9a68ed95825dcc147ebdac115ae15615af4d4c4f",
"type": "github"
},
"original": {
"owner": "tlm-solutions",
"repo": "telegram-decoder",
"type": "github"
}
},
"tlms-rs": {
"inputs": {
"nixpkgs": [
"TLMS",
"nixpkgs"
]
},
"locked": {
"lastModified": 1672354602,
"narHash": "sha256-SesSDbmY8z4WULB1YMACSnID6XLg55wlCNnqsWcxH8c=",
"owner": "tlm-solutions",
"repo": "tlms.rs",
"rev": "2a0165b7d1852df9970b071bde811206dcb10b95",
"type": "github"
},
"original": {
"owner": "tlm-solutions",
"repo": "tlms.rs",
"type": "github"
}
},
"tlms-rust": {
"flake": false,
"locked": {
"lastModified": 1672266054,
"narHash": "sha256-yyqWR5PP2RemsJA+QFtdKHGOsE84snDS80Joilbm3Hk=",
"owner": "tlm-solutions",
"repo": "tlms.rs",
"rev": "a179ab4ca1cd7349eafd624533648eb5169fd4d5",
"type": "github"
},
"original": {
"owner": "tlm-solutions",
"repo": "tlms.rs",
"type": "github"
}
},
"trekkie": { "trekkie": {
"inputs": { "inputs": {
"naersk": [ "naersk": [
"dump-dvb", "TLMS",
"naersk" "naersk"
], ],
"nixpkgs": [ "nixpkgs": [
"dump-dvb", "TLMS",
"nixpkgs" "nixpkgs"
], ],
"utils": "utils" "utils": "utils"
@ -516,13 +516,13 @@
"locked": { "locked": {
"lastModified": 1669984314, "lastModified": 1669984314,
"narHash": "sha256-BolYmN+dSGcFWSBs2CDCcMyFaMgKUrPsbZwP0Reqw6M=", "narHash": "sha256-BolYmN+dSGcFWSBs2CDCcMyFaMgKUrPsbZwP0Reqw6M=",
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "trekkie", "repo": "trekkie",
"rev": "4f51485674d6e13e0e68df15c372e5a87774dcb8", "rev": "4f51485674d6e13e0e68df15c372e5a87774dcb8",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "trekkie", "repo": "trekkie",
"type": "github" "type": "github"
} }
@ -560,29 +560,29 @@
"wartrammer": { "wartrammer": {
"inputs": { "inputs": {
"naersk": [ "naersk": [
"dump-dvb", "TLMS",
"naersk" "naersk"
], ],
"nixpkgs": [ "nixpkgs": [
"dump-dvb", "TLMS",
"nixpkgs" "nixpkgs"
], ],
"nixpkgs-unstable": "nixpkgs-unstable", "nixpkgs-unstable": "nixpkgs-unstable",
"utils": [ "utils": [
"dump-dvb", "TLMS",
"utils" "utils"
] ]
}, },
"locked": { "locked": {
"lastModified": 1665780943, "lastModified": 1665780943,
"narHash": "sha256-4tnTVfz25GzY/1vCAITMeWkMqrzVRJUmpSMfqxcU0C4=", "narHash": "sha256-4tnTVfz25GzY/1vCAITMeWkMqrzVRJUmpSMfqxcU0C4=",
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "wartrammer-40k", "repo": "wartrammer-40k",
"rev": "896550451f1e3b33c7fa8a08922efa3b6b73e4ad", "rev": "896550451f1e3b33c7fa8a08922efa3b6b73e4ad",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "wartrammer-40k", "repo": "wartrammer-40k",
"type": "github" "type": "github"
} }
@ -590,24 +590,24 @@
"windshield": { "windshield": {
"inputs": { "inputs": {
"nixpkgs": [ "nixpkgs": [
"dump-dvb", "TLMS",
"nixpkgs" "nixpkgs"
], ],
"utils": [ "utils": [
"dump-dvb", "TLMS",
"utils" "utils"
] ]
}, },
"locked": { "locked": {
"lastModified": 1671752444, "lastModified": 1671893969,
"narHash": "sha256-jmvrzLePt4hcvcXxAsM0JImWKdxPbT08e5xUyPtNfxY=", "narHash": "sha256-sBQnt/PfUReXJJ89JHrVeO0VvEVYQpYnhtadXQVm4eM=",
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "windshield", "repo": "windshield",
"rev": "774914702f0e2569bcc632a98484f15f23bb4a8e", "rev": "100e62ad1a63cecfcde6e01d1814742bdec805e7",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "dump-dvb", "owner": "tlm-solutions",
"repo": "windshield", "repo": "windshield",
"type": "github" "type": "github"
} }

View File

@ -1,7 +1,7 @@
{ {
inputs = { inputs = {
dump-dvb = { TLMS = {
url = github:dump-dvb/dump-dvb.nix; url = github:tlm-solutions/TLMS.nix;
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
@ -18,14 +18,14 @@
}; };
documentation-src = { documentation-src = {
url = github:dump-dvb/documentation; url = github:tlm-solutions/documentation;
flake = false; flake = false;
}; };
}; };
outputs = outputs =
inputs@{ self inputs@{ self
, dump-dvb , TLMS
, microvm , microvm
, nixpkgs , nixpkgs
, sops-nix , sops-nix
@ -39,16 +39,16 @@
data-hoarder-modules = [ data-hoarder-modules = [
./modules/data-hoarder ./modules/data-hoarder
./modules/dump-dvb ./modules/TLMS
sops-nix.nixosModules.sops sops-nix.nixosModules.sops
dump-dvb.nixosModules.default TLMS.nixosModules.default
{ {
nixpkgs.overlays = [ nixpkgs.overlays = [
dump-dvb.overlays.default TLMS.overlays.default
(final: prev: { (final: prev: {
inherit documentation-src; inherit documentation-src;
options-docs = (pkgs.nixosOptionsDoc { options-docs = (pkgs.nixosOptionsDoc {
options = self.nixosConfigurations.data-hoarder.options.dump-dvb; options = self.nixosConfigurations.data-hoarder.options.TLMS;
}).optionsCommonMark; }).optionsCommonMark;
}) })
]; ];
@ -58,7 +58,7 @@
stop-box-modules = [ stop-box-modules = [
{ {
nixpkgs.overlays = [ nixpkgs.overlays = [
dump-dvb.overlays.default TLMS.overlays.default
]; ];
} }
]; ];
@ -75,11 +75,11 @@
# default modules # default modules
sops-nix.nixosModules.sops sops-nix.nixosModules.sops
dump-dvb.nixosModules.default TLMS.nixosModules.default
./modules/traffic-stop-box ./modules/traffic-stop-box
./modules/dump-dvb ./modules/TLMS
{ {
deployment-dvb.systemNumber = id; deployment-TLMS.systemNumber = id;
} }
] ++ stop-box-modules; ] ++ stop-box-modules;
}; };
@ -140,7 +140,7 @@
docs = pkgs.callPackage ./pkgs/documentation.nix { docs = pkgs.callPackage ./pkgs/documentation.nix {
inherit documentation-src; inherit documentation-src;
options-docs = (pkgs.nixosOptionsDoc { options-docs = (pkgs.nixosOptionsDoc {
options = self.nixosConfigurations.data-hoarder.options.dump-dvb; options = self.nixosConfigurations.data-hoarder.options.TLMS;
}).optionsCommonMark; }).optionsCommonMark;
}; };
} }
@ -174,15 +174,15 @@
system = "x86_64-linux"; system = "x86_64-linux";
specialArgs = inputs; specialArgs = inputs;
modules = [ modules = [
./modules/dump-dvb ./modules/TLMS
./hosts/watch-me-senpai ./hosts/watch-me-senpai
./modules/watch-me-senpai/secrets.nix ./modules/watch-me-senpai/secrets.nix
microvm.nixosModules.microvm microvm.nixosModules.microvm
sops-nix.nixosModules.sops sops-nix.nixosModules.sops
dump-dvb.nixosModules.default TLMS.nixosModules.default
{ {
nixpkgs.overlays = [ nixpkgs.overlays = [
dump-dvb.overlays.default TLMS.overlays.default
]; ];
} }
]; ];

View File

@ -1,11 +1,11 @@
{ config, lib, dump-dvb, ... }: { config, lib, TLMS, ... }:
{ {
# The global useDHCP flag is deprecated, therefore explicitly set to false here. # The global useDHCP flag is deprecated, therefore explicitly set to false here.
# Per-interface useDHCP will be mandatory in the future, so this generated config # Per-interface useDHCP will be mandatory in the future, so this generated config
# replicates the default behaviour. # replicates the default behaviour.
imports = [ imports = [
dump-dvb.nixosModules.disk-module TLMS.nixosModules.disk-module
]; ];
networking = { networking = {
interfaces.enp1s0.useDHCP = lib.mkDefault true; interfaces.enp1s0.useDHCP = lib.mkDefault true;
@ -15,7 +15,7 @@
networking.useNetworkd = true; networking.useNetworkd = true;
networking.wireguard.enable = true; networking.wireguard.enable = true;
deployment-dvb.net.iface.uplink = { deployment-TLMS.net.iface.uplink = {
name = lib.mkDefault "enp1s0"; name = lib.mkDefault "enp1s0";
useDHCP = lib.mkDefault true; useDHCP = lib.mkDefault true;
}; };

View File

@ -12,7 +12,7 @@
networking.useDHCP = lib.mkDefault true; networking.useDHCP = lib.mkDefault true;
networking.interfaces.eth0.useDHCP = lib.mkDefault true; networking.interfaces.eth0.useDHCP = lib.mkDefault true;
deployment-dvb.net.iface.uplink = { deployment-TLMS.net.iface.uplink = {
name = lib.mkDefault "eth0"; name = lib.mkDefault "eth0";
useDHCP = lib.mkDefault true; useDHCP = lib.mkDefault true;
}; };

View File

@ -42,7 +42,7 @@ in
# Set your time zone. # Set your time zone.
time.timeZone = "Europe/Berlin"; time.timeZone = "Europe/Berlin";
deployment-dvb.net.iface.uplink = { deployment-TLMS.net.iface.uplink = {
name = "eth0"; name = "eth0";
useDHCP = false; useDHCP = false;
mac = mac_addr; mac = mac_addr;

View File

@ -7,7 +7,7 @@ in
networking.firewall.allowedUDPPorts = [ port ]; networking.firewall.allowedUDPPorts = [ port ];
deployment-dvb.net.wg = { deployment-TLMS.net.wg = {
ownEndpoint.host = "endpoint.dvb.solutions"; ownEndpoint.host = "endpoint.dvb.solutions";
ownEndpoint.port = port; ownEndpoint.port = port;
addr4 = "10.13.37.1"; addr4 = "10.13.37.1";

View File

@ -50,7 +50,7 @@ in
sops.defaultSopsFile = self + /secrets/data-hoarder-staging/secrets.yaml; sops.defaultSopsFile = self + /secrets/data-hoarder-staging/secrets.yaml;
deployment-dvb.net = { deployment-TLMS.net = {
iface.uplink = { iface.uplink = {
name = "ens3"; name = "ens3";
mac = mac_addr; mac = mac_addr;
@ -78,7 +78,7 @@ in
}; };
deployment-dvb.domain = "staging.dvb.solutions"; deployment-TLMS.domain = "staging.dvb.solutions";
# This value determines the NixOS release from which the default # This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions # settings for stateful data, like file locations and database versions

View File

@ -3,5 +3,5 @@
"${self}/hardware/dell-wyse-3040.nix" "${self}/hardware/dell-wyse-3040.nix"
]; ];
deployment-dvb.net.wg.publicKey = "qyStvzZdoqcjJJQckw4ZwvsQUa+8TBWtnsRxURqanno="; deployment-TLMS.net.wg.publicKey = "qyStvzZdoqcjJJQckw4ZwvsQUa+8TBWtnsRxURqanno=";
} }

View File

@ -3,5 +3,5 @@
"${self}/hardware/dell-wyse-3040.nix" "${self}/hardware/dell-wyse-3040.nix"
]; ];
deployment-dvb.net.wg.publicKey = "dOPobdvfphx0EHmU7dd5ihslFzZi17XgRDQLMIUYa1w="; deployment-TLMS.net.wg.publicKey = "dOPobdvfphx0EHmU7dd5ihslFzZi17XgRDQLMIUYa1w=";
} }

View File

@ -3,5 +3,5 @@
"${self}/hardware/dell-wyse-3040.nix" "${self}/hardware/dell-wyse-3040.nix"
]; ];
deployment-dvb.net.wg.publicKey = "4TUQCToGNhjsCgV9elYE/91Vd/RvMgvMXtF/1Dzlvxo="; deployment-TLMS.net.wg.publicKey = "4TUQCToGNhjsCgV9elYE/91Vd/RvMgvMXtF/1Dzlvxo=";
} }

View File

@ -3,5 +3,5 @@
"${self}/hardware/rpi-3b-4b.nix" "${self}/hardware/rpi-3b-4b.nix"
]; ];
deployment-dvb.net.wg.publicKey = "w3AT3EahW1sCK8ZsR7sDTcQj1McXYeWx7fnfQFA7i3o="; deployment-TLMS.net.wg.publicKey = "w3AT3EahW1sCK8ZsR7sDTcQj1McXYeWx7fnfQFA7i3o=";
} }

View File

@ -8,7 +8,7 @@ let eth = "enp1s0"; in
networking.useDHCP = false; networking.useDHCP = false;
networking.interfaces."${eth}".useDHCP = false; networking.interfaces."${eth}".useDHCP = false;
deployment-dvb.net.iface.uplink = { deployment-TLMS.net.iface.uplink = {
name = eth; name = eth;
useDHCP = false; useDHCP = false;
addr4 = "141.30.30.149/25"; addr4 = "141.30.30.149/25";
@ -23,6 +23,6 @@ let eth = "enp1s0"; in
]; ];
}; };
deployment-dvb.net.wg.publicKey = "B0wPH0jUxaatRncHMkgDEQ+DzvlbTBrVJY4etxqQgG8="; deployment-TLMS.net.wg.publicKey = "B0wPH0jUxaatRncHMkgDEQ+DzvlbTBrVJY4etxqQgG8=";
} }

View File

@ -11,5 +11,5 @@
"sk-ssh-ed25519@openssh.com aaaagnnrlxnzac1lzdi1nte5qg9wzw5zc2guy29taaaaipzbd00cbfpxzuc8eb6sljaafnf1hgs6vci1rzcncyocaaaabhnzado=" "sk-ssh-ed25519@openssh.com aaaagnnrlxnzac1lzdi1nte5qg9wzw5zc2guy29taaaaipzbd00cbfpxzuc8eb6sljaafnf1hgs6vci1rzcncyocaaaabhnzado="
]; ];
deployment-dvb.net.wg.publicKey = "NuLDNmxuHHzDXJSIOPSoihEhLWjARRtavuQvWirNR2I="; deployment-TLMS.net.wg.publicKey = "NuLDNmxuHHzDXJSIOPSoihEhLWjARRtavuQvWirNR2I=";
} }

View File

@ -11,5 +11,5 @@
"sk-ssh-ed25519@openssh.com aaaagnnrlxnzac1lzdi1nte5qg9wzw5zc2guy29taaaaipzbd00cbfpxzuc8eb6sljaafnf1hgs6vci1rzcncyocaaaabhnzado=" "sk-ssh-ed25519@openssh.com aaaagnnrlxnzac1lzdi1nte5qg9wzw5zc2guy29taaaaipzbd00cbfpxzuc8eb6sljaafnf1hgs6vci1rzcncyocaaaabhnzado="
]; ];
deployment-dvb.net.wg.publicKey = "sMsdY7dSjlYeIFMqjkh4pJ/ftAYXlyRuxDGbdnGLpEQ="; deployment-TLMS.net.wg.publicKey = "sMsdY7dSjlYeIFMqjkh4pJ/ftAYXlyRuxDGbdnGLpEQ=";
} }

View File

@ -9,5 +9,5 @@
users.users.root.openssh.authorizedKeys.keys = [ users.users.root.openssh.authorizedKeys.keys = [
]; ];
deployment-dvb.net.wg.publicKey = "dL9JGsBhaTOmXgGEH/N/GCHbQgVHEjBvIMaRtCsHBHw="; deployment-TLMS.net.wg.publicKey = "dL9JGsBhaTOmXgGEH/N/GCHbQgVHEjBvIMaRtCsHBHw=";
} }

View File

@ -10,5 +10,5 @@
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJO/8PRzEqW20vnADv5xJrV5AlQ9bS8251AyQACyFMz+ dumbdvb_clarity" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJO/8PRzEqW20vnADv5xJrV5AlQ9bS8251AyQACyFMz+ dumbdvb_clarity"
]; ];
deployment-dvb.net.wg.publicKey = "j2hGr2rVv7T9kJE15c2IFWjmk0dXuJPev2BXiHZUKk8="; deployment-TLMS.net.wg.publicKey = "j2hGr2rVv7T9kJE15c2IFWjmk0dXuJPev2BXiHZUKk8=";
} }

View File

@ -97,6 +97,6 @@ in
hardstatus string "%w" hardstatus string "%w"
''; '';
dump-dvb.stopsJson = "${pkgs.stops}/stop/all.json"; TLMS.stopsJson = "${pkgs.stops}/stop/all.json";
dump-dvb.graphJson = "${pkgs.stops}/graph/all.json"; TLMS.graphJson = "${pkgs.stops}/graph/all.json";
} }

View File

@ -1,13 +1,13 @@
{ lib, ... }: { lib, ... }:
with lib; { with lib; {
options = { options = {
deployment-dvb.systemNumber = mkOption { deployment-TLMS.systemNumber = mkOption {
type = types.int; type = types.int;
default = 0; default = 0;
description = "number of the system"; description = "number of the system";
}; };
deployment-dvb.domain = mkOption { deployment-TLMS.domain = mkOption {
type = types.str; type = types.str;
default = "dvb.solutions"; default = "dvb.solutions";
description = "domain the server is running on"; description = "domain the server is running on";

View File

@ -1,9 +1,9 @@
{ lib, config, utils, ... }: { lib, config, utils, ... }:
let let
cfg = config.deployment-dvb.net; cfg = config.deployment-TLMS.net;
in in
{ {
options.deployment-dvb.net = with lib; { options.deployment-TLMS.net = with lib; {
iface.uplink = { iface.uplink = {
name = mkOption { name = mkOption {
type = types.nullOr types.str; type = types.nullOr types.str;

View File

@ -1,8 +1,8 @@
{ lib, config, self, ... }: { lib, config, self, ... }:
let let
cfg = config.deployment-dvb.net.wg; cfg = config.deployment-TLMS.net.wg;
in { in {
options.deployment-dvb.net.wg = with lib; { options.deployment-TLMS.net.wg = with lib; {
ownEndpoint.host = mkOption { ownEndpoint.host = mkOption {
type = types.nullOr types.str; type = types.nullOr types.str;
@ -53,22 +53,22 @@ in {
keepalive = 25; keepalive = 25;
# helpers # helpers
peer-systems = (lib.filter (x: (x.config.deployment-dvb.net.wg.addr4 != cfg.addr4) && (!isNull x.config.deployment-dvb.net.wg.addr4)) peer-systems = (lib.filter (x: (x.config.deployment-TLMS.net.wg.addr4 != cfg.addr4) && (!isNull x.config.deployment-TLMS.net.wg.addr4))
(lib.attrValues self.nixosConfigurations)); (lib.attrValues self.nixosConfigurations));
endpoint = endpoint =
let let
ep = (lib.filter (x: ep = (lib.filter (x:
x.config.deployment-dvb.net.wg.addr4 != cfg.addr4 x.config.deployment-TLMS.net.wg.addr4 != cfg.addr4
&& (!isNull x.config.deployment-dvb.net.wg.ownEndpoint.host)) && (!isNull x.config.deployment-TLMS.net.wg.ownEndpoint.host))
(lib.attrValues self.nixosConfigurations)); (lib.attrValues self.nixosConfigurations));
in in
assert lib.assertMsg (lib.length ep == 1) "there should be exactly one endpoint"; ep; assert lib.assertMsg (lib.length ep == 1) "there should be exactly one endpoint"; ep;
peers = map (x: { peers = map (x: {
wireguardPeerConfig = { wireguardPeerConfig = {
PublicKey = x.config.deployment-dvb.net.wg.publicKey; PublicKey = x.config.deployment-TLMS.net.wg.publicKey;
AllowedIPs = [ "${x.config.deployment-dvb.net.wg.addr4}/32" ]; AllowedIPs = [ "${x.config.deployment-TLMS.net.wg.addr4}/32" ];
PersistentKeepalive = keepalive; PersistentKeepalive = keepalive;
}; };
}) peer-systems; }) peer-systems;
@ -76,9 +76,9 @@ in {
ep = [ { ep = [ {
wireguardPeerConfig = wireguardPeerConfig =
let x = lib.elemAt endpoint 0; in { let x = lib.elemAt endpoint 0; in {
PublicKey = x.config.deployment-dvb.net.wg.publicKey; PublicKey = x.config.deployment-TLMS.net.wg.publicKey;
AllowedIPs = [ "${x.config.deployment-dvb.net.wg.addr4}/${toString cfg.prefix4}" ]; AllowedIPs = [ "${x.config.deployment-TLMS.net.wg.addr4}/${toString cfg.prefix4}" ];
Endpoint = with x.config.deployment-dvb.net.wg.ownEndpoint; "${host}:${toString port}"; Endpoint = with x.config.deployment-TLMS.net.wg.ownEndpoint; "${host}:${toString port}";
PersistentKeepalive = keepalive; PersistentKeepalive = keepalive;
}; };
} ]; } ];
@ -87,7 +87,7 @@ in {
dvbwg-netdev = { dvbwg-netdev = {
Kind = "wireguard"; Kind = "wireguard";
Name = dvbwg-name; Name = dvbwg-name;
Description = "dump-dvb enterprise, highly available, biocomputing-neural-network maintained, converged network"; Description = "TLMS enterprise, highly available, biocomputing-neural-network maintained, converged network";
}; };
dvbwg-wireguard = { dvbwg-wireguard = {

View File

@ -1,11 +1,11 @@
{ pkgs, config, ... }: { { pkgs, config, ... }: {
services.nginx = { services.nginx = {
enable = true; enable = true;
virtualHosts."click.${config.deployment-dvb.domain}" = { virtualHosts."click.${config.deployment-TLMS.domain}" = {
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
locations."/" = { locations."/" = {
root = if (config.deployment-dvb.domain == "dvb.solutions") then "${pkgs.click}/web/" else "${pkgs.click-staging}/web/"; root = if (config.deployment-TLMS.domain == "dvb.solutions") then "${pkgs.click}/web/" else "${pkgs.click-staging}/web/";
index = "index.html"; index = "index.html";
tryFiles = "$uri /index.html"; tryFiles = "$uri /index.html";
}; };

View File

@ -1,6 +1,6 @@
{ config, ... }: { config, ... }:
{ {
dump-dvb.dataAccumulator = { TLMS.dataAccumulator = {
enable = true; enable = true;
host = "0.0.0.0"; host = "0.0.0.0";
port = 8080; port = 8080;
@ -12,13 +12,13 @@
GRPC = [ GRPC = [
{ {
name = "API"; name = "API";
host = config.dump-dvb.api.GRPC.host; host = config.TLMS.api.GRPC.host;
port = config.dump-dvb.api.GRPC.port; port = config.TLMS.api.GRPC.port;
} }
{ {
name = "FUNNEL"; name = "FUNNEL";
host = config.dump-dvb.funnel.GRPC.host; host = config.TLMS.funnel.GRPC.host;
port = config.dump-dvb.funnel.GRPC.port; port = config.TLMS.funnel.GRPC.port;
} }
]; ];
}; };
@ -32,12 +32,12 @@
enable = true; enable = true;
recommendedProxySettings = true; recommendedProxySettings = true;
virtualHosts = { virtualHosts = {
"dump.${config.deployment-dvb.domain}" = { "dump.${config.deployment-TLMS.domain}" = {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations = { locations = {
"/" = { "/" = {
proxyPass = with config.dump-dvb.dataAccumulator; "http://${host}:${toString port}/"; proxyPass = with config.TLMS.dataAccumulator; "http://${host}:${toString port}/";
}; };
}; };
}; };

View File

@ -1,5 +1,5 @@
{ config, ... }: { { config, ... }: {
dump-dvb.datacare = { TLMS.datacare = {
enable = true; enable = true;
host = "127.0.0.1"; host = "127.0.0.1";
port = 8070; port = 8070;
@ -21,12 +21,12 @@
enable = true; enable = true;
recommendedProxySettings = true; recommendedProxySettings = true;
virtualHosts = { virtualHosts = {
"datacare.${config.deployment-dvb.domain}" = { "datacare.${config.deployment-TLMS.domain}" = {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations = { locations = {
"/" = { "/" = {
proxyPass = with config.dump-dvb.datacare; "http://${host}:${toString port}/"; proxyPass = with config.TLMS.datacare; "http://${host}:${toString port}/";
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };

View File

@ -8,7 +8,7 @@ in
enable = true; enable = true;
recommendedProxySettings = true; recommendedProxySettings = true;
virtualHosts = { virtualHosts = {
"docs.${config.deployment-dvb.domain}" = { "docs.${config.deployment-TLMS.domain}" = {
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
locations = { locations = {

View File

@ -3,7 +3,7 @@ let
service_number = 1; service_number = 1;
in in
{ {
dump-dvb.api = { TLMS.api = {
enable = true; enable = true;
GRPC = { GRPC = {
host = "127.0.0.1"; host = "127.0.0.1";
@ -11,8 +11,8 @@ in
}; };
port = 9000 + service_number; port = 9000 + service_number;
graphFile = config.dump-dvb.graphJson; graphFile = config.TLMS.graphJson;
stopsFile = config.dump-dvb.stopsJson; stopsFile = config.TLMS.stopsJson;
workerCount = 6; workerCount = 6;
}; };
@ -21,12 +21,12 @@ in
enable = true; enable = true;
recommendedProxySettings = true; recommendedProxySettings = true;
virtualHosts = { virtualHosts = {
"api.${config.deployment-dvb.domain}" = { "api.${config.deployment-TLMS.domain}" = {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations = { locations = {
"/" = { "/" = {
proxyPass = with config.dump-dvb.api; "http://127.0.0.1:${toString port}/"; proxyPass = with config.TLMS.api; "http://127.0.0.1:${toString port}/";
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };

View File

@ -4,7 +4,7 @@
enable = true; enable = true;
recommendedProxySettings = true; recommendedProxySettings = true;
virtualHosts = { virtualHosts = {
"files.${config.deployment-dvb.domain}" = { "files.${config.deployment-TLMS.domain}" = {
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
root = "/var/lib/pub-files/"; root = "/var/lib/pub-files/";

View File

@ -35,7 +35,7 @@
job_name = "funnel-connections"; job_name = "funnel-connections";
static_configs = [ static_configs = [
{ {
targets = [ "127.0.0.1:${toString config.dump-dvb.funnel.metrics.port}"]; targets = [ "127.0.0.1:${toString config.TLMS.funnel.metrics.port}"];
} }
]; ];
} }
@ -64,7 +64,7 @@
params = { module = [ "http_2xx" ]; }; params = { module = [ "http_2xx" ]; };
static_configs = [{ static_configs = [{
targets = [ targets = [
"api.${config.deployment-dvb.domain}" "api.${config.deployment-TLMS.domain}"
]; ];
}]; }];
relabel_configs = [ relabel_configs = [
@ -92,7 +92,7 @@
# visualizer # visualizer
grafana = { grafana = {
settings.server = { settings.server = {
domain = "monitoring.${config.deployment-dvb.domain}"; domain = "monitoring.${config.deployment-TLMS.domain}";
http_port = 2342; http_port = 2342;
http_addr = "127.0.0.1"; http_addr = "127.0.0.1";
}; };

View File

@ -4,7 +4,7 @@
enable = true; enable = true;
recommendedProxySettings = true; recommendedProxySettings = true;
virtualHosts = { virtualHosts = {
"map.${config.deployment-dvb.domain}" = { "map.${config.deployment-TLMS.domain}" = {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
extraConfig = '' extraConfig = ''
@ -35,7 +35,7 @@
''; '';
in { in {
"/" = { "/" = {
root = if (config.deployment-dvb.domain == "dvb.solutions") then "${pkgs.windshield}/bin/" else "${pkgs.windshield-staging}/bin/"; root = if (config.deployment-TLMS.domain == "dvb.solutions") then "${pkgs.windshield}/bin/" else "${pkgs.windshield-staging}/bin/";
index = "index.html"; index = "index.html";
tryFiles = "$uri /index.html =404"; tryFiles = "$uri /index.html =404";

View File

@ -25,7 +25,7 @@ in
networking.firewall.allowedTCPPorts = [ 80 443 ]; networking.firewall.allowedTCPPorts = [ 80 443 ];
security.acme.acceptTerms = true; security.acme.acceptTerms = true;
security.acme.defaults.email = "dump-dvb@protonmail.com"; security.acme.defaults.email = "TLMS@protonmail.com";
services.nginx = { services.nginx = {
recommendedTlsSettings = true; recommendedTlsSettings = true;
recommendedOptimisation = true; recommendedOptimisation = true;

View File

@ -1,4 +1,4 @@
{ lib, pkgs, config, dump-dvb, ... }: { { lib, pkgs, config, TLMS, ... }: {
services.postgresql = { services.postgresql = {
enable = true; enable = true;
@ -18,7 +18,7 @@
]; ];
}; };
environment.systemPackages = [ dump-dvb.packages.x86_64-linux.run-database-migration ]; environment.systemPackages = [ TLMS.packages.x86_64-linux.run-database-migration ];
systemd.services.postgresql = { systemd.services.postgresql = {
unitConfig = { unitConfig = {
@ -36,7 +36,7 @@
$PSQL -c "ALTER ROLE grafana WITH PASSWORD '$(cat ${config.sops.secrets.postgres_password_grafana.path})';" $PSQL -c "ALTER ROLE grafana WITH PASSWORD '$(cat ${config.sops.secrets.postgres_password_grafana.path})';"
export DATABASE_URL=postgres:///dvbdump export DATABASE_URL=postgres:///dvbdump
${dump-dvb.packages.x86_64-linux.run-database-migration}/bin/run-migration ${TLMS.packages.x86_64-linux.run-database-migration}/bin/run-migration
unset DATABASE_URL unset DATABASE_URL
''; '';
}; };

View File

@ -1,8 +1,8 @@
{ config, ... }: { config, ... }:
let let
datacare-user = config.dump-dvb.datacare.user; datacare-user = config.TLMS.datacare.user;
data-accumulator-user = config.dump-dvb.dataAccumulator.user; data-accumulator-user = config.TLMS.dataAccumulator.user;
trekkie-user = config.dump-dvb.trekkie.user; trekkie-user = config.TLMS.trekkie.user;
in in
{ {
sops.age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ]; sops.age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];

View File

@ -3,7 +3,7 @@ let
serice_number = 2; serice_number = 2;
in in
{ {
dump-dvb.funnel = { TLMS.funnel = {
enable = true; enable = true;
GRPC = { GRPC = {
host = "127.0.0.1"; host = "127.0.0.1";
@ -17,19 +17,19 @@ in
port = 9010; port = 9010;
host = "0.0.0.0"; host = "0.0.0.0";
}; };
apiAddress = "127.0.0.1:${toString config.dump-dvb.api.port}"; apiAddress = "127.0.0.1:${toString config.TLMS.api.port}";
}; };
services = { services = {
nginx = { nginx = {
enable = true; enable = true;
recommendedProxySettings = true; recommendedProxySettings = true;
virtualHosts = { virtualHosts = {
"socket.${config.deployment-dvb.domain}" = { "socket.${config.deployment-TLMS.domain}" = {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations = { locations = {
"/" = { "/" = {
proxyPass = with config.dump-dvb.funnel.defaultWebsocket; "http://${host}:${toString port}/"; proxyPass = with config.TLMS.funnel.defaultWebsocket; "http://${host}:${toString port}/";
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };

View File

@ -1,6 +1,6 @@
{ config, ... }: { config, ... }:
{ {
dump-dvb.trekkie = { TLMS.trekkie = {
enable = true; enable = true;
host = "0.0.0.0"; host = "0.0.0.0";
saltPath = config.sops.secrets.postgres_password_hash_salt.path; saltPath = config.sops.secrets.postgres_password_hash_salt.path;
@ -24,20 +24,20 @@
services = { services = {
redis.servers."trekkie" = { redis.servers."trekkie" = {
enable = true; enable = true;
bind = config.dump-dvb.trekkie.redis.host; bind = config.TLMS.trekkie.redis.host;
port = config.dump-dvb.trekkie.redis.port; port = config.TLMS.trekkie.redis.port;
}; };
nginx = { nginx = {
enable = true; enable = true;
recommendedProxySettings = true; recommendedProxySettings = true;
virtualHosts = { virtualHosts = {
"trekkie.${config.deployment-dvb.domain}" = { "trekkie.${config.deployment-TLMS.domain}" = {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations = { locations = {
"/" = { "/" = {
proxyPass = with config.dump-dvb.trekkie; "http://${host}:${toString port}/"; proxyPass = with config.TLMS.trekkie; "http://${host}:${toString port}/";
}; };
}; };
}; };

View File

@ -2,7 +2,7 @@
services.nginx = { services.nginx = {
enable = true; enable = true;
virtualHosts = { virtualHosts = {
"${config.deployment-dvb.domain}" = { "${config.deployment-TLMS.domain}" = {
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
locations = { locations = {

View File

@ -3,7 +3,7 @@
{ {
boot.tmpOnTmpfs = true; boot.tmpOnTmpfs = true;
networking.hostName = "traffic-stop-box-${toString config.deployment-dvb.systemNumber}"; # Define your hostname. networking.hostName = "traffic-stop-box-${toString config.deployment-TLMS.systemNumber}"; # Define your hostname.
# Set your time zone. # Set your time zone.
time.timeZone = "Europe/Berlin"; time.timeZone = "Europe/Berlin";

View File

@ -1,7 +1,7 @@
{ config, lib, self, ... }: { config, lib, self, ... }:
let let
file = with config.deployment-dvb; "${self}/hosts/traffic-stop-box/${toString systemNumber}/config_${toString systemNumber}.json"; file = with config.deployment-TLMS; "${self}/hosts/traffic-stop-box/${toString systemNumber}/config_${toString systemNumber}.json";
receiver_configs = [ receiver_configs = [
{ frequency = 170795000; offset = 19550; device = "hackrf=0"; RF = 14; IF = 8; BB = 42; } # dresden - barkhausen { frequency = 170795000; offset = 19550; device = "hackrf=0"; RF = 14; IF = 8; BB = 42; } # dresden - barkhausen
{ frequency = 170795000; offset = 19400; device = "hackrf=0"; RF = 14; IF = 8; BB = 42; } # dresden - zentralwerk { frequency = 170795000; offset = 19400; device = "hackrf=0"; RF = 14; IF = 8; BB = 42; } # dresden - zentralwerk
@ -15,10 +15,10 @@ let
{ frequency = 152830000; offset = 20000; device = ""; RF = 14; IF = 32; BB = 42; } # Hannover-greater-area { frequency = 152830000; offset = 20000; device = ""; RF = 14; IF = 32; BB = 42; } # Hannover-greater-area
]; ];
receiver_config = lib.elemAt receiver_configs config.deployment-dvb.systemNumber; receiver_config = lib.elemAt receiver_configs config.deployment-TLMS.systemNumber;
in in
{ {
dump-dvb.gnuradio = { TLMS.gnuradio = {
enable = true; enable = true;
frequency = receiver_config.frequency; frequency = receiver_config.frequency;
offset = receiver_config.offset; offset = receiver_config.offset;
@ -27,7 +27,7 @@ in
IF = receiver_config.IF; IF = receiver_config.IF;
BB = receiver_config.BB; BB = receiver_config.BB;
}; };
dump-dvb.telegramDecoder = { TLMS.telegramDecoder = {
enable = true; enable = true;
server = [ "http://10.13.37.1:8080" "http://10.13.37.5:8080" ]; server = [ "http://10.13.37.1:8080" "http://10.13.37.5:8080" ];
configFile = file; configFile = file;

View File

@ -1,6 +1,6 @@
{ config, self, ... }: { config, self, ... }:
{ {
sops.defaultSopsFile = self + /secrets/traffic-stop-box-${toString config.deployment-dvb.systemNumber}/secrets.yaml; sops.defaultSopsFile = self + /secrets/traffic-stop-box-${toString config.deployment-TLMS.systemNumber}/secrets.yaml;
sops.age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ]; sops.age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
sops.secrets.telegram-decoder-token.owner = config.users.users.telegram-decoder.name; sops.secrets.telegram-decoder-token.owner = config.users.users.telegram-decoder.name;

View File

@ -6,8 +6,8 @@
sops.secrets.wg-seckey = { sops.secrets.wg-seckey = {
owner = config.users.users.systemd-network.name; owner = config.users.users.systemd-network.name;
}; };
deployment-dvb.net.wg = { deployment-TLMS.net.wg = {
addr4 = lib.mkDefault "10.13.37.${toString (config.deployment-dvb.systemNumber + 100)}"; addr4 = lib.mkDefault "10.13.37.${toString (config.deployment-TLMS.systemNumber + 100)}";
prefix4 = 24; prefix4 = 24;
privateKeyFile = lib.mkDefault config.sops.secrets.wg-seckey.path; privateKeyFile = lib.mkDefault config.sops.secrets.wg-seckey.path;
}; };

View File

@ -3,12 +3,12 @@ let
mac_addr = "00:de:5b:f9:e2:3d"; mac_addr = "00:de:5b:f9:e2:3d";
in { in {
imports = [ imports = [
../dump-dvb/default.nix ../TLMS/default.nix
./secrets.nix ./secrets.nix
]; ];
sops.defaultSopsFile = ../../secrets/watch-me-senpai/secrets.yaml; sops.defaultSopsFile = ../../secrets/watch-me-senpai/secrets.yaml;
deployment-dvb.net = { deployment-TLMS.net = {
iface.uplink = { iface.uplink = {
name = "eth0"; name = "eth0";
mac = mac_addr; mac = mac_addr;
@ -35,5 +35,5 @@ in {
}; };
deployment-dvb.domain = "dvb.solutions"; deployment-TLMS.domain = "dvb.solutions";
} }

View File

@ -8,7 +8,7 @@ in
networking.firewall.allowedUDPPorts = [ port ]; networking.firewall.allowedUDPPorts = [ port ];
deployment-dvb.net = { deployment-TLMS.net = {
/* /*
iface.uplink = { iface.uplink = {
name = "ens3"; name = "ens3";

View File

@ -2,7 +2,7 @@
let let
installScript = (system: installScript = (system:
let ip = "10.13.37.${toString (system.config.deployment-dvb.systemNumber + 100)}"; let ip = "10.13.37.${toString (system.config.deployment-TLMS.systemNumber + 100)}";
in in
(pkgs.writeScriptBin "deploy" '' (pkgs.writeScriptBin "deploy" ''
#!${pkgs.runtimeShell} #!${pkgs.runtimeShell}

View File

@ -23,6 +23,6 @@ stdenv.mkDerivation {
meta = with lib; { meta = with lib; {
description = "Documentation for DVB-Dump project"; description = "Documentation for DVB-Dump project";
homepage = "https://github.com/dump-dvb/documentation"; homepage = "https://github.com/TLMS/documentation";
}; };
} }