1007 lines
29 KiB
Nix
1007 lines
29 KiB
Nix
{ config
|
|
, pkgs
|
|
, isUnstable
|
|
, inputs
|
|
, ...
|
|
}:
|
|
with pkgs; let
|
|
gqrss = callPackage ../../pkgs/gqrss.nix { inherit isUnstable; };
|
|
icbirc = callPackage ../../pkgs/icbirc.nix { inherit isUnstable; };
|
|
slidingSyncPkg = callPackage ../../pkgs/sliding-sync.nix { };
|
|
weepushover =
|
|
python3Packages.callPackage ../../pkgs/weepushover.nix { inherit pkgs; };
|
|
pgBackupDir = "/var/backups/postgresql";
|
|
pubKeys = [
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILnaC1v+VoVNnK04D32H+euiCyWPXU8nX6w+4UoFfjA3 qbit@plq"
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO7v+/xS8832iMqJHCWsxUZ8zYoMWoZhjj++e26g1fLT europa"
|
|
];
|
|
userBase = { openssh.authorizedKeys.keys = pubKeys; };
|
|
icbIrcTunnel =
|
|
pkgs.writeScriptBin "icb-irc-tunnel"
|
|
(import ../../bins/icb-irc-tunnel.nix {
|
|
inherit pkgs;
|
|
inherit icbirc;
|
|
});
|
|
goModuleHost = "https://codeberg.org/qbit"; # "https://git.sr.ht/~qbit";
|
|
httpAllow = ''
|
|
allow 10.6.0.0/24;
|
|
allow 100.64.0.0/10;
|
|
allow 10.20.30.1/32;
|
|
'';
|
|
|
|
mtxCfg = {
|
|
port = 8009;
|
|
address = "127.0.0.1";
|
|
};
|
|
|
|
matrixServer = "tapenet.org";
|
|
matrixClientConfig = {
|
|
"m.homeserver".base_url = "https://${matrixServer}:443";
|
|
"org.matrix.msc3575.proxy" = { url = "https://${matrixServer}"; };
|
|
};
|
|
matrixServerConfig = { "m.server" = "${matrixServer}:443"; };
|
|
mkMatrixWellKnown = p: ''
|
|
return 200 '${builtins.toJSON p}';
|
|
'';
|
|
|
|
mkMatrixSliderLoc = {
|
|
proxyWebsockets = true;
|
|
proxyPass = "http://${config.services.sliding-sync.address}:${
|
|
toString config.services.sliding-sync.port
|
|
}";
|
|
};
|
|
mkMatrixLoc = {
|
|
proxyWebsockets = true;
|
|
proxyPass = "http://${mtxCfg.address}:${toString mtxCfg.port}";
|
|
};
|
|
in
|
|
{
|
|
_module.args.isUnstable = false;
|
|
imports = [
|
|
./hardware-configuration.nix
|
|
];
|
|
|
|
boot = {
|
|
loader.grub = {
|
|
enable = true;
|
|
device = "/dev/sda";
|
|
configurationLimit = 15;
|
|
};
|
|
|
|
kernelParams = [ "net.ifnames=0" ];
|
|
};
|
|
|
|
nix = {
|
|
settings = {
|
|
allowed-users = lib.mkForce [ "root" ];
|
|
trusted-users = lib.mkForce [ "root" ];
|
|
};
|
|
};
|
|
|
|
tailscale.sshOnly = true;
|
|
|
|
nixpkgs.overlays = [
|
|
(_: super: {
|
|
weechat = super.weechat.override {
|
|
configure = { ... }: {
|
|
scripts = with super.weechatScripts; [ highmon weepushover ];
|
|
};
|
|
};
|
|
})
|
|
];
|
|
|
|
sops.secrets = {
|
|
synapse_signing_key = {
|
|
owner = config.users.users.matrix-synapse.name;
|
|
mode = "600";
|
|
sopsFile = config.xin-secrets.h.secrets.services;
|
|
};
|
|
synapse_shared_secret = {
|
|
owner = config.users.users.matrix-synapse.name;
|
|
mode = "600";
|
|
sopsFile = config.xin-secrets.h.secrets.services;
|
|
};
|
|
hammer_access_token = {
|
|
owner = config.users.users.mjolnir.name;
|
|
mode = "600";
|
|
sopsFile = config.xin-secrets.h.secrets.services;
|
|
};
|
|
gqrss_token = {
|
|
owner = config.users.users.qbit.name;
|
|
mode = "400";
|
|
sopsFile = config.xin-secrets.h.secrets.services;
|
|
};
|
|
restic_env_file = {
|
|
owner = config.users.users.root.name;
|
|
mode = "400";
|
|
sopsFile = config.xin-secrets.h.secrets.services;
|
|
};
|
|
restic_password_file = {
|
|
owner = config.users.users.root.name;
|
|
mode = "400";
|
|
sopsFile = config.xin-secrets.h.secrets.services;
|
|
};
|
|
yarr_auth = {
|
|
owner = config.users.users.yarr.name;
|
|
mode = "400";
|
|
sopsFile = config.xin-secrets.h.secrets.services;
|
|
};
|
|
# TODO: rename
|
|
router_stats_ts_key = {
|
|
sopsFile = config.xin-secrets.h.secrets.services;
|
|
owner = config.users.users.tsvnstat.name;
|
|
};
|
|
gostart = {
|
|
sopsFile = config.xin-secrets.h.secrets.services;
|
|
owner = config.users.users.gostart.name;
|
|
};
|
|
wireguard_private_key = { sopsFile = config.xin-secrets.h.secrets.services; };
|
|
pots_env_file = {
|
|
owner = config.users.users.pots.name;
|
|
mode = "400";
|
|
sopsFile = config.xin-secrets.h.secrets.services;
|
|
};
|
|
sliding_sync_env = {
|
|
owner = config.services.sliding-sync.user;
|
|
mode = "400";
|
|
sopsFile = config.xin-secrets.h.secrets.services;
|
|
};
|
|
pr_status_env = {
|
|
mode = "400";
|
|
owner = config.services.ts-reverse-proxy.servers."pr-status-reverse".user;
|
|
sopsFile = config.xin-secrets.h.secrets.services;
|
|
};
|
|
qbit_at_suah_pass_file = {
|
|
mode = "400";
|
|
owner = "root";
|
|
sopsFile = config.xin-secrets.h.secrets.services;
|
|
};
|
|
mcchunkie_at_suah_pass_file = {
|
|
mode = "400";
|
|
owner = "root";
|
|
sopsFile = config.xin-secrets.h.secrets.services;
|
|
};
|
|
};
|
|
|
|
networking = {
|
|
hostName = "h";
|
|
enableIPv6 = true;
|
|
useDHCP = false;
|
|
defaultGateway = "23.29.118.1";
|
|
defaultGateway6 = "2602:ff16:3::1";
|
|
nameservers = [ "9.9.9.9" ];
|
|
|
|
interfaces.eth0 = {
|
|
ipv4.addresses = [
|
|
{
|
|
address = "23.29.118.127";
|
|
prefixLength = 24;
|
|
}
|
|
];
|
|
ipv6 = {
|
|
addresses = [
|
|
{
|
|
address = "2602:ff16:3:0:1:3a0:0:1";
|
|
prefixLength = 64;
|
|
}
|
|
];
|
|
};
|
|
};
|
|
|
|
wireguard = {
|
|
enable = true;
|
|
interfaces = {
|
|
wg0 = {
|
|
listenPort = 7122;
|
|
ips = [ "192.168.112.3/32" ];
|
|
peers = [
|
|
{
|
|
publicKey = "gZ16FwqUgzKgEpJgVC9BngJ+Dd0e5LPsDhDuJby0VzY=";
|
|
allowedIPs = [ "192.168.112.4/32" ];
|
|
persistentKeepalive = 25;
|
|
}
|
|
];
|
|
privateKeyFile = "${config.sops.secrets.wireguard_private_key.path}";
|
|
};
|
|
};
|
|
};
|
|
|
|
firewall = {
|
|
interfaces = { "tailscale0" = { allowedTCPPorts = [ 9002 config.services.shiori.port ]; }; };
|
|
allowedTCPPorts = [ 22 80 443 2222 53589 ];
|
|
allowedUDPPorts = [ 7122 ];
|
|
allowedUDPPortRanges = [
|
|
{
|
|
from = 60000;
|
|
to = 61000;
|
|
}
|
|
];
|
|
};
|
|
};
|
|
|
|
environment = {
|
|
systemPackages = with pkgs; [
|
|
inetutils
|
|
|
|
# irc
|
|
weechat
|
|
weechatScripts.highmon
|
|
aspell
|
|
aspellDicts.en
|
|
icbirc
|
|
irssi
|
|
|
|
# matrix things
|
|
matrix-synapse-tools.synadm
|
|
matrix-synapse-tools.rust-synapse-compress-state
|
|
|
|
zonemaster-cli
|
|
sqlite
|
|
python3
|
|
python3Packages.nomadnet
|
|
];
|
|
};
|
|
|
|
security.acme = {
|
|
acceptTerms = true;
|
|
defaults.email = "aaron@bolddaemon.com";
|
|
};
|
|
|
|
users = {
|
|
users = {
|
|
root = userBase;
|
|
qbit = userBase;
|
|
};
|
|
};
|
|
|
|
systemd = {
|
|
services = {
|
|
mcchunkie = {
|
|
serviceConfig = {
|
|
ExecStart = lib.mkForce "${pkgs.mcchunkie}/bin/mcchunkie -db /var/lib/mcchunkie/db";
|
|
};
|
|
};
|
|
nomadnet = {
|
|
description = "nomadnet";
|
|
after = [ "network-online.target" ];
|
|
wants = [ "network-online.target" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
serviceConfig = {
|
|
User = "qbit";
|
|
Type = "forking";
|
|
ExecStart = "${pkgs.tmux}/bin/tmux new-session -s NomadNet -d '${pkgs.python3Packages.nomadnet}/bin/nomadnet'";
|
|
ExecStop = "${pkgs.tmux}/bin/tmux kill-session -t NomadNet";
|
|
};
|
|
};
|
|
matrix-synapse.after = [ "icbirc.service" ];
|
|
icb-tunnel = {
|
|
wants =
|
|
[ "network-online.target" "multi-user.target" ];
|
|
before = [ "matrix-synapse.service" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
after = [ "network-online.target" ];
|
|
serviceConfig = {
|
|
User = "qbit";
|
|
WorkingDirectory = "/home/qbit";
|
|
ExecStart = "${icbIrcTunnel}/bin/icb-irc-tunnel";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
mailserver = {
|
|
enable = true;
|
|
fqdn = "mail.suah.dev";
|
|
domains = [ "suah.dev" ];
|
|
|
|
certificateScheme = "acme-nginx";
|
|
|
|
localDnsResolver = false;
|
|
|
|
loginAccounts = {
|
|
"qbit@suah.dev" = {
|
|
hashedPasswordFile = "${config.sops.secrets.qbit_at_suah_pass_file.path}";
|
|
aliases = [ "postmaster@suah.dev" "aaron@suah.dev" ];
|
|
};
|
|
"mcchunkie@suah.dev" = {
|
|
hashedPasswordFile = "${config.sops.secrets.mcchunkie_at_suah_pass_file.path}";
|
|
};
|
|
};
|
|
|
|
fullTextSearch = {
|
|
enable = true;
|
|
autoIndex = true;
|
|
indexAttachments = true;
|
|
enforced = "body";
|
|
};
|
|
};
|
|
|
|
services = {
|
|
postfix.extraConfig = ''
|
|
smtputf8_enable = no
|
|
'';
|
|
smartd.enable = false;
|
|
mcchunkie.enable = true;
|
|
navidrome = {
|
|
enable = true;
|
|
settings = {
|
|
Address = "127.0.0.1";
|
|
Port = 4533;
|
|
MusicFolder = "/var/lib/music";
|
|
PlaylistsPath = ".:**/**";
|
|
};
|
|
};
|
|
shiori = {
|
|
enable = true;
|
|
port = 8967;
|
|
address = "127.0.0.1";
|
|
package = inputs.unstable.legacyPackages.${pkgs.system}.shiori;
|
|
};
|
|
veilid-server = {
|
|
enable = true;
|
|
package = inputs.unstable.legacyPackages.${pkgs.system}.veilid;
|
|
};
|
|
heisenbridge = {
|
|
enable = true;
|
|
homeserver = "http://${mtxCfg.address}:${toString mtxCfg.port}";
|
|
owner = "@qbit:tapenet.org";
|
|
namespaces = {
|
|
users = [
|
|
{
|
|
regex = "@irc_.*";
|
|
exclusive = true;
|
|
}
|
|
];
|
|
aliases = [ ];
|
|
rooms = [ ];
|
|
};
|
|
};
|
|
ts-reverse-proxy = {
|
|
servers = {
|
|
"pr-status-reverse" = {
|
|
enable = true;
|
|
reverseName = "pr-status";
|
|
reversePort = 3003;
|
|
};
|
|
};
|
|
};
|
|
sliding-sync = {
|
|
enable = true;
|
|
server = "https://tapenet.org";
|
|
package = slidingSyncPkg;
|
|
};
|
|
pots = {
|
|
enable = true;
|
|
envFile = "${config.sops.secrets.pots_env_file.path}";
|
|
};
|
|
pr-status = { enable = true; };
|
|
gostart = {
|
|
enable = true;
|
|
keyPath = "${config.sops.secrets.gostart.path}";
|
|
};
|
|
kogs = {
|
|
enable = true;
|
|
#registration = false;
|
|
listen = "127.0.0.1:8383";
|
|
};
|
|
tsvnstat = {
|
|
enable = true;
|
|
#keyPath = "${config.sops.secrets.router_stats_ts_key.path}";
|
|
};
|
|
yarr.enable = true;
|
|
gotosocial = {
|
|
enable = true;
|
|
# https://github.com/superseriousbusiness/gotosocial/blob/v0.5.2/example/config.yaml
|
|
configuration = {
|
|
account-domain = "mammothcirc.us";
|
|
accounts-approval-required = false;
|
|
accounts-reason-required = false;
|
|
accounts-registration-open = false;
|
|
accounts-allow-custom-css = true;
|
|
advanced-cookies-samesite = "strict";
|
|
bind-address = "127.0.0.1";
|
|
db-address = "127.0.0.1";
|
|
db-database = "gotosocial";
|
|
db-port = 5432;
|
|
db-tls-ca-cert = "";
|
|
db-type = "postgres";
|
|
db-user = "gotosocial";
|
|
dp-password = "";
|
|
host = "mammothcirc.us";
|
|
log-db-queries = true;
|
|
log-level = "debug";
|
|
port = 8778;
|
|
protocol = "https";
|
|
storage-backend = "local";
|
|
storage-local-base-path = "/var/lib/gotosocial";
|
|
trusted-proxies = [ "127.0.0.1/32" "23.29.118.0/24" ];
|
|
web-template-base-dir = "${config.services.gotosocial.package}/assets/web/template/";
|
|
web-asset-base-dir = "${config.services.gotosocial.package}/assets/web/assets/";
|
|
};
|
|
};
|
|
promtail = {
|
|
enable = true;
|
|
configuration = {
|
|
server = {
|
|
http_listen_port = 3031;
|
|
grpc_listen_port = 0;
|
|
};
|
|
positions = { filename = "/tmp/positions.yaml"; };
|
|
clients = [{ url = "http://box.otter-alligator.ts.net:3030/loki/api/v1/push"; }];
|
|
scrape_configs = [
|
|
{
|
|
job_name = "journal";
|
|
journal = {
|
|
max_age = "12h";
|
|
labels = {
|
|
job = "systemd-journal";
|
|
host = "box";
|
|
};
|
|
};
|
|
relabel_configs = [
|
|
{
|
|
source_labels = [ "__journal__systemd_unit" ];
|
|
target_label = "unit";
|
|
}
|
|
];
|
|
}
|
|
];
|
|
};
|
|
};
|
|
prometheus = {
|
|
enable = true;
|
|
port = 9001;
|
|
listenAddress = "100.83.77.133";
|
|
|
|
exporters = {
|
|
node = {
|
|
enable = true;
|
|
enabledCollectors = [ "systemd" ];
|
|
port = 9002;
|
|
};
|
|
};
|
|
};
|
|
cron = {
|
|
enable = true;
|
|
systemCronJobs = [
|
|
''
|
|
@hourly qbit (export GH_AUTH_TOKEN=$(cat /run/secrets/gqrss_token); cd /var/www/suah.dev/rss; ${gqrss}/bin/gqrss ; ${gqrss}/bin/gqrss -search "LibreSSL" -prefix libressl_ ) >/dev/null 2>&1''
|
|
];
|
|
};
|
|
|
|
backups = {
|
|
b2 = {
|
|
enable = true;
|
|
repository = "b2:cyaspanJicyeemJedMarlEjcasOmos";
|
|
environmentFile = "${config.sops.secrets.restic_env_file.path}";
|
|
passwordFile = "${config.sops.secrets.restic_password_file.path}";
|
|
|
|
paths = [
|
|
pgBackupDir
|
|
"/var/lib/synapse/media_store"
|
|
"/var/www"
|
|
"/home"
|
|
"/var/lib/yarr"
|
|
"/var/lib/shiori"
|
|
"/var/lib/gotosocial"
|
|
"/var/lib/mcchunkie"
|
|
"/var/lib/heisenbridge"
|
|
"/var/lib/kogs"
|
|
"/var/vmail"
|
|
"/var/dkim"
|
|
];
|
|
|
|
timerConfig = { OnCalendar = "00:05"; };
|
|
|
|
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-yearly 10" ];
|
|
};
|
|
};
|
|
|
|
nginx = {
|
|
enable = true;
|
|
|
|
package = pkgs.openresty;
|
|
|
|
recommendedTlsSettings = true;
|
|
recommendedOptimisation = true;
|
|
recommendedGzipSettings = true;
|
|
recommendedProxySettings = true;
|
|
|
|
clientMaxBodySize = "50M";
|
|
|
|
commonHttpConfig = ''
|
|
# Add HSTS header with preloading to HTTPS requests.
|
|
# Adding this header to HTTP requests is discouraged
|
|
map $scheme $hsts_header {
|
|
https "max-age=31536000; includeSubdomains; preload";
|
|
}
|
|
add_header Strict-Transport-Security $hsts_header;
|
|
|
|
# Enable CSP for your services.
|
|
#add_header Content-Security-Policy "script-src 'self'; object-src 'none'; base-uri 'none';" always;
|
|
|
|
# Minimize information leaked to other domains
|
|
add_header 'Referrer-Policy' 'origin-when-cross-origin';
|
|
|
|
# Disable embedding as a frame
|
|
add_header X-Frame-Options DENY;
|
|
|
|
# Prevent injection of code in other mime types (XSS Attacks)
|
|
add_header X-Content-Type-Options nosniff;
|
|
|
|
# This might create errors
|
|
proxy_cookie_path / "/; secure; HttpOnly; SameSite=strict";
|
|
'';
|
|
|
|
upstreams = {
|
|
"ssh_gitea" = { servers = { "192.168.112.4:2222" = { }; }; };
|
|
};
|
|
|
|
streamConfig = ''
|
|
server {
|
|
listen 23.29.118.127:2222;
|
|
proxy_pass 192.168.112.4:2222;
|
|
}
|
|
'';
|
|
|
|
virtualHosts = {
|
|
"deftly.net" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
root = "/var/www/deftly.net";
|
|
extraConfig = ''
|
|
location ~ ^/pub|^/patches|^/dist|^/pbp|^/screenshots|^/pharo|^/fw {
|
|
autoindex on;
|
|
index index.php index.html index.htm;
|
|
}
|
|
'';
|
|
};
|
|
"bolddaemon.com" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
root = "/var/www/bolddaemon.com";
|
|
|
|
};
|
|
"paste.suah.dev" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
root = "/var/www/paste";
|
|
};
|
|
"sync.suah.dev" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
|
|
locations = {
|
|
"/" = {
|
|
proxyPass = "http://${config.services.kogs.listen}";
|
|
proxyWebsockets = true;
|
|
priority = 1000;
|
|
};
|
|
};
|
|
};
|
|
"notes.suah.dev" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
root = "/var/www/suah.dev";
|
|
extraConfig = ''
|
|
location / {
|
|
resolver 9.9.9.9;
|
|
proxy_set_header Connection "";
|
|
proxy_http_version 1.1;
|
|
proxy_pass https://publish.obsidian.md/serve?url=notes.suah.dev/;
|
|
proxy_ssl_server_name on;
|
|
}
|
|
'';
|
|
};
|
|
"exo.suah.dev" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
root = "/var/www/exo.suah.dev";
|
|
};
|
|
|
|
"music.tapenet.org" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
|
|
locations = {
|
|
"/" = {
|
|
proxyPass = "http://${config.services.navidrome.settings.Address}:${toString config.services.navidrome.settings.Port}";
|
|
proxyWebsockets = true;
|
|
priority = 1000;
|
|
};
|
|
};
|
|
};
|
|
|
|
"bookmarks.tapenet.org" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
|
|
locations = {
|
|
"/" = {
|
|
proxyPass = "http://${config.services.shiori.address}:${toString config.services.shiori.port}";
|
|
proxyWebsockets = true;
|
|
priority = 1000;
|
|
};
|
|
};
|
|
};
|
|
|
|
"git.tapenet.org" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
|
|
locations = {
|
|
"/" = {
|
|
proxyPass = "http://192.168.112.4:3000";
|
|
proxyWebsockets = true;
|
|
priority = 1000;
|
|
};
|
|
};
|
|
};
|
|
|
|
"bw.tapenet.org" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
|
|
locations = {
|
|
"/" = {
|
|
proxyPass = "http://192.168.112.4:8222";
|
|
proxyWebsockets = true;
|
|
};
|
|
"/admin" = {
|
|
extraConfig = ''
|
|
${httpAllow}
|
|
deny all;
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
"suah.dev" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
root = "/var/www/suah.dev";
|
|
extraConfig = ''
|
|
location ~ ^/api {
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
proxy_set_header Host $host:$server_port;
|
|
proxy_set_header X-Forwarded-Proto $scheme;
|
|
proxy_set_header X-Forwarded-Ssl on;
|
|
proxy_read_timeout 300;
|
|
proxy_connect_timeout 300;
|
|
proxy_pass http://127.0.0.1:8888; # pots
|
|
}
|
|
location ~ ^/_got {
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
proxy_set_header Host $host:$server_port;
|
|
proxy_set_header X-Forwarded-Proto $scheme;
|
|
proxy_set_header X-Forwarded-Ssl on;
|
|
proxy_read_timeout 300;
|
|
proxy_connect_timeout 300;
|
|
proxy_pass http://127.0.0.1:8043;
|
|
}
|
|
|
|
location ~ ^/_sms {
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
proxy_set_header Host $host:$server_port;
|
|
proxy_set_header X-Forwarded-Proto $scheme;
|
|
proxy_set_header X-Forwarded-Ssl on;
|
|
proxy_set_header Authorization $http_authorization;
|
|
proxy_pass_header Authorization;
|
|
proxy_read_timeout 300;
|
|
proxy_connect_timeout 300;
|
|
proxy_pass http://127.0.0.1:8044;
|
|
}
|
|
location ~ ^/p/ {
|
|
autoindex on;
|
|
}
|
|
|
|
location ~ ^/recipes/ {
|
|
autoindex on;
|
|
}
|
|
|
|
location ~ ^/_matrix/|^/_synapse/ {
|
|
return 404;
|
|
}
|
|
|
|
location ~* .(xml)$ {
|
|
autoindex on;
|
|
root /var/www/suah.dev/rss;
|
|
}
|
|
|
|
location ~ "([^/\s]+)(/.*)?" {
|
|
set $not_serving 1;
|
|
|
|
if ($request_filename = 'index.html') {
|
|
set $not_serving 0;
|
|
}
|
|
|
|
if (-f $request_filename) {
|
|
set $not_serving 0;
|
|
}
|
|
|
|
if ($args = "go-get=1") {
|
|
add_header Strict-Transport-Security $hsts_header;
|
|
add_header Referrer-Policy origin-when-cross-origin;
|
|
add_header X-Frame-Options DENY;
|
|
add_header X-Content-Type-Options nosniff;
|
|
add_header Content-Type text/html;
|
|
return 200 '<html><head>
|
|
<meta name="go-import" content="$host/$1 git ${goModuleHost}/$1">
|
|
<meta name="go-source" content="$host/$1 _ ${goModuleHost}/$1/tree/master{/dir} ${goModuleHost}/$1/tree/master{/dir}/{file}#L{line}">
|
|
<meta http-equiv="refresh" content="0; url=https://pkg.go.dev/mod/suah.dev/$1">
|
|
</head>
|
|
<body>
|
|
Redirecting to docs at <a href="https://pkg.go.dev/mod/suah.dev/$1">pkg.go.dev/mod/suah.dev/$1</a>...
|
|
</body>
|
|
</html>';
|
|
}
|
|
if ($not_serving) {
|
|
add_header Strict-Transport-Security $hsts_header;
|
|
add_header Referrer-Policy origin-when-cross-origin;
|
|
add_header X-Frame-Options DENY;
|
|
add_header X-Content-Type-Options nosniff;
|
|
add_header Content-Type text/html;
|
|
return 200 '<html><head>
|
|
<meta name="go-import" content="$host/$1 git ${goModuleHost}/$1">
|
|
<meta name="go-source" content="$host/$1 _ ${goModuleHost}/$1/tree/master{/dir} ${goModuleHost}/$1/tree/master{/dir}/{file}#L{line}">
|
|
<meta http-equiv="refresh" content="0; url=https://pkg.go.dev/mod/suah.dev/$1">
|
|
</head>
|
|
<body>
|
|
Redirecting to docs at <a href="https://pkg.go.dev/mod/suah.dev/$1">pkg.go.dev/mod/suah.dev/$1</a>...
|
|
</body>
|
|
</html>';
|
|
}
|
|
}
|
|
'';
|
|
};
|
|
"qbit.io" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
root = "/var/www/qbit.io";
|
|
};
|
|
"mammothcirc.us" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
extraConfig =
|
|
if config.services.gotosocial.package.version == "0.7.1"
|
|
then ''
|
|
# TODO: This can be removed next release
|
|
# https://github.com/superseriousbusiness/gotosocial/issues/1419
|
|
# Workaround for missing API + Ice Cubes
|
|
location ~ ^/api/v1/accounts/[0-9A-Z]+/featured_tags {
|
|
default_type application/json;
|
|
return 200 '[]';
|
|
}
|
|
''
|
|
else "";
|
|
locations."/" = {
|
|
extraConfig = ''
|
|
proxy_pass http://127.0.0.1:${
|
|
toString config.services.gotosocial.configuration.port
|
|
};
|
|
proxy_set_header Host $host;
|
|
proxy_set_header Upgrade $http_upgrade;
|
|
proxy_set_header Connection "upgrade";
|
|
proxy_set_header X-Forwarded-For $remote_addr;
|
|
proxy_set_header X-Forwarded-Proto $scheme;
|
|
'';
|
|
};
|
|
};
|
|
"mammothcircus.com" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
root = "/var/www/mammothcircus.com";
|
|
};
|
|
"rss.bolddaemon.com" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
root = "/var/www/rss.bolddaemon.com";
|
|
locations."/" = {
|
|
proxyWebsockets = true;
|
|
proxyPass = "http://${config.services.yarr.address}:${
|
|
toString config.services.yarr.port
|
|
}";
|
|
};
|
|
};
|
|
"tapenet.org" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
root = "/var/www/tapenet.org";
|
|
locations = {
|
|
"/.well-known/webfinger" = {
|
|
extraConfig = ''
|
|
default_type 'application/json';
|
|
|
|
content_by_lua_block {
|
|
local acct = ngx.unescape_uri(ngx.var.arg_resource)
|
|
local json = '${builtins.toJSON {
|
|
subject = "%s";
|
|
links = [
|
|
{
|
|
rel = "http://openid.net/specs/connect/1.0/issuer";
|
|
href = "https://git.tapenet.org/";
|
|
}
|
|
];
|
|
}}';
|
|
local newjson, n, err = ngx.re.sub(json, "%s", acct)
|
|
if not err then
|
|
ngx.say(newjson)
|
|
else
|
|
ngx.say("")
|
|
end
|
|
return
|
|
}
|
|
'';
|
|
};
|
|
}
|
|
// (if config.services.sliding-sync.enable
|
|
then {
|
|
"/.well-known/matrix/client".extraConfig =
|
|
mkMatrixWellKnown matrixClientConfig;
|
|
"/.well-known/matrix/server".extraConfig =
|
|
mkMatrixWellKnown matrixServerConfig;
|
|
|
|
"/client" = mkMatrixSliderLoc;
|
|
"/_matrix/client/unstable/org.matrix.msc3575/sync" =
|
|
mkMatrixSliderLoc;
|
|
|
|
"/_matrix" = mkMatrixLoc;
|
|
"/_synapse/client" = mkMatrixLoc;
|
|
}
|
|
else {
|
|
"/.well-known/matrix/client".extraConfig =
|
|
mkMatrixWellKnown matrixClientConfig;
|
|
"/.well-known/matrix/server".extraConfig =
|
|
mkMatrixWellKnown matrixServerConfig;
|
|
|
|
"/_matrix" = mkMatrixLoc;
|
|
"/_synapse/client" = mkMatrixLoc;
|
|
});
|
|
};
|
|
};
|
|
};
|
|
|
|
postgresqlBackup = {
|
|
enable = true;
|
|
location = pgBackupDir;
|
|
};
|
|
|
|
postgresql = {
|
|
enable = true;
|
|
package = pkgs.postgresql_14;
|
|
|
|
settings = { };
|
|
|
|
enableTCPIP = true;
|
|
authentication = pkgs.lib.mkOverride 14 ''
|
|
local all all trust
|
|
host all all 127.0.0.1/32 trust
|
|
host all all ::1/128 trust
|
|
'';
|
|
|
|
initialScript = pkgs.writeText "synapse-init.sql" ''
|
|
CREATE ROLE "synapse-user" LOGIN;
|
|
CREATE DATABASE "synapse" WITH OWNER "synapse-user"
|
|
TEMPLATE template0
|
|
LC_COLLATE = "C"
|
|
LC_CTYPE = "C";
|
|
'';
|
|
ensureDatabases = [ "synapse" "gotosocial" "syncv3" "wallabag" ];
|
|
ensureUsers = [
|
|
{
|
|
name = "synapse_user";
|
|
}
|
|
{
|
|
name = "gotosocial";
|
|
ensureDBOwnership = true;
|
|
}
|
|
{
|
|
name = "syncv3";
|
|
ensureDBOwnership = true;
|
|
}
|
|
{
|
|
name = "wallabag";
|
|
ensureDBOwnership = true;
|
|
}
|
|
];
|
|
};
|
|
|
|
mjolnir = {
|
|
enable = true;
|
|
pantalaimon.enable = false;
|
|
pantalaimon.username = "hammer";
|
|
accessTokenFile = "${config.sops.secrets.hammer_access_token.path}";
|
|
homeserverUrl = "https://tapenet.org";
|
|
protectedRooms = [
|
|
"https://matrix.to/#/#openbsd:matrix.org"
|
|
"https://matrix.to/#/#go-lang:matrix.org"
|
|
"https://matrix.to/#/#plan9:matrix.org"
|
|
"https://matrix.to/#/#nix-openbsd:tapenet.org"
|
|
"https://matrix.to/#/#cobug:tapenet.org"
|
|
"https://matrix.to/#/#gosec:tapenet.org"
|
|
"https://matrix.to/#/#gophers-offtopic:matrix.org"
|
|
"https://matrix.to/#/#devious:tapenet.org"
|
|
"https://matrix.to/#/#gotk4:matrix.org"
|
|
"https://matrix.to/#/#aerc:matrix.org"
|
|
"https://matrix.to/#/#pueblo-nerds:tapenet.org"
|
|
|
|
"https://matrix.to/#/#nixhub-home:matrix.org"
|
|
"https://matrix.to/#/#nixhub-devnull:matrix.org"
|
|
];
|
|
settings = {
|
|
verboseLogging = false;
|
|
protections = {
|
|
wordlist = {
|
|
words = [
|
|
"^https://libera.chat <-- visit!$"
|
|
"^@.*@.*@.*@.*@.*@.*@.*@.*@.*@.*"
|
|
];
|
|
};
|
|
};
|
|
managementRoom = "#moderation:tapenet.org";
|
|
automaticallyRedactForReasons = [
|
|
"spam"
|
|
"advertising"
|
|
"racism"
|
|
"nazi"
|
|
"nazism"
|
|
"trolling"
|
|
"porn"
|
|
"csam"
|
|
];
|
|
aditionalPrefixes = [ "hammer" ];
|
|
confirmWildcardBan = false;
|
|
};
|
|
};
|
|
|
|
matrix-synapse = {
|
|
enable = true;
|
|
dataDir = "/var/lib/synapse";
|
|
settings = {
|
|
federation_client_minimum_tls_version = "1.2";
|
|
enable_registration = false;
|
|
registration_shared_secret_path = "${config.sops.secrets.synapse_shared_secret.path}";
|
|
media_store_path = "/var/lib/synapse/media_store";
|
|
presence.enabled = true;
|
|
public_baseurl = "https://tapenet.org";
|
|
server_name = "tapenet.org";
|
|
signing_key_path = "${config.sops.secrets.synapse_signing_key.path}";
|
|
url_preview_enabled = false;
|
|
plugins = with config.services.matrix-synapse.package.plugins; [ matrix-synapse-mjolnir-antispam ];
|
|
app_service_config_files = [
|
|
"/var/lib/heisenbridge/registration.yml"
|
|
];
|
|
database = {
|
|
name = "psycopg2";
|
|
args = {
|
|
database = "synapse";
|
|
user = "synapse_user";
|
|
};
|
|
};
|
|
listeners = [
|
|
{
|
|
inherit (mtxCfg) port;
|
|
bind_addresses = [ mtxCfg.address ];
|
|
resources = [
|
|
{
|
|
compress = true;
|
|
names = [ "client" ];
|
|
}
|
|
{
|
|
compress = false;
|
|
names = [ "federation" ];
|
|
}
|
|
];
|
|
tls = false;
|
|
type = "http";
|
|
x_forwarded = true;
|
|
}
|
|
];
|
|
};
|
|
};
|
|
};
|
|
|
|
|
|
system.stateVersion = "22.11";
|
|
}
|