More service changes start the move to nixfox.ca and replace the username
This commit is contained in:
parent
bf138bcd93
commit
ab6f4f9946
33 changed files with 54 additions and 203 deletions
7
modules/system/accounts/users/custom/default.nix
Normal file
7
modules/system/accounts/users/custom/default.nix
Normal file
|
@ -0,0 +1,7 @@
|
|||
{ home-manager, ... }:
|
||||
{
|
||||
imports = [
|
||||
./jimbo
|
||||
home-manager.nixosModules.home-manager
|
||||
];
|
||||
}
|
|
@ -5,14 +5,13 @@
|
|||
hashedPassword = config.secrets.jimboAccPass;
|
||||
isNormalUser = true;
|
||||
openssh.authorizedKeys.keys = [
|
||||
(builtins.readFile ../../../../../hosts/tower/id_ed25519.pub)
|
||||
(builtins.readFile ../../../../../../hosts/tower/id_ed25519.pub)
|
||||
|
||||
(builtins.readFile ../../../../../hosts/envy/id_ed25519.pub)
|
||||
(builtins.readFile ../../../../../hosts/lacros/id_ed25519.pub)
|
||||
(builtins.readFile ../../../../../hosts/redmond/id_ed25519.pub)
|
||||
(builtins.readFile ../../../../../../hosts/envy/id_ed25519.pub)
|
||||
(builtins.readFile ../../../../../../hosts/redmond/id_ed25519.pub)
|
||||
|
||||
(builtins.readFile ../../../../../hosts/kitty/id_ed25519.pub)
|
||||
(builtins.readFile ../../../../../hosts/prophet/id_ed25519.pub)
|
||||
(builtins.readFile ../../../../../../hosts/kitty/id_ed25519.pub)
|
||||
(builtins.readFile ../../../../../../hosts/prophet/id_ed25519.pub)
|
||||
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJahAoF74BY6GCTsFkt1ADKaraFgJJozW1Y1aBTLK0j9 Pixel9"
|
||||
];
|
||||
|
@ -35,5 +34,5 @@
|
|||
shell = pkgs.zsh;
|
||||
};
|
||||
|
||||
home-manager.users.jimbo = import ../../../../home;
|
||||
home-manager.users.jimbo = import ../../../../../home;
|
||||
}
|
|
@ -1,11 +1,8 @@
|
|||
{ home-manager, ... }:
|
||||
{ ... }:
|
||||
{
|
||||
imports = [
|
||||
./jimbo
|
||||
./liquidsoap
|
||||
./nextcloud
|
||||
./nginx
|
||||
home-manager.nixosModules.home-manager
|
||||
./custom
|
||||
./system
|
||||
];
|
||||
|
||||
users.mutableUsers = false;
|
||||
|
|
8
modules/system/accounts/users/system/default.nix
Normal file
8
modules/system/accounts/users/system/default.nix
Normal file
|
@ -0,0 +1,8 @@
|
|||
{ ... }:
|
||||
{
|
||||
imports = [
|
||||
./liquidsoap
|
||||
./nextcloud
|
||||
./nginx
|
||||
];
|
||||
}
|
|
@ -2,6 +2,6 @@
|
|||
{
|
||||
security.acme = {
|
||||
acceptTerms = true;
|
||||
defaults.email = "jimjam4real@gmail.com";
|
||||
defaults.email = "jimbo@${config.domains.p2}";
|
||||
};
|
||||
}
|
||||
|
|
|
@ -4,19 +4,19 @@
|
|||
enable = config.system.server.enable;
|
||||
protocol = "cloudflare";
|
||||
usev4 = "web, web=https://ipinfo.io/ip";
|
||||
zone = "${config.domains.p1}";
|
||||
zone = "${config.domains.p2}";
|
||||
username = "token";
|
||||
passwordFile = "${pkgs.writeText "cloudflareapikey" config.secrets.flareApiKey}";
|
||||
domains = [
|
||||
"${config.domains.p1}"
|
||||
"*.${config.domains.p1}"
|
||||
"sv.${config.domains.p1}"
|
||||
"git.${config.domains.p1}"
|
||||
"turn.${config.domains.p1}"
|
||||
"dew.${config.domains.p1}"
|
||||
"john.${config.domains.p1}"
|
||||
"beta.${config.domains.p1}"
|
||||
"rogue.${config.domains.p1}"
|
||||
"${config.domains.p2}"
|
||||
"*.${config.domains.p2}"
|
||||
"sv.${config.domains.p2}"
|
||||
"git.${config.domains.p2}"
|
||||
"turn.${config.domains.p2}"
|
||||
"dew.${config.domains.p2}"
|
||||
"john.${config.domains.p2}"
|
||||
"beta.${config.domains.p2}"
|
||||
"rogue.${config.domains.p2}"
|
||||
];
|
||||
};
|
||||
}
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
services.nextcloud = {
|
||||
enable = config.system.server.enable;
|
||||
package = pkgs.nextcloud30;
|
||||
hostName = "cloud.${config.domains.p1}";
|
||||
hostName = "cloud.${config.domains.p2}";
|
||||
datadir = "/mnt/nextcloud";
|
||||
https = true;
|
||||
config = {
|
||||
|
@ -14,7 +14,7 @@
|
|||
};
|
||||
settings = {
|
||||
trusted_proxies = [ "127.0.0.1" ];
|
||||
trusted_domains = [ "cloud.${config.domains.p1}" ];
|
||||
trusted_domains = [ "cloud.${config.domains.p2}" ];
|
||||
overwriteprotocol = "https";
|
||||
mail_smtphost = "mx.${config.domains.p1}";
|
||||
mail_domain = "${config.domains.p1}";
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ lib, config, ... }:
|
||||
{
|
||||
services.nginx.virtualHosts."cloud.${config.domains.p1}" = lib.mkIf config.services.nextcloud.enable {
|
||||
services.nginx.virtualHosts."cloud.${config.domains.p2}" = lib.mkIf config.services.nextcloud.enable {
|
||||
enableACME = true;
|
||||
addSSL = true;
|
||||
locations."/" = {
|
||||
|
|
|
@ -16,7 +16,7 @@
|
|||
mailer = {
|
||||
ENABLED = true;
|
||||
SMTP_ADDR = "mx.${config.domains.p1}";
|
||||
FROM = "Jimbo's Git <noreply@${config.domains.p1}>";
|
||||
FROM = "NixFox Git <noreply@${config.domains.p1}>";
|
||||
USER = "noreply@${config.domains.p1}";
|
||||
PASSWD = config.secrets.noreplyPassword;
|
||||
PROTOCOL = "smtps";
|
||||
|
|
|
@ -8,7 +8,7 @@
|
|||
services.icecast = {
|
||||
enable = config.system.server.enable;
|
||||
listen.port = 265;
|
||||
hostname = "icecast.${config.domains.p1}";
|
||||
hostname = "radio.${config.domains.p2}";
|
||||
admin = {
|
||||
user = "jimbo";
|
||||
password = "${config.secrets.castAdminPass}";
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ lib, config, ... }:
|
||||
{
|
||||
services.nginx.virtualHosts."icecast.${config.domains.p1}" = lib.mkIf config.services.icecast.enable {
|
||||
services.nginx.virtualHosts."radio.${config.domains.p2}" = lib.mkIf config.services.icecast.enable {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
locations."/" = {
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
{
|
||||
services.roundcube = {
|
||||
enable = config.system.mailserver.enable;
|
||||
hostName = "mail.${config.domains.p1}";
|
||||
hostName = "mail.${config.domains.p2}";
|
||||
extraConfig = ''
|
||||
$config['smtp_server'] = "tls://mx.${config.domains.p1}";
|
||||
$config['smtp_user'] = "%u";
|
||||
|
|
|
@ -9,7 +9,7 @@ in {
|
|||
serverProperties = common.serverProperties // {
|
||||
difficulty = 3;
|
||||
server-port = 30014;
|
||||
motd = "\\u00A7l\\u00A7bJimbo's \\u00A7cRoguecraft \\u00A7bserver.";
|
||||
motd = "\\u00A7l\\u00A7bNixFox \\u00A7cRoguecraft \\u00A7bserver.";
|
||||
require-resource-pack = true;
|
||||
resource-pack = "https://${config.domains.p1}/roguecraftresourcepackredir";
|
||||
resource-pack-sha1 = "b540c0562aba90c3ead2356bb9cb74fcf0db36b3";
|
||||
|
|
|
@ -34,7 +34,7 @@
|
|||
};
|
||||
|
||||
systemd.services.nginx.serviceConfig = {
|
||||
ReadWritePaths = [ "/var/www/Jimbo-Landing-Page/streams/hls/" ];
|
||||
ReadWritePaths = [ "/var/www/landing-page/streams/hls/" ];
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ ... }:
|
||||
{
|
||||
imports = [
|
||||
./p1
|
||||
./p2
|
||||
];
|
||||
}
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, ... }:
|
||||
{
|
||||
services.nginx.virtualHosts."${config.domains.p1}" = lib.mkIf config.system.server.enable {
|
||||
services.nginx.virtualHosts."${config.domains.p2}" = lib.mkIf config.system.server.enable {
|
||||
enableACME = true;
|
||||
addSSL = true;
|
||||
root = "/var/www/landing-page";
|
||||
|
@ -10,13 +10,13 @@
|
|||
return 200 '
|
||||
{
|
||||
"m.homeserver": {
|
||||
"base_url": "https://matrix.${config.domains.p1}"
|
||||
"base_url": "https://matrix.${config.domains.p2}"
|
||||
},
|
||||
"m.identity_server": {
|
||||
"base_url": "https://matrix.org"
|
||||
},
|
||||
"org.matrix.msc3575.proxy": {
|
||||
"url": "https://matrix.${config.domains.p1}"
|
||||
"url": "https://matrix.${config.domains.p2}"
|
||||
}
|
||||
}
|
||||
';
|
||||
|
@ -24,7 +24,7 @@
|
|||
|
||||
"/.well-known/matrix/server".extraConfig = ''
|
||||
default_type application/json;
|
||||
return 200 '{ "m.server": "matrix.${config.domains.p1}:443" }';
|
||||
return 200 '{ "m.server": "matrix.${config.domains.p2}:443" }';
|
||||
'';
|
||||
};
|
||||
};
|
|
@ -11,7 +11,7 @@
|
|||
email = {
|
||||
smtp_server = "mx.${config.domains.p1}:587";
|
||||
smtp_login = "noreply@${config.domains.p1}";
|
||||
smtp_from_address = "Jimbo's Lemmy <noreply@${config.domains.p1}>";
|
||||
smtp_from_address = "NixFox Lemmy <noreply@${config.domains.p1}>";
|
||||
smtp_password = config.secrets.noreplyPassword;
|
||||
tls_type = "starttls";
|
||||
};
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, ... }:
|
||||
{
|
||||
services.nginx.virtualHosts."torrent.${config.domains.p1}" = lib.mkIf config.services.transmission.enable {
|
||||
services.nginx.virtualHosts."tor.${config.domains.p2}" = lib.mkIf config.services.transmission.enable {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
locations."/" = {
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
services.vaultwarden = {
|
||||
enable = config.system.server.enable;
|
||||
config = {
|
||||
DOMAIN = "https://warden.${config.domains.p1}";
|
||||
DOMAIN = "https://pass.${config.domains.p2}";
|
||||
SIGNUPS_ALLOWED = false;
|
||||
ROCKET_ADDRESS = "127.0.0.1";
|
||||
ROCKET_PORT = 8222;
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
{ config, lib, ... }:
|
||||
{
|
||||
services.nginx.virtualHosts."warden.${config.domains.p1}" = lib.mkIf config.services.vaultwarden.enable {
|
||||
services.nginx.virtualHosts."pass.${config.domains.p1}" = lib.mkIf config.services.vaultwarden.enable {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
locations."/" = {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue