about summary refs log tree commit diff
path: root/configuration.nix
blob: 9e00c0a83dcf3ebf0d46686a5dce65e058605458 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
{ config, lib, pkgs, ... }:
let
  certs = config.security.acme.certs.${domain};
  domain = config.networking.domain;
  bindUserDirs = sources: target: lib.mapAttrs' (user: dir: {
    name = target + user;
    value = {
      device = "${config.users.users.${user}.home}/${dir}";
      options = [ "bind" ];
    };
  }) sources;
in {
  environment = {
    enableAllTerminfo = true;
    systemPackages = with pkgs; [ git rsync vim ];
  };

  fileSystems = bindUserDirs {
    cnx = "www";
  } "${config.services.nginx.virtualHosts.${domain}.root}/~";

  imports = [
    ./ipfs.nix
    ./matrix.nix
    ./vpsadminos.nix
  ];

  networking = {
    domain = "loang.net";

    firewall = {
      allowedTCPPorts = [
        80 # HTTP
        443 # TLS
        1965 # Gemini
        2211 # SSH
        4001 # IPFS
      ];
      allowedUDPPorts = [
        4001 # IPFS
      ];
    };

    hostName = "brno";
  };

  security = {
    acme = {
      acceptTerms = true;
      defaults.email = "mcsinyx@disroot.org";
    };

    sudo = {
      enable = true;
      execWheelOnly = true;
      wheelNeedsPassword = false;
    };
  };

  services = {
    molly-brown = {
      certPath = "${certs.directory}/cert.pem";
      docBase = "/var/lib/gemini/${domain}";
      enable = true;
      hostName = domain;
      keyPath = "${certs.directory}/key.pem";
    };

    nginx = {
      enable = true;
      recommendedProxySettings = true;
      virtualHosts.${domain} = {
        enableACME = true;
        forceSSL = true;
        root = "/var/lib/www/${domain}";
      };
    };

    openssh = {
      enable = true;
      passwordAuthentication = false;
      ports = [ 2211 ];
    };
  };

  system.stateVersion = "22.05";

  systemd = {
    extraConfig = ''
      DefaultTimeoutStartSec=900s
    '';
    services.molly-brown.serviceConfig.SupplementaryGroups = [ certs.group ];
  };

  time.timeZone = "UTC";

  users.users = {
    ckie = {
      isNormalUser = true;
      openssh.authorizedKeys.keyFiles = [ "/etc/ssh/ckie.pub" ];
    };

    cnx = {
      extraGroups = [ "wheel" ];
      isNormalUser = true;
      openssh.authorizedKeys.keyFiles = [ "/etc/ssh/cnx.pub" ];
      packages = with pkgs; [ stow ];
    };

    owocean = {
      isNormalUser = true;
      openssh.authorizedKeys.keyFiles = [ "/etc/ssh/owocean.pub" ];
    };

    xarvos = {
      isNormalUser = true;
      openssh.authorizedKeys.keyFiles = [ "/etc/ssh/xarvos.pub" ];
    };
  };
}