# Edit this configuration file to define what should be installed on # your system. Help is available in the configuration.nix(5) man page # and in the NixOS manual (accessible by running ‘nixos-help’). { config, pkgs, lib, ... }: let sslforward = proxyPass: { forceSSL = true; enableACME = true; locations."/" = { inherit proxyPass; proxyWebsockets = true; }; }; vpn = import ../vpn.nix; in { imports = [ ../physical/hetznercloud.nix ../roles/server.nix (builtins.fetchTarball { url = "https://gitlab.com/simple-nixos-mailserver/nixos-mailserver/-/archive/v2.2.1/nixos-mailserver-v2.2.1.tar.gz"; sha256 = "03d49v8qnid9g9rha0wg2z6vic06mhp0b049s3whccn1axvs2zzx"; }) ../modules/muflax-blog.nix ]; system.stateVersion = "19.03"; services.nginx.enable = true; services.yorick = { public = { enable = true; vhost = "pub.yori.cc"; }; website = { enable = true; vhost = "yorickvanpelt.nl"; }; git = { enable = true; vhost = "git.yori.cc"; }; muflax-church = { enable = true; vhost = "muflax.church"; }; }; mailserver = rec { enable = true; fqdn = "pennyworth.yori.cc"; domains = [ "yori.cc" "yorickvanpelt.nl" ]; loginAccounts = { "yorick@yori.cc" = { hashedPassword = (import ../secrets.nix).yorick_mailPassword; catchAll = domains; aliases = [ "@yori.cc" "@yorickvanpelt.nl" ]; }; }; certificateScheme = 3; enableImapSsl = true; }; services.muflax-blog = { enable = true; web-server = { port = 9001; }; hidden-service = { hostname = "muflax65ngodyewp.onion"; private_key = "/root/keys/http.muflax.key"; }; }; services.nginx.commonHttpConfig = '' access_log off; ''; services.nginx.virtualHosts = { "yori.cc" = { enableACME = true; forceSSL = true; globalRedirect = "yorickvanpelt.nl"; }; "grafana.yori.cc" = sslforward "http://${vpn.ips.frumar}:3000"; "ubiquiti.yori.cc" = sslforward "https://${vpn.ips.woodhouse}:8443"; "prometheus.yori.cc" = { # only over vpn listen = [ { addr = "10.209.0.1"; port = 80; } ]; locations."/".proxyPass = "http://10.209.0.3:9090"; }; "pub.yori.cc".locations."/muflax/".extraConfig = '' rewrite ^/muflax/(.*)$ https://alt.muflax.church/$1 permanent; ''; }; deployment.keyys = [ ]; networking.firewall.allowedUDPPorts = [ 31790 ]; # wg networking.wireguard.interfaces.wg-y.peers = lib.mkForce (lib.mapAttrsToList (machine: publicKey: { inherit publicKey; allowedIPs = [ "${vpn.ips.${machine}}/32" ]; }) vpn.keys); boot.kernel.sysctl."net.ipv4.ip_forward" = 1; environment.noXlibs = true; users.users.yorick.packages = with pkgs; [ python2 sshfs-fuse weechat ]; }