2023-07-07 23:44:40 -05:00
|
|
|
{ lib, config, pkgs, ... }:
|
|
|
|
|
2024-02-25 20:29:31 -06:00
|
|
|
{
|
2023-07-07 23:44:40 -05:00
|
|
|
imports =
|
|
|
|
[
|
2024-01-18 04:28:32 -06:00
|
|
|
./hardware-configuration.nix
|
|
|
|
../../modules/bootstrap.nix
|
2024-01-20 11:00:03 -06:00
|
|
|
../../builds/gmail_mail_bridge.nix
|
2023-07-07 23:44:40 -05:00
|
|
|
];
|
|
|
|
|
2024-01-18 04:28:32 -06:00
|
|
|
networking.networkmanager.enable = true;
|
|
|
|
|
|
|
|
time.timeZone = "America/Chicago";
|
|
|
|
|
|
|
|
i18n.defaultLocale = "en_US.UTF-8";
|
|
|
|
console = {
|
|
|
|
font = "Lat2-Terminus16";
|
|
|
|
keyMap = "us";
|
|
|
|
};
|
|
|
|
|
|
|
|
environment.systemPackages = with pkgs; [
|
2024-01-21 12:55:01 -06:00
|
|
|
python3
|
2024-01-18 04:28:32 -06:00
|
|
|
curl
|
|
|
|
htop
|
|
|
|
git
|
|
|
|
tree
|
|
|
|
dig
|
|
|
|
htop
|
|
|
|
gnumake
|
2024-01-19 18:56:48 -06:00
|
|
|
neovim
|
2024-01-18 04:28:32 -06:00
|
|
|
];
|
|
|
|
|
2024-01-20 11:00:03 -06:00
|
|
|
services.gmail_mail_bridge.enable = true;
|
|
|
|
|
2024-01-18 04:28:32 -06:00
|
|
|
system.copySystemConfiguration = true;
|
|
|
|
system.stateVersion = "23.05"; # don't change this, lol
|
2023-07-08 16:22:38 -05:00
|
|
|
boot.loader.grub.enable = true;
|
|
|
|
boot.loader.grub.device = "/dev/vda";
|
2023-07-07 23:44:40 -05:00
|
|
|
|
2024-01-21 12:40:51 -06:00
|
|
|
services.sslh = {
|
|
|
|
enable = true;
|
|
|
|
settings.protocols = [
|
|
|
|
{
|
|
|
|
host = "localhost";
|
2024-02-25 20:29:31 -06:00
|
|
|
name = "ssh";
|
|
|
|
port = "55555";
|
|
|
|
service = "ssh";
|
2024-01-21 12:40:51 -06:00
|
|
|
}
|
|
|
|
{
|
|
|
|
host = "localhost";
|
2024-02-25 20:29:31 -06:00
|
|
|
name = "tls";
|
|
|
|
port = "442";
|
2024-01-21 12:40:51 -06:00
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2023-07-08 16:22:38 -05:00
|
|
|
networking.hostName = "netbox";
|
2023-07-07 23:44:40 -05:00
|
|
|
|
2024-01-02 15:20:19 -06:00
|
|
|
services.radicale = {
|
|
|
|
enable = true;
|
|
|
|
config = ''
|
|
|
|
[auth]
|
|
|
|
type = htpasswd
|
|
|
|
htpasswd_filename = radicale-passwd
|
|
|
|
htpasswd_encryption = plain
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2023-12-03 20:48:49 -06:00
|
|
|
services.rss2email = {
|
|
|
|
enable = true;
|
2023-12-03 21:46:37 -06:00
|
|
|
to = "ryan@beepboop.systems";
|
2023-12-03 20:48:49 -06:00
|
|
|
feeds = {
|
|
|
|
"eff" = {
|
|
|
|
url = "https://www.eff.org/rss/updates.xml";
|
|
|
|
};
|
2023-12-03 21:46:37 -06:00
|
|
|
"nixos" = {
|
|
|
|
url = "https://nixos.org/blog/announcements-rss.xml";
|
|
|
|
};
|
|
|
|
"drewdevault" = {
|
|
|
|
url = "https://drewdevault.com/blog/index.xml";
|
|
|
|
};
|
|
|
|
"nullprogram" = {
|
|
|
|
url = "https://nullprogram.com/feed/";
|
|
|
|
};
|
2023-12-03 20:48:49 -06:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2023-12-03 21:46:37 -06:00
|
|
|
services.fail2ban = {
|
|
|
|
enable = true;
|
|
|
|
ignoreIP = [
|
|
|
|
"192.168.1.0/24"
|
|
|
|
];
|
|
|
|
extraPackages = [pkgs.ipset];
|
|
|
|
banaction = "iptables-ipset-proto6-allports";
|
|
|
|
|
|
|
|
jails = {
|
|
|
|
"nginx-bruteforce" = ''
|
|
|
|
enabled = true
|
2024-02-25 20:29:31 -06:00
|
|
|
filter = nginx-bruteforce
|
|
|
|
logpath = /var/log/nginx/access.log
|
|
|
|
backend = auto
|
|
|
|
maxretry = 6
|
|
|
|
findtime = 600
|
2023-12-03 21:46:37 -06:00
|
|
|
'';
|
|
|
|
|
|
|
|
"postfix-bruteforce" = ''
|
|
|
|
enabled = true
|
2024-02-25 20:29:31 -06:00
|
|
|
filter = postfix-bruteforce
|
|
|
|
maxretry = 6
|
|
|
|
findtime = 600
|
2023-12-03 21:46:37 -06:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
environment.etc = {
|
|
|
|
"fail2ban/filter.d/nginx-bruteforce.conf".text = ''
|
|
|
|
[Definition]
|
|
|
|
failregex = ^<HOST>.*GET.*(matrix/server|\.php|admin|wp\-).* HTTP/\d.\d\" 404.*$
|
|
|
|
'';
|
|
|
|
|
|
|
|
"fail2ban/filter.d/postfix-bruteforce.conf".text = ''
|
|
|
|
[Definition]
|
|
|
|
failregex = warning: [\w\.\-]+\[<HOST>\]: SASL LOGIN authentication failed.*$
|
|
|
|
journalmatch = _SYSTEMD_UNIT=postfix.service
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2023-12-18 13:21:51 -06:00
|
|
|
users.users.ryan = {
|
2024-01-21 12:14:04 -06:00
|
|
|
openssh.authorizedKeys.keys = [
|
2024-01-24 23:42:18 -06:00
|
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKbhM3wj0oqjR3pUaZgpfX4Xo4dlzvBTbQ48zHyg7Pwx usr" # x230t
|
|
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGrpVDLQszFKoYbvYKRyVTTpehxR0BVU47SXkz39l2wK usr" # mainsail
|
2024-01-21 12:14:04 -06:00
|
|
|
];
|
2023-12-18 13:21:51 -06:00
|
|
|
isNormalUser = true;
|
|
|
|
extraGroups = [ "wheel" "docker" ];
|
|
|
|
};
|
|
|
|
|
2023-07-08 16:22:38 -05:00
|
|
|
services.openssh = {
|
|
|
|
enable = true;
|
|
|
|
ports = [55555];
|
|
|
|
};
|
|
|
|
|
2023-12-03 19:50:26 -06:00
|
|
|
services.endlessh.enable = true;
|
2023-12-03 20:02:19 -06:00
|
|
|
services.endlessh.port = 22;
|
2023-12-03 19:50:26 -06:00
|
|
|
services.vaultwarden.enable = true;
|
|
|
|
services.vaultwarden.config = {
|
2024-01-18 04:32:42 -06:00
|
|
|
DOMAIN = "https://bitwarden.beepboop.systems";
|
|
|
|
SIGNUPS_ALLOWED = false;
|
2023-12-03 19:50:26 -06:00
|
|
|
};
|
|
|
|
|
2023-07-08 16:22:38 -05:00
|
|
|
networking.usePredictableInterfaceNames = false;
|
2023-07-07 23:44:40 -05:00
|
|
|
|
2023-07-08 16:22:38 -05:00
|
|
|
services.gitea = {
|
|
|
|
enable = true;
|
|
|
|
appName = "crappy code"; # Give the site a name
|
|
|
|
database = {
|
|
|
|
type = "postgres";
|
|
|
|
passwordFile = "/etc/gittea-pass";
|
|
|
|
};
|
|
|
|
settings.server = {
|
|
|
|
DOMAIN = "git.beepboop.systems";
|
|
|
|
ROOT_URL = "https://git.beepboop.systems/";
|
|
|
|
HTTP_PORT = 3001;
|
2023-07-07 23:44:40 -05:00
|
|
|
};
|
2023-07-08 16:22:38 -05:00
|
|
|
};
|
2023-07-07 23:44:40 -05:00
|
|
|
|
2023-07-08 16:22:38 -05:00
|
|
|
services.postgresql = {
|
|
|
|
enable = true; # Ensure postgresql is enabled
|
|
|
|
authentication = ''
|
|
|
|
local gitea all ident map=gitea-users
|
|
|
|
'';
|
|
|
|
identMap = # Map the gitea user to postgresql
|
|
|
|
''
|
|
|
|
gitea-users gitea gitea
|
2023-07-07 23:44:40 -05:00
|
|
|
'';
|
2023-07-08 16:22:38 -05:00
|
|
|
};
|
2023-07-07 23:44:40 -05:00
|
|
|
|
2023-07-08 16:22:38 -05:00
|
|
|
services.nginx.enable = true;
|
|
|
|
services.nginx.clientMaxBodySize = "100m";
|
2024-01-21 12:40:51 -06:00
|
|
|
services.nginx.defaultSSLListenPort = 442;
|
2023-07-07 23:44:40 -05:00
|
|
|
|
2023-07-08 16:22:38 -05:00
|
|
|
services.nginx.virtualHosts."beepboop.systems" = {
|
|
|
|
forceSSL = true;
|
|
|
|
enableACME = true;
|
|
|
|
root = "/var/www/beepboop.systems";
|
2024-01-02 15:20:19 -06:00
|
|
|
};
|
|
|
|
|
2023-07-08 16:22:38 -05:00
|
|
|
services.nginx.virtualHosts."git.beepboop.systems" = {
|
|
|
|
forceSSL = true;
|
|
|
|
enableACME = true;
|
|
|
|
locations."/".proxyPass = "http://localhost:3001";
|
|
|
|
};
|
2023-07-07 23:44:40 -05:00
|
|
|
|
2023-12-18 16:52:42 -06:00
|
|
|
services.nginx.virtualHosts."bit.beepboop.systems" = {
|
|
|
|
forceSSL = true;
|
|
|
|
enableACME = true;
|
|
|
|
globalRedirect = "bitwarden.beepboop.systems";
|
|
|
|
};
|
|
|
|
|
2023-07-08 16:22:38 -05:00
|
|
|
services.nginx.virtualHosts."bitwarden.beepboop.systems" = {
|
|
|
|
forceSSL = true;
|
|
|
|
enableACME = true;
|
|
|
|
locations."/" = {
|
|
|
|
proxyPass = "http://127.0.0.1:8000";
|
2023-07-07 23:44:40 -05:00
|
|
|
};
|
2023-07-08 16:22:38 -05:00
|
|
|
};
|
2023-07-07 23:44:40 -05:00
|
|
|
|
2023-12-06 18:22:25 -06:00
|
|
|
services.nginx.virtualHosts."radicale.beepboop.systems" = {
|
|
|
|
forceSSL = true;
|
|
|
|
enableACME = true;
|
|
|
|
locations."/" = {
|
|
|
|
proxyPass = "http://127.0.0.1:5232";
|
|
|
|
extraConfig = ''
|
|
|
|
proxy_set_header X-Script-Name /;
|
|
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
|
|
proxy_pass_header Authorization;
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2023-12-18 16:52:42 -06:00
|
|
|
services.nginx.virtualHosts."calendar.beepboop.systems" = {
|
2023-07-15 23:10:22 -05:00
|
|
|
forceSSL = true;
|
|
|
|
enableACME = true;
|
2023-12-18 16:52:42 -06:00
|
|
|
globalRedirect = "radicale.beepboop.systems";
|
|
|
|
};
|
|
|
|
|
|
|
|
services.nginx.virtualHosts."cal.beepboop.systems" = {
|
|
|
|
forceSSL = true;
|
|
|
|
enableACME = true;
|
|
|
|
globalRedirect = "radicale.beepboop.systems";
|
2023-07-15 23:10:22 -05:00
|
|
|
};
|
|
|
|
|
2023-07-08 16:22:38 -05:00
|
|
|
services.nginx.virtualHosts."skillissue.agency" = {
|
|
|
|
forceSSL = true;
|
|
|
|
enableACME = true;
|
|
|
|
root = "/var/www/skillissue.agency";
|
|
|
|
};
|
2023-07-07 23:44:40 -05:00
|
|
|
|
2023-07-08 16:22:38 -05:00
|
|
|
security.acme = {
|
|
|
|
acceptTerms = true;
|
2023-12-03 19:50:26 -06:00
|
|
|
email = "nickforanick@protonmail.com";
|
2023-07-08 16:22:38 -05:00
|
|
|
};
|
2023-07-07 23:44:40 -05:00
|
|
|
|
2024-01-19 18:56:48 -06:00
|
|
|
services.roundcube = {
|
|
|
|
enable = true;
|
|
|
|
# this is the url of the vhost, not necessarily the same as the fqdn of
|
|
|
|
# the mailserver
|
|
|
|
hostName = "cube.beepboop.systems";
|
|
|
|
extraConfig = ''
|
|
|
|
# starttls needed for authentication, so the fqdn required to match
|
|
|
|
# the certificate
|
|
|
|
$config['smtp_server'] = "tls://${config.mailserver.fqdn}";
|
|
|
|
$config['smtp_user'] = "%u";
|
|
|
|
$config['smtp_pass'] = "%p";
|
|
|
|
'';
|
|
|
|
};
|
2023-07-07 23:44:40 -05:00
|
|
|
|
2023-12-18 16:52:42 -06:00
|
|
|
services.nginx.virtualHosts."roundcube.beepboop.systems" = {
|
|
|
|
forceSSL = true;
|
|
|
|
enableACME = true;
|
|
|
|
globalRedirect = "cube.beepboop.systems";
|
|
|
|
};
|
|
|
|
|
|
|
|
services.nginx.virtualHosts."mail.beepboop.systems" = {
|
|
|
|
forceSSL = true;
|
|
|
|
enableACME = true;
|
2024-01-20 11:00:03 -06:00
|
|
|
locations."/bridge-submit" = {
|
|
|
|
extraConfig = ''
|
|
|
|
proxy_pass http://localhost:8041;
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
locations."/" = {
|
|
|
|
extraConfig = ''
|
|
|
|
return 301 https://cube.beepboop.systems;
|
|
|
|
'';
|
|
|
|
};
|
2023-12-18 16:52:42 -06:00
|
|
|
};
|
|
|
|
|
2023-12-03 19:50:26 -06:00
|
|
|
networking.firewall = {
|
|
|
|
enable = true;
|
2024-01-21 12:40:51 -06:00
|
|
|
allowedTCPPorts = [ 80 443 ];
|
2023-12-03 19:50:26 -06:00
|
|
|
};
|
2023-07-07 23:44:40 -05:00
|
|
|
}
|