2023-09-27 23:24:23 +02:00
|
|
|
{ config, lib, pkgs, ... }:
|
2021-03-17 22:35:51 +01:00
|
|
|
|
2020-11-27 20:56:20 +00:00
|
|
|
{
|
|
|
|
services.murmur = {
|
2020-12-27 10:17:38 +00:00
|
|
|
enable = true;
|
2020-11-27 20:56:20 +00:00
|
|
|
logDays = -1;
|
2023-12-16 18:49:29 +01:00
|
|
|
registerName = "hackers against climate change";
|
|
|
|
welcometext = ''
|
2023-12-16 20:41:26 +01:00
|
|
|
<br>Welcome to <b>mumble4future</b>!<br>Brought to you by <b style="color:red">infra4future</b>.<br>On <a href=https://mumble.hacc.space>mumble.hacc.space</a><br>Not confusing at all!
|
2023-12-16 18:49:29 +01:00
|
|
|
'';
|
2020-11-27 20:56:20 +00:00
|
|
|
sslKey = "/var/lib/acme/mumble.hacc.space/key.pem";
|
|
|
|
sslCert = "/var/lib/acme/mumble.hacc.space/fullchain.pem";
|
2020-12-21 23:31:00 +01:00
|
|
|
bandwidth = 128000;
|
2020-11-27 20:56:20 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
networking.firewall.allowedTCPPorts = [ config.services.murmur.port ];
|
|
|
|
networking.firewall.allowedUDPPorts = [ config.services.murmur.port ];
|
|
|
|
|
2022-01-18 09:08:27 +01:00
|
|
|
# the mumble cert has its own group so that both nginx and murmur can read it
|
2022-11-03 21:22:31 +01:00
|
|
|
users.groups.mumblecert = { };
|
|
|
|
security.acme.certs."mumble.hacc.space" = {
|
|
|
|
group = "mumblecert";
|
|
|
|
extraDomainNames = [ "mumble.infra4future.de" ];
|
|
|
|
reloadServices = [ "murmur" ];
|
|
|
|
};
|
2022-01-18 09:08:27 +01:00
|
|
|
users.users.nginx.extraGroups = [ "mumblecert" ];
|
|
|
|
users.users.murmur.extraGroups = [ "mumblecert" ];
|
2024-01-31 23:30:06 +01:00
|
|
|
|
|
|
|
hacc.bindToPersist = [ "/var/lib/murmur" ];
|
2020-11-27 20:56:20 +00:00
|
|
|
}
|