{ config, lib, pkgs, ... }: { hexchen.bindmounts."/var/lib/murmur" = "/persist/var/lib/murmur"; services.murmur = { enable = true; logDays = -1; registerName = "hackers against climate change"; welcometext = ''
Welcome to mumble4future!
Brought to you by infra4future.
On mumble.hacc.space
Not confusing at all! ''; sslKey = "/var/lib/acme/mumble.hacc.space/key.pem"; sslCert = "/var/lib/acme/mumble.hacc.space/fullchain.pem"; bandwidth = 128000; }; networking.firewall.allowedTCPPorts = [ config.services.murmur.port ]; networking.firewall.allowedUDPPorts = [ config.services.murmur.port ]; # the mumble cert has its own group so that both nginx and murmur can read it users.groups.mumblecert = { }; security.acme.certs."mumble.hacc.space" = { group = "mumblecert"; extraDomainNames = [ "mumble.infra4future.de" ]; reloadServices = [ "murmur" ]; }; users.users.nginx.extraGroups = [ "mumblecert" ]; users.users.murmur.extraGroups = [ "mumblecert" ]; }