2020-11-27 20:56:20 +00:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
{
|
2021-02-21 11:45:45 +00:00
|
|
|
hexchen.dns.zones."hacc.space".subdomains."mumble".CNAME = [ "hainich.hacc.space" ];
|
2020-11-27 20:56:20 +00:00
|
|
|
services.murmur = {
|
2020-12-27 10:17:38 +00:00
|
|
|
enable = true;
|
2020-11-27 20:56:20 +00:00
|
|
|
logDays = -1;
|
2021-01-07 00:29:41 +00:00
|
|
|
welcometext = "Welcome to mumble4future! Brought to you by infra4future. The server is now reachable under mumble.hacc.space, please update your bookmarks.";
|
2020-11-27 20:56:20 +00:00
|
|
|
sslKey = "/var/lib/acme/mumble.hacc.space/key.pem";
|
|
|
|
sslCert = "/var/lib/acme/mumble.hacc.space/fullchain.pem";
|
2020-12-21 22:31:00 +00:00
|
|
|
bandwidth = 128000;
|
|
|
|
|
2020-11-27 20:56:20 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
networking.firewall.allowedTCPPorts = [ config.services.murmur.port ];
|
|
|
|
networking.firewall.allowedUDPPorts = [ config.services.murmur.port ];
|
|
|
|
|
2021-02-03 22:33:08 +00:00
|
|
|
services.nginx.virtualHosts = let
|
|
|
|
vhost = {
|
2021-01-07 00:29:41 +00:00
|
|
|
forceSSL = true;
|
|
|
|
enableACME = true;
|
|
|
|
locations."/" = {
|
2021-02-03 10:12:23 +00:00
|
|
|
proxyPass = "https://hacc.4future.dev/infra4future/mumble.infra4future.de/";
|
2021-01-07 00:29:41 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
in {
|
|
|
|
"mumble.infra4future.de" = vhost;
|
|
|
|
"mumble.hacc.space" = vhost;
|
2020-11-27 20:56:20 +00:00
|
|
|
};
|
2021-01-07 00:29:41 +00:00
|
|
|
|
2020-11-27 20:56:20 +00:00
|
|
|
# set ACLs so that the murmur user can read the certificates
|
|
|
|
security.acme.certs."mumble.hacc.space".postRun = "setfacl -Rm u:murmur:rX /var/lib/acme/mumble.hacc.space";
|
|
|
|
}
|