haccfiles/services/murmur.nix

31 lines
1.1 KiB
Nix
Raw Normal View History

{ config, lib, pkgs, ... }:
2020-11-27 20:56:20 +00:00
{
2021-08-07 13:14:15 +00:00
hexchen.bindmounts."/var/lib/murmur" = "/persist/var/lib/murmur";
2020-11-27 20:56:20 +00:00
services.murmur = {
2020-12-27 10:17:38 +00:00
enable = true;
2020-11-27 20:56:20 +00:00
logDays = -1;
2023-12-16 17:49:29 +00:00
registerName = "hackers against climate change";
welcometext = ''
2023-12-16 19:41:26 +00:00
<br>Welcome to <b>mumble4future</b>!<br>Brought to you by <b style="color:red">infra4future</b>.<br>On <a href=https://mumble.hacc.space>mumble.hacc.space</a><br>Not confusing at all!
2023-12-16 17:49:29 +00:00
'';
2020-11-27 20:56:20 +00:00
sslKey = "/var/lib/acme/mumble.hacc.space/key.pem";
sslCert = "/var/lib/acme/mumble.hacc.space/fullchain.pem";
bandwidth = 128000;
2020-11-27 20:56:20 +00:00
};
networking.firewall.allowedTCPPorts = [ config.services.murmur.port ];
networking.firewall.allowedUDPPorts = [ config.services.murmur.port ];
# the mumble cert has its own group so that both nginx and murmur can read it
users.groups.mumblecert = { };
security.acme.certs."mumble.hacc.space" = {
group = "mumblecert";
extraDomainNames = [ "mumble.infra4future.de" ];
reloadServices = [ "murmur" ];
};
users.users.nginx.extraGroups = [ "mumblecert" ];
users.users.murmur.extraGroups = [ "mumblecert" ];
2020-11-27 20:56:20 +00:00
}