Compare commits

...

16 commits

Author SHA1 Message Date
Vinzenz Schroeter
ff881fc8e6 remove powerlevel10k module 2026-01-08 21:51:06 +01:00
Vinzenz Schroeter
9bc49f89c7 undo 2026-01-05 22:58:23 +01:00
Vinzenz Schroeter
3099056e2a fix acme host 2026-01-05 17:47:11 +01:00
Vinzenz Schroeter
f3bce53ed1 fix derp 2026-01-04 22:15:33 +01:00
Vinzenz Schroeter
8bf2175e92 fix derp 2026-01-04 22:08:28 +01:00
Vinzenz Schroeter
f44b7389c3 fix DERP 2026-01-04 22:01:44 +01:00
Vinzenz Schroeter
64921ebffb headscale: enable DERP 2026-01-04 21:59:05 +01:00
Vinzenz Schroeter
2ed92f63e1 fix force ssl 2026-01-04 21:00:11 +01:00
Vinzenz Schroeter
fc83537238 proxy websockets 2026-01-04 20:57:27 +01:00
Vinzenz Schroeter
594e6118eb force ssl 2026-01-04 20:54:55 +01:00
Vinzenz Schroeter
cadddd9da6 fix url 2026-01-04 20:51:42 +01:00
Vinzenz Schroeter
21c988c386 disable override local 2026-01-04 20:48:08 +01:00
Vinzenz Schroeter
17426908ea fix toString 2026-01-04 20:24:40 +01:00
Vinzenz Schroeter
7bb2c482a4 fix int to str 2026-01-04 20:19:30 +01:00
Vinzenz Schroeter
87bb177072 vpn2: split nginx config 2026-01-04 20:17:22 +01:00
Vinzenz Schroeter
555c98b627 add headscale 2026-01-04 20:16:56 +01:00
6 changed files with 117 additions and 96 deletions

View file

@ -1,23 +0,0 @@
{
config,
lib,
pkgs,
...
}:
{
options.programs.zsh-powerlevel10k = {
enable = lib.mkEnableOption "powerlevel10k zsh theme";
package = lib.mkPackageOption pkgs "zsh-powerlevel10k" { nullable = true; };
};
config =
let
cfg = config.programs.zsh-powerlevel10k;
p10k = if (cfg.package != null) then cfg.package else pkgs.zsh-powerlevel10k;
in
lib.mkIf cfg.enable {
programs.zsh.initContent = ''
source ${p10k}/share/zsh-powerlevel10k/powerlevel10k.zsh-theme
'';
};
}

View file

@ -0,0 +1,43 @@
{ pkgs, ... }:
let
blog-domain-socket = "/run/nginx/blog.sock";
anubis-domain-socket = "/run/anubis/anubis-main/anubis.sock";
anubis-metrics-socket = "/run/anubis/anubis-main/anubis-metrics.sock";
in
{
systemd.services = {
nginx.serviceConfig.SupplementaryGroups = [ "anubis" ];
anubis-main.serviceConfig.SupplementaryGroups = [ "nginx" ];
};
services = {
nginx.virtualHosts = {
"zerforschen.plus" = {
enableACME = true;
forceSSL = true;
locations = {
"/_metrics".proxyPass = "http://unix:" + anubis-metrics-socket + ":/metrics";
"/".proxyPass = "http://unix:" + anubis-domain-socket;
};
};
"blog-in-anubis" = {
root = pkgs.zerforschen-plus-content;
listen = [
{
addr = "unix:" + blog-domain-socket;
}
];
};
};
anubis.instances.main = {
enable = true;
settings = {
BIND = anubis-domain-socket;
TARGET = "unix://" + blog-domain-socket;
METRICS_BIND = anubis-metrics-socket;
};
};
};
}

View file

@ -2,6 +2,8 @@
imports = [ imports = [
./hardware.nix ./hardware.nix
./nginx.nix ./nginx.nix
./headscale.nix
./blog.nix
]; ];
config = { config = {

View file

@ -0,0 +1,43 @@
let
headscale-port = 8668;
in
{
# sudo tailscale up --reset --force-reauth --login-server https://uplink.darkest.space --operator=$USER
services = {
headscale = {
enable = true;
address = "localhost";
port = headscale-port;
settings = {
server_url = "https://uplink.darkest.space/";
dns = {
override_local_dns = false;
base_domain = "high-gravity.space";
};
derp = {
server = {
enabled = true;
verify_clients = true;
stun_listen_addr = "0.0.0.0:3478";
ipv4 = "78.46.242.90";
ipv6 = "2a01:4f8:c013:65dd::1";
};
urls = [ ];
};
};
};
nginx.virtualHosts."uplink.darkest.space" = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://localhost:${builtins.toString headscale-port}";
proxyWebsockets = true;
};
};
};
# for DERP
networking.firewall.allowedUDPPorts = [ 3478 ];
}

View file

@ -1,62 +1,19 @@
{ pkgs, ... }:
let
blog-domain-socket = "/run/nginx/blog.sock";
anubis-domain-socket = "/run/anubis/anubis-main/anubis.sock";
anubis-metrics-socket = "/run/anubis/anubis-main/anubis-metrics.sock";
in
{ {
security.acme = { security.acme = {
acceptTerms = true; acceptTerms = true;
defaults.email = "acme@zerforschen.plus"; defaults.email = "acme@zerforschen.plus";
}; };
systemd.services = { services.nginx = {
nginx.serviceConfig.SupplementaryGroups = [ "anubis" ];
anubis-main.serviceConfig.SupplementaryGroups = [ "nginx" ];
};
services = {
nginx = {
enable = true; enable = true;
recommendedProxySettings = true; recommendedProxySettings = true;
recommendedTlsSettings = true; recommendedTlsSettings = true;
recommendedGzipSettings = true; recommendedGzipSettings = true;
recommendedOptimisation = true; recommendedOptimisation = true;
virtualHosts = {
"zerforschen.plus" = {
addSSL = true;
enableACME = true;
locations = {
"/_metrics".proxyPass = "http://unix:" + anubis-metrics-socket + ":/metrics";
"/".proxyPass = "http://unix:" + anubis-domain-socket;
};
};
"blog-in-anubis" = {
root = pkgs.zerforschen-plus-content;
listen = [
{
addr = "unix:" + blog-domain-socket;
}
];
};
};
};
anubis.instances.main = {
enable = true;
settings = {
BIND = anubis-domain-socket;
TARGET = "unix://" + blog-domain-socket;
METRICS_BIND = anubis-metrics-socket;
};
};
}; };
networking.firewall.allowedTCPPorts = [ networking.firewall.allowedTCPPorts = [
80 80
443 443
5201
]; ];
} }

View file

@ -11,30 +11,6 @@
}: }:
{ {
imports = [ imports = [
{
home-manager = {
extraSpecialArgs = specialArgs;
useGlobalPkgs = true;
useUserPackages = true;
};
time.timeZone = "Europe/Berlin";
home-manager.sharedModules = [
{ home.stateVersion = "22.11"; }
# keep-sorted start
self.homeModules.git
self.homeModules.gnome-extensions
self.homeModules.nano
self.homeModules.templates
self.homeModules.zsh-basics
self.homeModules.zsh-powerlevel10k
# keep-sorted end
];
home-manager.users = home-manager-users;
}
# keep-sorted start # keep-sorted start
home-manager.nixosModules.home-manager home-manager.nixosModules.home-manager
self.nixosModules.en-de self.nixosModules.en-de
@ -54,4 +30,27 @@
stylix.nixosModules.stylix stylix.nixosModules.stylix
# keep-sorted end # keep-sorted end
]; ];
config = {
home-manager = {
extraSpecialArgs = specialArgs;
useGlobalPkgs = true;
useUserPackages = true;
};
time.timeZone = "Europe/Berlin";
home-manager.sharedModules = [
{ home.stateVersion = "22.11"; }
# keep-sorted start
self.homeModules.git
self.homeModules.gnome-extensions
self.homeModules.nano
self.homeModules.templates
self.homeModules.zsh-basics
# keep-sorted end
];
home-manager.users = home-manager-users;
};
} }