stockholm/lass/2configs/murmur.nix

43 lines
1.1 KiB
Nix
Raw Normal View History

2021-09-10 07:22:08 +00:00
{ config, lib, pkgs, ... }:
{
services.murmur = {
enable = true;
2022-01-27 19:54:46 +00:00
allowHtml = false;
2021-09-10 07:22:08 +00:00
bandwidth = 10000000;
registerName = "lassul.us";
autobanTime = 30;
2022-01-27 19:54:46 +00:00
sslCert = "/var/lib/acme/lassul.us/cert.pem";
sslKey = "/var/lib/acme/lassul.us/key.pem";
2021-09-10 07:22:08 +00:00
};
2022-01-27 19:54:46 +00:00
users.groups.lasscert.members = [
"murmur"
];
2021-09-10 07:22:08 +00:00
krebs.iptables.tables.filter.INPUT.rules = [
{ predicate = "-p tcp --dport 64738"; target = "ACCEPT";}
{ predicate = "-p udp --dport 64738"; target = "ACCEPT";}
];
systemd.services.docker-mumble-web.serviceConfig = {
StandardOutput = lib.mkForce "journal";
StandardError = lib.mkForce "journal";
};
virtualisation.oci-containers.containers.mumble-web = {
image = "rankenstein/mumble-web:0.5";
2021-09-10 07:22:08 +00:00
environment = {
MUMBLE_SERVER = "lassul.us:64738";
};
ports = [
"64739:8080"
];
};
services.nginx.virtualHosts."mumble.lassul.us" = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://localhost:64739";
proxyWebsockets = true;
};
2021-09-10 07:22:08 +00:00
};
}