depot/ops/nixos/bvm-prosody/default.nix

105 lines
3 KiB
Nix
Raw Normal View History

# SPDX-FileCopyrightText: 2020 Luke Granger-Brown <depot@lukegb.com>
#
# SPDX-License-Identifier: Apache-2.0
2021-04-02 00:52:45 +00:00
{ config, depot, pkgs, ... }:
2021-03-28 22:46:55 +00:00
let
inherit (depot.ops) secrets;
machineSecrets = secrets.machineSpecific.bvm-prosody;
in {
imports = [
../lib/bvm.nix
];
# Networking!
networking = {
hostName = "bvm-prosody";
hostId = "5c62ee63";
interfaces.enp1s0 = {
ipv4.addresses = [{ address = "10.100.0.202"; prefixLength = 23; }];
};
2021-04-01 15:50:27 +00:00
interfaces.enp6s0 = {
ipv4.addresses = [{ address = "92.118.28.3"; prefixLength = 24; }];
ipv6.addresses = [{ address = "2a09:a441::3"; prefixLength = 32; }];
};
2021-04-01 15:55:54 +00:00
defaultGateway = { address = "92.118.28.1"; interface = "enp6s0"; };
defaultGateway6 = { address = "2a09:a441::1"; interface = "enp6s0"; };
2021-04-02 00:52:45 +00:00
firewall.allowedUDPPorts = [ 3478 ];
firewall.allowedTCPPorts = [ 80 443 3478 5280 5281 5222 5223 5269 5298 ];
};
2021-03-28 14:33:54 +00:00
my.ip.tailscale = "100.86.22.44";
2021-03-28 22:46:55 +00:00
services.coturn = {
enable = true;
use-auth-secret = true;
realm = "turn.lukegb.com";
static-auth-secret = machineSecrets.turnSecret;
2021-04-02 00:52:45 +00:00
cert = "${config.security.acme.certs."turn.lukegb.com".directory}/fullchain.pem";
pkey = "${config.security.acme.certs."turn.lukegb.com".directory}/key.pem";
};
services.prosody = {
enable = true;
admins = [ "admin@lukegb.com" "lukegb@lukegb.com" ];
package = pkgs.prosody.override {
withCommunityModules = [ "external_services" ];
};
virtualHosts."lukegb.com" = {
enabled = true;
domain = "lukegb.com";
ssl.cert = "${config.security.acme.certs."xmpp.lukegb.com".directory}/fullchain.pem";
ssl.key = "${config.security.acme.certs."xmpp.lukegb.com".directory}/key.pem";
};
muc = [{
domain = "muc.xmpp.lukegb.com";
}];
uploadHttp.domain = "upload.xmpp.lukegb.com";
extraConfig = ''
proxy65_address = "xmpp.lukegb.com"
proxy65_acl = { "lukegb.com" }
component_ports = { 5347 }
component_interface = { "127.0.0.1", "::1" }
legacy_ssl_ports = { 5223 }
external_services = {
{
type = "stun",
transport = "udp",
host = "turn.lukegb.com",
port = 3478,
}, {
type = "turn",
transport = "udp",
host = "turn.lukegb.com",
port = 3478,
secret = "${machineSecrets.turnSecret}",
}
}
'';
};
security.acme = {
acceptTerms = true;
email = "letsencrypt@lukegb.com";
certs."xmpp.lukegb.com" = {
group = "prosody";
dnsProvider = "cloudflare";
credentialsFile = secrets.cloudflareCredentials;
extraDomainNames = [ "*.xmpp.lukegb.com" "lukegb.com" ];
};
certs."turn.lukegb.com" = {
group = "turnserver";
dnsProvider = "cloudflare";
credentialsFile = secrets.cloudflareCredentials;
};
2021-03-28 22:46:55 +00:00
};
system.stateVersion = "21.05";
}