aboutsummaryrefslogtreecommitdiff
path: root/modules/hosts/ltrr-mask/configuration.nix
blob: 3656016f325d5655102cf304adee58adbe0d187d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
{
  inputs,
  self,
  ...
}: {
  flake.nixosConfigurations.ltrr-mask = inputs.nixpkgs-stable.lib.nixosSystem {
    modules = [
      self.nixosModules.ltrr-mask
    ];
  };

  flake.nixosModules.ltrr-mask = {
    modulesPath,
    config,
    lib,
    pkgs,
    ...
  }: let
    domain = "kcu.su";
  in {
    imports = [
      (modulesPath + "/installer/scan/not-detected.nix")
      (modulesPath + "/profiles/qemu-guest.nix")

      inputs.disko.nixosModules.disko
      self.diskoConfigurations.ltrr-mask

      self.nixosModules.nginxProxy
    ];
    nixpkgs.hostPlatform = "x86_64-linux";

    boot.loader.grub = {
      efiSupport = true;
      efiInstallAsRemovable = true;
    };

    networking.firewall.allowedTCPPorts = [
      # http
      # 80
      # 443

      # xray
      4876
      57625
      39701
      39482
    ];

    networking.domain = domain;
    networking.hostName = "ltrr-vpn";
    networking = {
      interfaces.ens3 = {
        ipv4.addresses = [
          {
            address = "64.188.126.186";
            prefixLength = 32;
          }
        ];
      };
      defaultGateway = {
        address = "100.64.0.1";
        interface = "ens3";
      };
    };

    networking.useDHCP = lib.mkDefault false;

    networking.nameservers = ["8.8.8.8" "1.1.1.1"];

    services.openssh = {
      enable = true;
      settings.PasswordAuthentication = false;
    };

    environment.systemPackages = map lib.lowPrio [
      pkgs.curl
      pkgs.gitMinimal
    ];

    users.users = {
      root = {
        openssh.authorizedKeys.keys = [
          "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDJ8UW1BXDGDmlaiARO3a9boTG8wknUyITMz0Z0OJpHx spleefer6@yandex.ru"
          "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPuQVHIGm2bfvhW16ZI/4hDK2X8W+ADbPLXwzKZIYXZL user@LAPTOP-72FMD6D0"
        ];
      };
    };

    nginxProxy = {
      enable = false;
      acme.enable = true;

      inherit domain;
      subdomains = {
        "xray" = {
          proxyPass = "http://127.0.0.1:2053";

          extraConfig = "
          proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
          proxy_set_header X-Forwarded-Proto $scheme;
          proxy_set_header Host $host;
          proxy_set_header X-Real-IP $remote_addr;
          proxy_set_header Range $http_range;
          proxy_set_header If-Range $http_if_range; 
          proxy_redirect off;
        ";
          recommendedProxySettings = false;
        };
      };
    };

    virtualisation.oci-containers = {
      backend = "docker";
      containers.xui = {
        image = "ghcr.io/mhsanaei/3x-ui:latest";
        ports = ["4876:2053" "57625:57625" "39701:39701"];
        volumes = [
          "/root/x-ui:/etc/x-ui"
        ];
      };
    };

    system.stateVersion = "24.05";
  };
}