aboutsummaryrefslogtreecommitdiff
path: root/nixos/vpn/configuration.nix
blob: 24687c87b5e52217ff5ff27cd31240aedeba7b77 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
{ modulesPath, config, lib, pkgs, ... }: {
  imports = [
    (modulesPath + "/installer/scan/not-detected.nix")
    (modulesPath + "/profiles/qemu-guest.nix")
    ./disk-config.nix
    ../serverModules/nginx.nix
    ../serverModules/files.nix
    ../serverModules/gonic.nix
  ];

  boot.loader.grub = {
    efiSupport = true;
    efiInstallAsRemovable = true;
  };

  networking.firewall.allowedTCPPorts = [
    # http
    80
    443
    # xray
    57625
  ];

  networking.domain = "kcu.su";
  networking.hostName = "ltrr-vpn";
  networking = {
    interfaces.ens3 = {
      ipv4.addresses = [{
        address = "64.188.126.186";
        prefixLength = 32;
      }];
    };
    defaultGateway = {
      address = "100.64.0.1";
      interface = "ens3";
    };
  };

  networking.useDHCP = lib.mkDefault false;

  networking.nameservers = [ "8.8.8.8" "1.1.1.1" ];

  services.openssh = {
    enable = true;
    settings.PasswordAuthentication = false;
  };
  
  environment.systemPackages = map lib.lowPrio [
    pkgs.curl
    pkgs.gitMinimal
  ];

  users.users = {
    root = {
      openssh.authorizedKeys.keys = [
        "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDJ8UW1BXDGDmlaiARO3a9boTG8wknUyITMz0Z0OJpHx spleefer6@yandex.ru"
        "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPuQVHIGm2bfvhW16ZI/4hDK2X8W+ADbPLXwzKZIYXZL user@LAPTOP-72FMD6D0"
      ];
    };
  };


  nginx = {
    enable = true;
    acme.enable = true;
    
    domain = "kcu.su";
    subdomains = {
      "xray" = {
        proxyPass = "http://127.0.0.1:2053";

        extraConfig = "
          proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
          proxy_set_header X-Forwarded-Proto $scheme;
          proxy_set_header Host $host;
          proxy_set_header X-Real-IP $remote_addr;
          proxy_set_header Range $http_range;
          proxy_set_header If-Range $http_if_range; 
          proxy_redirect off;
        ";
        recommendedProxySettings = false;
      };
    };
  };

  virtualisation.oci-containers = {
    backend = "docker";
    containers.xui = {
      image = "ghcr.io/mhsanaei/3x-ui:latest";
      ports = ["127.0.0.1:2053:2053" "57625:57625"];
      volumes = [
        "/root/x-ui:/etc/x-ui"
      ];
    };
  };

  system.stateVersion = "24.05";
}