feat(murmur): Add Mumble server
This commit is contained in:
@@ -50,6 +50,7 @@
|
|||||||
syncthing.enable = true;
|
syncthing.enable = true;
|
||||||
cache.enable = true;
|
cache.enable = true;
|
||||||
mullvad.enable = true;
|
mullvad.enable = true;
|
||||||
|
murmur.enable = true;
|
||||||
servarr = {
|
servarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
prowlarr.enable = true;
|
prowlarr.enable = true;
|
||||||
|
|||||||
35
modules/nixos/deertopia/murmur.nix
Normal file
35
modules/nixos/deertopia/murmur.nix
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
|
let cfg = config.sydnix.deertopia.murmur;
|
||||||
|
in {
|
||||||
|
options = {
|
||||||
|
sydnix.deertopia.murmur = {
|
||||||
|
enable = lib.mkEnableOption "Deertopia's Murmur, a Mumble server";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
|
||||||
|
sydnix.impermanence.directories = [
|
||||||
|
"/var/lib/private/umurmur"
|
||||||
|
];
|
||||||
|
|
||||||
|
# HACK: Allow uMurmur to use Nginx's certs.
|
||||||
|
systemd.services.umurmur.serviceConfig.SupplementaryGroups = [ "nginx" ];
|
||||||
|
|
||||||
|
services.umurmur = {
|
||||||
|
enable = true;
|
||||||
|
openFirewall = true;
|
||||||
|
|
||||||
|
settings = {
|
||||||
|
password = "onlydeer";
|
||||||
|
bindport = 64738; # Use default Murmur port, not uMurmur's.
|
||||||
|
welcometext = "🦌";
|
||||||
|
|
||||||
|
# Use files generated by Nix's Nginx module.
|
||||||
|
certificate = "/var/lib/acme/deertopia.net/fullchain.pem";
|
||||||
|
private_key = "/var/lib/acme/deertopia.net/key.pem";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -69,6 +69,14 @@ in {
|
|||||||
name = cfg.persistGroupName;
|
name = cfg.persistGroupName;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
systemd.tmpfiles.settings."10-varlibprivate" = {
|
||||||
|
"/var/lib/private" = {
|
||||||
|
z.group = "root";
|
||||||
|
z.user = "root";
|
||||||
|
z.mode = "2700";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
# Permit members of `cfg.persistGroupName` to read, write, and execute
|
# Permit members of `cfg.persistGroupName` to read, write, and execute
|
||||||
# /persist.
|
# /persist.
|
||||||
systemd.tmpfiles.settings."10-persist" = {
|
systemd.tmpfiles.settings."10-persist" = {
|
||||||
|
|||||||
Reference in New Issue
Block a user