1
0
Fork 0
forked from emily/nixfiles

first commit uwu

This commit is contained in:
emily 2023-11-28 08:19:49 +01:00
commit 4dca4b43b5
Signed by untrusted user: emily
GPG key ID: F6F4C66207FCF995
5 changed files with 192 additions and 0 deletions

0
README.md Normal file
View file

33
config/networking.nix Normal file
View file

@ -0,0 +1,33 @@
{ config, ... }: {
networking = {
hostName = "web02";
domain = "kyouma.net";
useHostResolvConf = false;
dhcpcd.enable = false;
firewall.allowedTCPPorts = [ 80 443 ];
firewall.allowedUDPPorts = [ 80 443 ];
};
systemd.network.enable = true;
services.resolved = {
enable = true;
dnssec = "true";
extraConfig = ''
DNS = [2a0f:be01::1]
'';
};
systemd.network.networks."98-eth0" = {
matchConfig.Name = "eth0";
networkConfig = {
DHCP = "ipv4";
IPv6AcceptRA = false;
};
address = [
"2a0f:be01:0:100::1312/128"
];
routes = [
{ routeConfig.Gateway = "fe80::1"; }
];
};
}

71
config/nginx.nix Normal file
View file

@ -0,0 +1,71 @@
{ pkgs, lib, ... }:
let
extraConfig = ''
add_header Strict-Transport-Security $hsts_header;
#add_header Content-Security-Policy "script-src 'self'; object-src 'none'; base-uri 'none';" always;
add_header X-Content-Type-Options "nosniff" always;
add_header X-XSS-Protection "1; mode=block" always;
add_header X-Frame-Options "SAMEORIGIN" always;
add_header Referrer-Policy "same-origin" always;
'';
virtHostCfg = {
forceSSL = true;
http3 = true;
quic = true;
};
mkRedirect = domain: virtHostCfg // {
useACMEHost = domain;
globalRedirect = domain;
inherit extraConfig;
};
mkHost = webroot: virtHostCfg // {
enableACME = true;
root = webroot;
inherit extraConfig;
};
in {
services.nginx = {
package = pkgs.nginxQuic;
enable = true;
recommendedOptimisation = true;
recommendedTlsSettings = true;
recommendedGzipSettings = true;
sslCiphers = "AES256+EECDH:AES256+EDH:!aNULL";
sslProtocols = "TLSv1.3";
clientMaxBodySize = "0";
appendHttpConfig = ''
map $scheme $hsts_header {
https "max-age=31536000; includeSubdomains; preload";
}
${extraConfig}
'';
virtualHosts."redirect" = virtHostCfg // {
serverName = null;
default = true;
reuseport = true;
useACMEHost = "miau.zip";
extraConfig = ''
return 403;
${extraConfig}
'';
};
virtualHosts = {
"miau.zip" = (mkHost "/var/www/kyouma.net");
"www.miau.zip" = (mkRedirect "miau.zip");
};
};
security.acme = {
acceptTerms = true;
defaults = {
keyType = "ec384";
email = "noc@kyouma.net";
};
certs."miau.zip" = {
extraDomainNames = [ "www.miau.zip" "lg.miau.zip" ];
};
};
}

57
config/openssh.nix Normal file
View file

@ -0,0 +1,57 @@
{ lib, ...}:
with lib;
let
ciphers = [
"chacha20-poly1305@openssh.com"
"aes256-gcm@openssh.com"
"aes128-gcm@openssh.com"
];
sigAlgorithms = [
"ssh-ed25519-cert-v01@openssh.com"
"ssh-ed25519"
];
kexAlgorithms = [
"sntrup761x25519-sha512@openssh.com"
"curve25519-sha256"
"curve25519-sha256@libssh.org"
];
macs = [
"umac-128-etm@openssh.com"
"hmac-sha2-512-etm@openssh.com"
"hmac-sha2-256-etm@openssh.com"
];
in {
programs.ssh = {
inherit ciphers kexAlgorithms macs;
hostKeyAlgorithms = sigAlgorithms;
pubkeyAcceptedKeyTypes = sigAlgorithms;
};
services.openssh = {
hostKeys = mkDefault [
{ type = "ed25519"; path = "/etc/keys/ssh_host_ed25519_key"; }
];
settings = {
PermitRootLogin = "prohibit-password";
PasswordAuthentication = false;
KbdInteractiveAuthentication = false;
AuthenticationMethods = "publickey";
Ciphers = ciphers;
Macs = macs;
KexAlgorithms = kexAlgorithms;
HostKeyAlgorithms = concatStringsSep "," sigAlgorithms;
PubkeyAcceptedAlgorithms = concatStringsSep "," sigAlgorithms;
# Remove stale Unix sockets when forwarding
StreamLocalBindUnlink = true;
};
};
}

31
configuration.nix Normal file
View file

@ -0,0 +1,31 @@
{ config, pkgs, lib, modulesPath, ... }:
with lib; {
imports = [
(modulesPath + "/virtualisation/proxmox-lxc.nix")
./config/networking.nix
./config/nginx.nix
./config/openssh.nix
];
proxmoxLXC = {
manageNetwork = true;
manageHostName = true;
};
environment.systemPackages = with pkgs; [
vim
];
users.users.root.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA/+iN407+HsfHbbC3tfdA8Yf4TZ08qXQMb4tb/SDAs+ emily@card"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCQN+h27GP95p6+1wH8E5Tq5h1Ua/PUW4Xd8JPAo0Wy root@web01"
];
time.timeZone = mkDefault "CET";
system.autoUpgrade.enable = true;
system.stateVersion = "23.05";
nix.optimise.automatic = true;
nix.gc.automatic = true;
nix.gc.options = "--delete-older-than 2d";
}