remove dante&btcpayserver, update site, add btc&xmr&ipfs nodes

This commit is contained in:
root 2025-11-05 21:33:22 +00:00
parent 1d4b154bcd
commit 390b68502e
13 changed files with 74 additions and 199 deletions

View file

@ -1,9 +1,4 @@
{
config,
lib,
pkgs,
...
}: let
{pkgs, ...}: let
fediPort = 8083;
onionUrl = "http://n5j5sq55iem2hzbgvkba5vwd5gx5qj2pkb7nxyginbtmnkah74rtulad.onion";
inherit ((pkgs.formats.elixirConf {}).lib) mkAtom;

View file

@ -1,3 +0,0 @@
{
nix-bitcoin.generateSecrets = true;
}

View file

@ -1,18 +0,0 @@
let
btcpayPort = 8086;
onionUrl = "http://yon54asykwaovefzstakipoigbflmfrsw243ezumd7sj4cwtsnjnlyad.onion";
in {
services = {
btcpayserver = {
enable = true;
port = btcpayPort;
lightningBackend = "lnd";
};
caddy.virtualHosts."https://pay.distrust.network ${onionUrl}".extraConfig = ''
reverse_proxy localhost:${toString btcpayPort}
'';
tor.relay.onionServices."btcpayserver".map = [
80
];
};
}

17
services/crypto.nix Normal file
View file

@ -0,0 +1,17 @@
{
services = {
bitcoind."default" = {
enable = true;
prune = 100000;
};
monero = {
enable = true;
prune = true;
};
kubo.enable = true;
};
networking.firewall.allowedTCPPorts = [8333 18080 4001];
}

View file

@ -1,14 +0,0 @@
{
services.dante = {
enable = true;
config = ''
internal: 0.0.0.0 port=1080
external: eth0
clientmethod: none
socksmethod: none
'';
};
networking.firewall.allowedTCPPorts = [1080];
networking.firewall.allowedUDPPorts = [1080];
}

View file

@ -7,11 +7,8 @@
./akkoma.nix
./prosody.nix
./lldap.nix
# Dante not working right now, possibly misconfigured.
#./dante.nix
./paste.nix
./btcpayserver.nix
./btc.nix
./crypto.nix
./vaultwarden.nix
./mailserver.nix
];

View file

@ -1,24 +1,25 @@
let
onionUrl = "http://i3a47orggn2cebueja2jur66yjgyqd2y7kzthajar4ghuerbx2kzwqyd.onion";
in
{
services.lldap = {
enable = true;
settings = {
http_url = "https://login.distrust.network";
ldap_user_email = "root@distrust.network";
ldap_user_dn = "root";
ldap_base_dn = "dc=distrust,dc=network";
ldap_user_pass = "VERY_SECURE";
in {
services = {
lldap = {
enable = true;
settings = {
http_url = "https://login.distrust.network";
ldap_user_email = "root@distrust.network";
ldap_user_dn = "root";
ldap_base_dn = "dc=distrust,dc=network";
ldap_user_pass = "VERY_SECURE";
};
};
caddy.virtualHosts."https://login.distrust.network ${onionUrl}".extraConfig = ''
reverse_proxy localhost:17170
header Onion-Location ${onionUrl}
'';
tor.relay.onionServices."lldap".map = [
80
];
};
services.caddy.virtualHosts."https://login.distrust.network ${onionUrl}".extraConfig = ''
reverse_proxy localhost:17170
header Onion-Location ${onionUrl}
'';
services.tor.relay.onionServices."lldap".map = [
80
];
}

View file

@ -1,5 +1,6 @@
{config, ...}: {
mailserver = {
stateVersion = 3;
enable = true;
fqdn = "distrust.network";
domains = ["distrust.network"];

View file

@ -1,26 +1,27 @@
let
pastePort = 8087;
onionUrl = "http://s4h5nfnwwhzku55opxlqouobioibx4htwygnp2l4fkp256lur5s53rad.onion";
in
{
services.microbin = {
enable = true;
settings = {
MICROBIN_PORT = pastePort;
MICROBIN_ENABLE_BURN_AFTER = true;
MICROBIN_QR = true;
MICROBIN_NO_LISTING = true;
MICROBIN_HIGHLIGHTSYNTAX = true;
MICROBIN_PUBLIC_PATH = "https://paste.distrust.network/";
in {
services = {
microbin = {
enable = true;
settings = {
MICROBIN_PORT = pastePort;
MICROBIN_ENABLE_BURN_AFTER = true;
MICROBIN_QR = true;
MICROBIN_NO_LISTING = true;
MICROBIN_HIGHLIGHTSYNTAX = true;
MICROBIN_PUBLIC_PATH = "https://paste.distrust.network/";
};
};
caddy.virtualHosts."https://paste.distrust.network ${onionUrl}".extraConfig = ''
reverse_proxy localhost:${toString pastePort}
header Onion-Location ${onionUrl}
'';
tor.relay.onionServices."microbin".map = [
80
];
};
services.caddy.virtualHosts."https://paste.distrust.network ${onionUrl}".extraConfig = ''
reverse_proxy localhost:${toString pastePort}
header Onion-Location ${onionUrl}
'';
services.tor.relay.onionServices."microbin".map = [
80
];
}