diff --git a/hosts/ruil/configuration.nix b/hosts/ruil/configuration.nix index d17ae86..504a3c2 100644 --- a/hosts/ruil/configuration.nix +++ b/hosts/ruil/configuration.nix @@ -1,4 +1,4 @@ -{ config, pkgs, modulesPath, openclaw-flake, ... }: +{ config, lib, pkgs, modulesPath, openclaw-flake, ... }: { imports = [ @@ -19,11 +19,25 @@ sops.secrets.hashedPassword-hunner.neededForUsers = true; sops.secrets.hashedPassword-ruil.neededForUsers = true; sops.secrets.hashedPassword-root.neededForUsers = true; + sops.secrets.searx-env = { + owner = "searx"; + mode = "0400"; + }; + sops.secrets.searx-nginx-basic-auth = { + owner = "nginx"; + mode = "0400"; + }; sops.secrets.openclaw-env = { owner = "ruil"; mode = "0400"; }; + # HTTPS certificates for `s.hunner.dev` (works with Cloudflare Full strict). + security.acme = { + acceptTerms = true; + defaults.email = "me@hunner.dev"; + }; + # SSH key from DO metadata, shared across all users users.users.root = { hashedPasswordFile = config.sops.secrets.hashedPassword-root.path; @@ -54,20 +68,17 @@ home-manager.useGlobalPkgs = true; home-manager.useUserPackages = true; - home-manager.users.ruil = { ... }: { + home-manager.users.ruil = { lib, ... }: { imports = [ openclaw-flake.homeManagerModules.openclaw ]; home.stateVersion = "25.11"; # Keep credentials in ruil-owned files to avoid root-only bot access. - programs.openclaw = { - enable = true; - config = { - gateway.mode = "local"; - channels.discord.enabled = true; - agents.defaults.model.primary = "zai/glm-4.7"; - }; - }; + programs.openclaw.enable = true; + + # Keep ~/.openclaw/openclaw.json user-managed (Home Manager should not touch it). + home.file.".openclaw/openclaw.json".enable = lib.mkForce false; + home.activation.openclawConfigFiles = lib.mkForce (lib.hm.dag.entryAfter [ "openclawDirs" ] ""); # openclaw onboarding can exceed Node's default old-space limit on 1 GiB hosts. home.sessionVariables.NODE_OPTIONS = "--max-old-space-size=1536"; @@ -106,6 +117,69 @@ ]; }; + # SearXNG + services.searx = { + enable = true; + configureNginx = true; + redisCreateLocally = true; + domain = "s.hunner.dev"; + environmentFile = config.sops.secrets.searx-env.path; + settings.server.secret_key = "$SEARX_SECRET_KEY"; + settings.server.limiter = true; + settings.server.base_url = lib.mkForce "https://s.hunner.dev/"; + settings.general.open_metrics = "$SEARX_METRICS_PASSWORD"; + }; + + services.nginx.virtualHosts."s.hunner.dev" = { + enableACME = true; + forceSSL = true; + + # Protect metrics with nginx Basic Auth and forward the auth header so + # SearXNG can validate `general.open_metrics`. + locations."= /metrics" = { + basicAuthFile = config.sops.secrets.searx-nginx-basic-auth.path; + recommendedUwsgiSettings = true; + uwsgiPass = "unix:${config.services.uwsgi.instance.vassals.searx.socket}"; + extraConfig = '' + uwsgi_param HTTP_AUTHORIZATION $http_authorization; + uwsgi_param HTTP_HOST $host; + uwsgi_param HTTP_CONNECTION $http_connection; + uwsgi_param HTTP_X_SCHEME $scheme; + uwsgi_param HTTP_X_SCRIPT_NAME ""; + uwsgi_param HTTP_X_REAL_IP $remote_addr; + uwsgi_param HTTP_X_FORWARDED_FOR $proxy_add_x_forwarded_for; + ''; + }; + + # Protect stats endpoints (/stats, /stats/errors, /stats/checker). + locations."^~ /stats" = { + basicAuthFile = config.sops.secrets.searx-nginx-basic-auth.path; + recommendedUwsgiSettings = true; + uwsgiPass = "unix:${config.services.uwsgi.instance.vassals.searx.socket}"; + extraConfig = '' + uwsgi_param HTTP_HOST $host; + uwsgi_param HTTP_CONNECTION $http_connection; + uwsgi_param HTTP_X_SCHEME $scheme; + uwsgi_param HTTP_X_SCRIPT_NAME ""; + uwsgi_param HTTP_X_REAL_IP $remote_addr; + uwsgi_param HTTP_X_FORWARDED_FOR $proxy_add_x_forwarded_for; + ''; + }; + }; + + # Catch-all vhost so only s.hunner.dev serves SearXNG. + services.nginx.virtualHosts."_" = { + default = true; + addSSL = true; + useACMEHost = "s.hunner.dev"; + locations."/" = { + return = "200 \"This page intentionally left blank.\""; + extraConfig = '' + default_type text/plain; + ''; + }; + }; + programs.zsh.enable = true; # Add swap on small VPS instances to avoid OOM-kill loops. @@ -119,6 +193,6 @@ # Firewall networking.firewall = { enable = true; - allowedTCPPorts = [ 22 ]; + allowedTCPPorts = [ 22 80 443 ]; }; } diff --git a/hosts/ruil/secrets/config.yaml b/hosts/ruil/secrets/config.yaml index 294f346..8dfc58e 100644 --- a/hosts/ruil/secrets/config.yaml +++ b/hosts/ruil/secrets/config.yaml @@ -2,6 +2,8 @@ hashedPassword-hunner: ENC[AES256_GCM,data:fvgYWStE5XyHF1b9lntEfnml9cFbwaz5YCJRi hashedPassword-ruil: ENC[AES256_GCM,data:fwBU+24byBOTKljdABTvk2VxR5PGR18R3oozB/wSlORz12oQwjqAtdVBLSR2JZqA7yOWM5V//Ig60GCE4XmYc5pwVsEWqdY8JA==,iv:yuMNzQc+YfPyCFNYgNsh+xEJyLIFRUj0Er5TtYdcG18=,tag:dQpTM937EHEcEDJto4BVog==,type:str] hashedPassword-root: ENC[AES256_GCM,data:E/T3LBreiSZaC/qZ2QNxz3prGHoj47zS3ILsa7lmPzJDfLQ5yALxjWo4GyPHT9+kAU7uGOBG5/Ab5VqWxw+1cyk/YwT2dyMB+Q==,iv:eMav5Lnrm9SmQgHSDFiTKP6n9mADSsunlWyrSrIgA4E=,tag:fcMt6wiOClb30Vfkd9Dxmw==,type:str] openclaw-env: ENC[AES256_GCM,data:pJq+HdqlNjx0qeVHhPcnZk9FNm7/eMWm8vZ3ROnQ00qR4lXo3f86wL3vH9UQjVtdKSGDQj171b88nCVWqLY/h9YP2ld/1AwI7K06bzCRTjAYXzcpCfLyDEc0x3olSNTwsyKN4avI1x+9xciE36b53VVFpLNhGsRz9pT+jWx1jeVIUNbh6OGu4CGA1I2L4TaAiGEfEh29mDrAzqPLzIkyaSvay3+fun4X0SbpbE0bLnd6NnVUjff0HCgiDDDckc/O33G/k6OcLaN04hDnnCVIfGxPkRQKB02QC33mb35T5N4T,iv:DNNbwHGfQjY9Uvw4QXUz6IqtNQWZKLDD0GtvnoowxB0=,tag:+cu3ZVjo2xUg/wyIlUvD0Q==,type:str] +searx-env: ENC[AES256_GCM,data:dJ8JGxTWBdrli340Yjs5bA7X25NjExj5Mxp2T49jVEv/pafTtyMWf7Tvonzv+krCe1k/Zsh7KuWoJxXXOOGjRLPP1eQMMJunoL/P6JXruX+ZkBN5XbYB/UdWdkUrcvdDSyMcofZwgqYdDUy6J5ZlvcnmvuIM,iv:DuzG234PInaT/2CYQp9fzGh0EBYrxA7cto5uI4tGSkQ=,tag:1PNQKboKl6N7SULlUeAcgA==,type:str] +searx-nginx-basic-auth: ENC[AES256_GCM,data:v22LhW/PksCnfheQ5dYF4n0pLNdGEe8q/bp0aoP/ZRcUFsSWZSdt6Wuj3BdpW7Hl/vJiWysxDX/0mi1GQ7flZz0+lmIWe29hSroJljAccMrafL6CY7r2awk+IC5Z2hNmbvLxbHzyN9U8mExazeNuWq0=,iv:OpSkH4C0eAF6CrRJRmQRtC9j+0WEKLM1a0rNeGtROaY=,tag:7nbFtk02bgB0glANehZXTw==,type:str] sops: age: - recipient: age17sdp0gguexd88qel74fa4zeckxh93gqpkayz366fz6yvjauw7vcq7w6y45 @@ -22,7 +24,7 @@ sops: VHorQzNrMFJLaFpSalZZdjNraXhlSVUKwWLesTzMxsEB45hWWzhZGWc1cDm/gmvF MAytSLiBcieAkRKZoklyk/llbnq7kycvpZCU/sQrjKqmoHkC+TF3BQ== -----END AGE ENCRYPTED FILE----- - lastmodified: "2026-02-14T08:58:11Z" - mac: ENC[AES256_GCM,data:7OTjKMqKjHqJUA67dafkr/Vo2Bvetla10ZSjie1ZL+UXUINEOczop9YY/tTONboZYn0Ihqe1fYapPHied/+q2a2jp9DUSMlvnUj4oDj6IigAzwlOsARPNmtk7p+gV+ROmoAudBalB/M/AI4kfj7h9o+vYfaSpcfBLPYTPVpS8GQ=,iv:sQiBQU0V4oAOxo4UdEkehLJBYhu/kmjOMM+6X/hkWIg=,tag:XYRpDeVpr2MQadKpD62nFA==,type:str] + lastmodified: "2026-02-24T07:16:51Z" + mac: ENC[AES256_GCM,data:sOhZnDFUDSEgoAuj3JKntckpu/2wQ2GrNxU7As855i+zT8zkEJlatf5Lw4Mr5NnYQMu6Jtgq26+6ucY7VcMxlqEdm0+jWMSA9Q2iPFZspgvZHqfoqpKlAjqKP90IcPYuieZm53FQSBdTvD0TlCk5ZNG7DyErAdfPSjqozPPsuk4=,iv:QNXCvwcUvug+rfPJnVGnVs42/hBHOnaEd9FpwhJMJkU=,tag:h8v/W+gt9LFspAty/3zZrg==,type:str] unencrypted_suffix: _unencrypted version: 3.11.0