{ ... }: { nixpkgs.config.packageOverrides = pkgs: { ibb = import ./ibb/default.nix {}; }; networking.firewall.allowedTCPPorts = [ 22 80 443 ]; services = { ibb.enable = true; nginx = { enable = true; recommendedGzipSettings = true; recommendedOptimisation = true; recommendedProxySettings = true; recommendedTlsSettings = true; virtualHosts = { "simatime.com" = { #forceSSL = true; #enableACME = true; locations = { "/" = { proxyPass = "http://68.107.97.20:8000"; }; }; }; "dev.simatime.com" = { #forceSSL = true; #enableACME = true; locations = { "/" = { proxyPass = "http://68.107.97.20:3000"; }; }; }; "hero.simatime.com" = { #forceSSL = true; #enableACME = true; locations = { "/" = { proxyPass = "http://68.107.97.20:3001"; }; }; }; "ibb.simatime.com" = { forceSSL = true; enableACME = true; locations = { "/" = { proxyPass = "http://localhost:3000"; }; }; }; }; }; }; boot.cleanTmpDir = true; networking.hostName = "simatime"; networking.firewall.allowPing = true; services.openssh.enable = true; users.users.root.openssh.authorizedKeys.keys = [ "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCiNB0iF9ClawNEizBtdYucqp1tAXXRbqvlPS6PFRrtiwSl+SJD29BCLgA5rLxcmFhBHZ/iId/En7GPFEzI/gMu071J7pUI4OcW0UVZju3GNc6ZEz/a6AD2u79JiXEDHfPEdmMqAe36kkaK0KJWSQP3xsFRwJ+8F8HHbSwoCLL+GJhBgAWHQLGfKesNrDacNljNDU3CgkEnDmu8QKuSzH2k1vrr69q2u2iMSAdiStDBAWEjN5nCVrm2XB2vmFLMtXpX2n8JI+znOGzRRDc8dNXejQeDMZGyV6jfVidEIX7vdgSydGjTRKcCLVAsKY3z0gYBZ8u8EUNujgcFBnnAvytj ben@neb" ]; }