160 lines
5.1 KiB
Nix
160 lines
5.1 KiB
Nix
{ pkgs, config, secrets, inputs, ... }:
|
|
let
|
|
# TODO: fix lib
|
|
lib = pkgs.lib;
|
|
|
|
inherit (secrets) ips ports;
|
|
|
|
s = toString;
|
|
in
|
|
{
|
|
|
|
security.acme = {
|
|
defaults.email = "h7x4abk3g@protonmail.com";
|
|
acceptTerms = true;
|
|
};
|
|
|
|
services.nginx = let
|
|
generateServerAliases =
|
|
domains: subdomains:
|
|
lib.lists.flatten (map (s: map (d: "${s}.${d}") domains) subdomains);
|
|
in {
|
|
enable = true;
|
|
|
|
statusPage = true;
|
|
|
|
recommendedGzipSettings = true;
|
|
recommendedOptimisation = true;
|
|
recommendedProxySettings = true;
|
|
recommendedTlsSettings = true;
|
|
|
|
virtualHosts = let
|
|
inherit (lib.attrsets) nameValuePair listToAttrs recursiveUpdate;
|
|
inherit (lib.lists) head drop;
|
|
inherit (secrets) domains keys;
|
|
|
|
makeHost =
|
|
subdomains: extraSettings:
|
|
nameValuePair "${head subdomains}.${head domains}" (recursiveUpdate {
|
|
serverAliases = drop 1 (generateServerAliases domains subdomains);
|
|
forceSSL = true;
|
|
sslCertificate = keys.certificates.server.crt;
|
|
sslCertificateKey = keys.certificates.server.key;
|
|
} extraSettings);
|
|
|
|
makeACMEHost =
|
|
subdomains: extraSettings:
|
|
nameValuePair "${head subdomains}.${head domains}" (recursiveUpdate {
|
|
serverAliases = drop 1 (generateServerAliases domains subdomains);
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
} extraSettings);
|
|
|
|
makeClientCertHost =
|
|
subdomains: extraSettings:
|
|
nameValuePair "${head subdomains}.${head domains}" (recursiveUpdate {
|
|
serverAliases = drop 1 (generateServerAliases domains subdomains);
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
extraConfig = ''
|
|
ssl_client_certificate ${secrets.keys.certificates.CA.crt};
|
|
ssl_verify_client optional;
|
|
'';
|
|
locations."/".extraConfig = ''
|
|
if ($ssl_client_verify != SUCCESS) {
|
|
return 403;
|
|
}
|
|
'';
|
|
} extraSettings);
|
|
|
|
makeProxy =
|
|
subdomains: url: extraSettings:
|
|
makeHost subdomains (recursiveUpdate { locations."/".proxyPass = url; } extraSettings);
|
|
|
|
makeACMEProxy =
|
|
subdomains: url: extraSettings:
|
|
makeACMEHost subdomains (recursiveUpdate { locations."/".proxyPass = url; } extraSettings);
|
|
|
|
makeClientCertProxy =
|
|
subdomains: url: extraSettings:
|
|
makeClientCertHost subdomains (recursiveUpdate { locations."/".proxyPass = url; } extraSettings);
|
|
|
|
in (listToAttrs [
|
|
# (makeACMEProxy ["gitlab"] "http://unix:/run/gitlab/gitlab-workhorse.socket" {})
|
|
{
|
|
name = "nani.wtf";
|
|
value = {
|
|
locations."/test".root = pkgs.writeText "asdf.txt" "hello";
|
|
locations."/.well-known/matrix/server".extraConfig = ''
|
|
return 200 '{"m.server": "matrix.nani.wtf:443"}';
|
|
default_type application/json;
|
|
add_header Access-Control-Allow-Origin *;
|
|
'';
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
};
|
|
}
|
|
(makeACMEProxy ["plex"] "http://localhost:${s ports.plex}" {})
|
|
(makeACMEHost ["www"] { root = "${inputs.website.defaultPackage.${pkgs.system}}/"; })
|
|
(makeACMEProxy ["matrix"] "http://localhost:${s ports.matrix.listener}" {})
|
|
(makeACMEHost ["madmin"] { root = "${pkgs.synapse-admin}/"; })
|
|
(makeACMEProxy ["git"] "http://localhost:${s ports.gitea}" {})
|
|
(makeClientCertHost ["cache"] { root = "/var/lib/nix-cache"; })
|
|
(makeClientCertProxy ["px1"] "https://${ips.px1}:${s ports.proxmox}" {
|
|
locations."/".proxyWebsockets = true;
|
|
})
|
|
(makeClientCertProxy ["idrac"] "https://${ips.idrac}" {})
|
|
(makeClientCertProxy ["searx"] "http://localhost:${s ports.searx}" {})
|
|
(makeACMEProxy ["dyn"] "http://${ips.crafty}:${s ports.dynmap}" {
|
|
# basicAuthFile = keys.htpasswds.default;
|
|
})
|
|
(makeClientCertProxy ["log"] "http://localhost:${s ports.grafana}" {
|
|
locations."/".proxyWebsockets = true;
|
|
})
|
|
(makeClientCertProxy ["pg"] "http://localhost:${s ports.pgadmin}" {})
|
|
# (makeProxy ["wiki"] "" {})
|
|
# (makeHost ["vpn"] "" {})
|
|
(makeACMEProxy ["hydra"] "http://localhost:${s ports.hydra}" {})
|
|
(makeClientCertProxy ["air"] "https://${ips.kansei}:${s ports.kansei}" {})
|
|
|
|
# (makePassProxy ["sync" "drive"] "" {})
|
|
# (makePassProxy ["music" "mpd"] "" {})
|
|
]) // {
|
|
${config.services.jitsi-meet.hostName} = {
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
};
|
|
};
|
|
|
|
upstreams = {};
|
|
|
|
streamConfig = ''
|
|
upstream minecraft {
|
|
server ${ips.crafty}:${s ports.minecraft};
|
|
}
|
|
|
|
server {
|
|
listen 0.0.0.0:${s ports.minecraft};
|
|
listen [::0]:${s ports.minecraft};
|
|
proxy_pass minecraft;
|
|
}
|
|
'';
|
|
# upstream openvpn {
|
|
# server localhost:${s ports.openvpn};
|
|
# }
|
|
|
|
# server {
|
|
# listen 0.0.0.0:${s ports.openvpn};
|
|
# listen [::0]:${s ports.openvpn};
|
|
# proxy_pass openvpn;
|
|
# }
|
|
};
|
|
|
|
networking.firewall.allowedTCPPorts = [
|
|
80
|
|
443
|
|
# secrets.ports.openvpn
|
|
ports.minecraft
|
|
];
|
|
}
|