129 lines
3.9 KiB
Nix
129 lines
3.9 KiB
Nix
{
|
|
lib,
|
|
config,
|
|
...
|
|
}: let
|
|
dataDir = "/var/lib/acme";
|
|
httpPort = 80;
|
|
httpsPort = 443;
|
|
in {
|
|
options.host.reverse_proxy = {
|
|
enable = lib.mkEnableOption "turn on the reverse proxy";
|
|
hostname = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = "what host name are we going to be proxying from";
|
|
};
|
|
forceSSL = lib.mkOption {
|
|
type = lib.types.bool;
|
|
description = "force connections to use https";
|
|
default = config.host.reverse_proxy.enableACME;
|
|
};
|
|
enableACME = lib.mkOption {
|
|
type = lib.types.bool;
|
|
description = "auto renew certificates";
|
|
default = true;
|
|
};
|
|
subdomains = lib.mkOption {
|
|
type = lib.types.attrsOf (lib.types.submodule ({name, ...}: {
|
|
options = {
|
|
subdomain = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = "what is the default subdomain to be used for this application to be used for";
|
|
default = name;
|
|
};
|
|
extraSubdomains = lib.mkOption {
|
|
type = lib.types.listOf lib.types.str;
|
|
description = "extra domains that should be configured for this domain";
|
|
default = [];
|
|
};
|
|
|
|
target = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = "what url will all traffic to this application be forwarded to";
|
|
};
|
|
|
|
websockets.enable = lib.mkEnableOption "should the default config proxy websockets";
|
|
|
|
forwardHeaders.enable = lib.mkEnableOption "should the default config contain forward headers";
|
|
|
|
extraConfig = lib.mkOption {
|
|
type = lib.types.lines;
|
|
default = "";
|
|
description = ''
|
|
These lines go to the end of the upstream verbatim.
|
|
'';
|
|
};
|
|
};
|
|
}));
|
|
};
|
|
};
|
|
|
|
config = lib.mkIf config.host.reverse_proxy.enable (lib.mkMerge [
|
|
{
|
|
security.acme = lib.mkIf config.host.reverse_proxy.enableACME {
|
|
acceptTerms = true;
|
|
defaults.email = "jan-leila@protonmail.com";
|
|
};
|
|
|
|
services.nginx = {
|
|
enable = true;
|
|
virtualHosts = lib.mkMerge (
|
|
lib.lists.flatten (
|
|
lib.attrsets.mapAttrsToList (
|
|
name: value: let
|
|
hostConfig = {
|
|
forceSSL = config.host.reverse_proxy.forceSSL;
|
|
enableACME = config.host.reverse_proxy.enableACME;
|
|
locations = {
|
|
"/" = {
|
|
proxyPass = value.target;
|
|
proxyWebsockets = value.websockets.enable;
|
|
recommendedProxySettings = value.forwardHeaders.enable;
|
|
extraConfig =
|
|
value.extraConfig;
|
|
};
|
|
};
|
|
};
|
|
in (
|
|
[
|
|
{
|
|
${"${value.subdomain}.${config.host.reverse_proxy.hostname}"} = hostConfig;
|
|
}
|
|
]
|
|
++ builtins.map (subdomain: {${"${subdomain}.${config.host.reverse_proxy.hostname}"} = hostConfig;})
|
|
value.extraSubdomains
|
|
)
|
|
)
|
|
config.host.reverse_proxy.subdomains
|
|
)
|
|
);
|
|
};
|
|
|
|
networking.firewall.allowedTCPPorts = [
|
|
httpPort
|
|
httpsPort
|
|
];
|
|
}
|
|
(lib.mkIf config.host.impermanence.enable {
|
|
# TODO: figure out how to write an assertion for this
|
|
# assertions = [
|
|
# {
|
|
# assertion = security.acme.certs.<name>.directory == dataDir;
|
|
# message = "postgres data directory does not match persistence";
|
|
# }
|
|
# ];
|
|
environment.persistence."/persist/system/root" = {
|
|
enable = true;
|
|
hideMounts = true;
|
|
directories = [
|
|
{
|
|
directory = dataDir;
|
|
user = "acme";
|
|
group = "acme";
|
|
}
|
|
];
|
|
};
|
|
})
|
|
]);
|
|
}
|