2023-05-23 21:32:38 +01:00
|
|
|
{ lib, pkgs, config, allAssignments, ... }:
|
|
|
|
let
|
2023-05-27 18:44:23 +01:00
|
|
|
inherit (builtins) mapAttrs;
|
|
|
|
inherit (lib) mkMerge mkIf mkDefault;
|
2023-05-23 21:32:38 +01:00
|
|
|
in
|
|
|
|
{
|
|
|
|
config = {
|
|
|
|
my = {
|
|
|
|
secrets.files = {
|
|
|
|
"kelder/htpasswd" = {
|
|
|
|
owner = "nginx";
|
|
|
|
group = "nginx";
|
|
|
|
};
|
2023-05-27 18:44:23 +01:00
|
|
|
"dhparams.pem" = {
|
|
|
|
owner = "acme";
|
|
|
|
group = "acme";
|
|
|
|
mode = "440";
|
|
|
|
};
|
|
|
|
"kelder/cloudflare-credentials.conf" = {
|
|
|
|
owner = "acme";
|
|
|
|
group = "acme";
|
|
|
|
};
|
2023-05-23 21:32:38 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
firewall = {
|
|
|
|
tcp.allowed = [ "http" "https" ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2023-05-27 18:44:23 +01:00
|
|
|
security.acme = {
|
|
|
|
acceptTerms = true;
|
|
|
|
defaults = {
|
|
|
|
email = "dev@nul.ie";
|
|
|
|
server = "https://acme-v02.api.letsencrypt.org/directory";
|
|
|
|
reloadServices = [ "nginx" ];
|
|
|
|
dnsResolver = "8.8.8.8";
|
|
|
|
};
|
|
|
|
certs = {
|
|
|
|
"${lib.my.kelder.domain}" = {
|
|
|
|
extraDomainNames = [
|
|
|
|
"*.${lib.my.kelder.domain}"
|
|
|
|
];
|
|
|
|
dnsProvider = "cloudflare";
|
|
|
|
credentialsFile = config.age.secrets."kelder/cloudflare-credentials.conf".path;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
users = {
|
|
|
|
users = {
|
|
|
|
nginx.extraGroups = [ "acme" ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2023-05-23 21:32:38 +01:00
|
|
|
services = {
|
|
|
|
nginx = {
|
|
|
|
enable = true;
|
|
|
|
enableReload = true;
|
|
|
|
|
|
|
|
recommendedTlsSettings = true;
|
|
|
|
clientMaxBodySize = "0";
|
|
|
|
serverTokens = true;
|
2023-05-27 18:44:23 +01:00
|
|
|
sslDhparam = config.age.secrets."dhparams.pem".path;
|
2023-05-23 21:32:38 +01:00
|
|
|
|
|
|
|
# Based on recommended*Settings, but probably better to be explicit about these
|
|
|
|
appendHttpConfig = ''
|
|
|
|
# NixOS provides a logrotate config that auto-compresses :)
|
|
|
|
log_format main
|
|
|
|
'$remote_addr - $remote_user [$time_local] $scheme "$host" "$request" $status $body_bytes_sent "$http_referer" "$http_user_agent"';
|
|
|
|
access_log /var/log/nginx/access.log main;
|
|
|
|
|
|
|
|
# optimisation
|
|
|
|
sendfile on;
|
|
|
|
tcp_nopush on;
|
|
|
|
tcp_nodelay on;
|
|
|
|
keepalive_timeout 65;
|
|
|
|
|
|
|
|
# gzip
|
|
|
|
gzip on;
|
|
|
|
gzip_proxied any;
|
|
|
|
gzip_comp_level 5;
|
|
|
|
gzip_types
|
|
|
|
application/atom+xml
|
|
|
|
application/javascript
|
|
|
|
application/json
|
|
|
|
application/xml
|
|
|
|
application/xml+rss
|
|
|
|
image/svg+xml
|
|
|
|
text/css
|
|
|
|
text/javascript
|
|
|
|
text/plain
|
|
|
|
text/xml;
|
|
|
|
gzip_vary on;
|
|
|
|
|
|
|
|
# proxying
|
|
|
|
proxy_buffering off;
|
|
|
|
proxy_redirect off;
|
|
|
|
proxy_connect_timeout 60s;
|
|
|
|
proxy_read_timeout 60s;
|
|
|
|
proxy_send_timeout 60s;
|
|
|
|
proxy_http_version 1.1;
|
|
|
|
|
|
|
|
${lib.my.nginx.proxyHeaders}
|
|
|
|
|
|
|
|
# caching
|
|
|
|
proxy_cache_path /var/cache/nginx levels=1:2 keys_zone=CACHE:10m inactive=7d max_size=4g;
|
|
|
|
'';
|
|
|
|
|
|
|
|
virtualHosts =
|
|
|
|
let
|
|
|
|
withAuth = c: mkMerge [
|
|
|
|
{
|
|
|
|
basicAuthFile = config.age.secrets."kelder/htpasswd".path;
|
|
|
|
}
|
|
|
|
c
|
|
|
|
];
|
|
|
|
acquisition = "http://${allAssignments.kelder-acquisition.internal.ipv4.address}";
|
2023-05-27 18:44:23 +01:00
|
|
|
hosts = {
|
|
|
|
"_" = {
|
|
|
|
default = true;
|
|
|
|
forceSSL = true;
|
|
|
|
onlySSL = false;
|
|
|
|
locations = {
|
|
|
|
"/".root = "${pkgs.nginx}/html";
|
|
|
|
};
|
|
|
|
};
|
2023-05-23 21:32:38 +01:00
|
|
|
|
2023-05-27 18:44:23 +01:00
|
|
|
"media.${lib.my.kelder.domain}" = {
|
|
|
|
locations = {
|
|
|
|
"/".proxyPass = "${acquisition}:8096";
|
|
|
|
"= /".return = "302 $scheme://$host/web/";
|
|
|
|
"= /web/".proxyPass = "${acquisition}:8096/web/index.html";
|
|
|
|
"/socket" = {
|
|
|
|
proxyPass = "${acquisition}:8096/socket";
|
|
|
|
proxyWebsockets = true;
|
|
|
|
extraConfig = lib.my.nginx.proxyHeaders;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
"torrents.${lib.my.kelder.domain}" = withAuth {
|
|
|
|
locations."/".proxyPass = "${acquisition}:9091";
|
|
|
|
};
|
|
|
|
"jackett.${lib.my.kelder.domain}" = withAuth {
|
|
|
|
locations."/".proxyPass = "${acquisition}:9117";
|
|
|
|
};
|
|
|
|
"radarr.${lib.my.kelder.domain}" = withAuth {
|
|
|
|
locations."/" = {
|
|
|
|
proxyPass = "${acquisition}:7878";
|
2023-05-23 21:32:38 +01:00
|
|
|
proxyWebsockets = true;
|
|
|
|
extraConfig = lib.my.nginx.proxyHeaders;
|
|
|
|
};
|
|
|
|
};
|
2023-05-27 18:44:23 +01:00
|
|
|
"sonarr.${lib.my.kelder.domain}" = withAuth {
|
|
|
|
locations."/" = {
|
|
|
|
proxyPass = "${acquisition}:8989";
|
2023-05-23 21:32:38 +01:00
|
|
|
proxyWebsockets = true;
|
|
|
|
extraConfig = lib.my.nginx.proxyHeaders;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
2023-05-27 18:44:23 +01:00
|
|
|
|
|
|
|
defaultsFor = mapAttrs (n: _: {
|
|
|
|
onlySSL = mkDefault true;
|
|
|
|
useACMEHost = mkDefault "${config.networking.domain}";
|
|
|
|
kTLS = mkDefault true;
|
|
|
|
http2 = mkDefault true;
|
|
|
|
});
|
|
|
|
in
|
|
|
|
mkMerge [
|
|
|
|
hosts
|
|
|
|
(defaultsFor hosts)
|
|
|
|
];
|
2023-05-23 21:32:38 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|