nixos/kelder: Auto-redirect remote accesses to local ones
This commit is contained in:
parent
be901d4222
commit
44c5a9ded9
@ -20,6 +20,7 @@ in
|
|||||||
owner = "acme";
|
owner = "acme";
|
||||||
group = "acme";
|
group = "acme";
|
||||||
};
|
};
|
||||||
|
"kelder/ddclient-cloudflare.key" = {};
|
||||||
};
|
};
|
||||||
|
|
||||||
firewall = {
|
firewall = {
|
||||||
@ -53,10 +54,22 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
|
ddclient = {
|
||||||
|
enable = true;
|
||||||
|
use = "if, if=et1g0";
|
||||||
|
|
||||||
|
protocol = "cloudflare";
|
||||||
|
zone = lib.my.kelder.domain;
|
||||||
|
domains = [ "kelder-local.${lib.my.kelder.domain}" ];
|
||||||
|
username = "token";
|
||||||
|
passwordFile = config.age.secrets."kelder/ddclient-cloudflare.key".path;
|
||||||
|
};
|
||||||
nginx = {
|
nginx = {
|
||||||
|
package = pkgs.openresty;
|
||||||
enable = true;
|
enable = true;
|
||||||
enableReload = true;
|
enableReload = true;
|
||||||
|
|
||||||
|
logError = "stderr info";
|
||||||
recommendedTlsSettings = true;
|
recommendedTlsSettings = true;
|
||||||
clientMaxBodySize = "0";
|
clientMaxBodySize = "0";
|
||||||
serverTokens = true;
|
serverTokens = true;
|
||||||
@ -104,6 +117,36 @@ in
|
|||||||
|
|
||||||
# caching
|
# caching
|
||||||
proxy_cache_path /var/cache/nginx levels=1:2 keys_zone=CACHE:10m inactive=7d max_size=4g;
|
proxy_cache_path /var/cache/nginx levels=1:2 keys_zone=CACHE:10m inactive=7d max_size=4g;
|
||||||
|
|
||||||
|
init_worker_by_lua_block {
|
||||||
|
local update_ip = function(premature)
|
||||||
|
if premature then
|
||||||
|
return
|
||||||
|
end
|
||||||
|
|
||||||
|
local hdl, err = io.popen("${pkgs.curl}/bin/curl -s https://v4.ident.me")
|
||||||
|
if not hdl then
|
||||||
|
ngx.log(ngx.ERR, "failed to run command: ", err)
|
||||||
|
return
|
||||||
|
end
|
||||||
|
|
||||||
|
local ip, err = hdl:read("*l")
|
||||||
|
hdl:close()
|
||||||
|
if not ip then
|
||||||
|
ngx.log(ngx.ERR, "failed to read ip: ", err)
|
||||||
|
return
|
||||||
|
end
|
||||||
|
|
||||||
|
pub_ip = ip
|
||||||
|
ngx.log(ngx.INFO, "ip is now: ", pub_ip)
|
||||||
|
end
|
||||||
|
|
||||||
|
local hdl, err = ngx.timer.every(5 * 60, update_ip)
|
||||||
|
if not hdl then
|
||||||
|
ngx.log(ngx.ERR, "failed to create timer: ", err)
|
||||||
|
end
|
||||||
|
update_ip()
|
||||||
|
}
|
||||||
'';
|
'';
|
||||||
|
|
||||||
virtualHosts =
|
virtualHosts =
|
||||||
@ -115,6 +158,13 @@ in
|
|||||||
c
|
c
|
||||||
];
|
];
|
||||||
acquisition = "http://${allAssignments.kelder-acquisition.internal.ipv4.address}";
|
acquisition = "http://${allAssignments.kelder-acquisition.internal.ipv4.address}";
|
||||||
|
localRedirect = to: ''
|
||||||
|
rewrite_by_lua_block {
|
||||||
|
if ngx.var.remote_addr == pub_ip then
|
||||||
|
ngx.redirect(ngx.var.scheme .. "://${to}" .. ngx.var.request_uri, ngx.HTTP_MOVED_PERMANENTLY)
|
||||||
|
end
|
||||||
|
}
|
||||||
|
'';
|
||||||
hosts = {
|
hosts = {
|
||||||
"_" = {
|
"_" = {
|
||||||
default = true;
|
default = true;
|
||||||
@ -126,6 +176,8 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
"media.${lib.my.kelder.domain}" = {
|
"media.${lib.my.kelder.domain}" = {
|
||||||
|
extraConfig = localRedirect "media-local.${lib.my.kelder.domain}";
|
||||||
|
serverAliases = [ "media-local.${lib.my.kelder.domain}" ];
|
||||||
locations = {
|
locations = {
|
||||||
"/".proxyPass = "${acquisition}:8096";
|
"/".proxyPass = "${acquisition}:8096";
|
||||||
"= /".return = "302 $scheme://$host/web/";
|
"= /".return = "302 $scheme://$host/web/";
|
||||||
@ -161,7 +213,7 @@ in
|
|||||||
|
|
||||||
defaultsFor = mapAttrs (n: _: {
|
defaultsFor = mapAttrs (n: _: {
|
||||||
onlySSL = mkDefault true;
|
onlySSL = mkDefault true;
|
||||||
useACMEHost = mkDefault "${config.networking.domain}";
|
useACMEHost = mkDefault lib.my.kelder.domain;
|
||||||
kTLS = mkDefault true;
|
kTLS = mkDefault true;
|
||||||
http2 = mkDefault true;
|
http2 = mkDefault true;
|
||||||
});
|
});
|
||||||
|
11
secrets/kelder/ddclient-cloudflare.key.age
Normal file
11
secrets/kelder/ddclient-cloudflare.key.age
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
-----BEGIN AGE ENCRYPTED FILE-----
|
||||||
|
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IHNzaC1lZDI1NTE5IGV5cTNkZyA5dVVW
|
||||||
|
RzhQdzF0VFZVS09jUEtsZlp3YVY5Mm9RZXkwTVAwOWxMM2VZN0FFCjREQzhtTWR5
|
||||||
|
UDREOXRqSDRWdHF5SHFzVzFiMU9GYVoyRys2Q2hZYmpiNlkKLT4gWDI1NTE5IGRU
|
||||||
|
YnBWb0tPcnA0RDZnOTlsSm80T1FTK3VzaUxtaHBxdHpOMlBVWW15Z3MKOFBvcC9Y
|
||||||
|
RU1IOEZ1TkIwYTRNMzMxTVVlNjdmZ3ArNGcyNXpXdDZpdTc2VQotPiBDJiEsQkE8
|
||||||
|
LWdyZWFzZSBACjJzNnpBZVdjVlB3ckNJK0FTZwotLS0gWnRaV1VJTmN1eWJGYzZK
|
||||||
|
TDdCdWpiVGo5aXpJajV3MzVTWWd0WCtCQm5rOApZgWQ/ZgVwKOKaqlUUeM2zEPa9
|
||||||
|
cKsPeeoaGg1eIYsrwqvEWA43iwGc+vqXjru/4BszHIU0Mk5dodg8wrqsLarGd6lP
|
||||||
|
uj6NBn0i
|
||||||
|
-----END AGE ENCRYPTED FILE-----
|
Loading…
Reference in New Issue
Block a user