nixos/kelder: Move nginx to separate container
This commit is contained in:
91
nixos/boxes/kelder/containers/spoder/default.nix
Normal file
91
nixos/boxes/kelder/containers/spoder/default.nix
Normal file
@@ -0,0 +1,91 @@
|
||||
{ lib, ... }:
|
||||
let
|
||||
inherit (lib) mkForce mkMerge;
|
||||
inherit (lib.my) net;
|
||||
inherit (lib.my.kelder) domain prefixes;
|
||||
in
|
||||
{
|
||||
nixos.systems.kelder-spoder = {
|
||||
system = "x86_64-linux";
|
||||
nixpkgs = "mine";
|
||||
|
||||
assignments = {
|
||||
internal = {
|
||||
name = "spoder-ctr";
|
||||
inherit domain;
|
||||
ipv4.address = net.cidr.host 3 prefixes.ctrs.v4;
|
||||
};
|
||||
};
|
||||
|
||||
configuration = { lib, pkgs, config, assignments, ... }:
|
||||
let
|
||||
inherit (lib.my) networkdAssignment;
|
||||
in
|
||||
{
|
||||
imports = [ ./nginx.nix ];
|
||||
|
||||
config = {
|
||||
my = {
|
||||
deploy.enable = false;
|
||||
server.enable = true;
|
||||
user.config.name = "kontent";
|
||||
|
||||
secrets = {
|
||||
key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBdYyebQv/bBLbat1Csnr1/VMPKsi99PiLOXyKeQb7oX";
|
||||
files = {
|
||||
"kelder/cloudflare-credentials.conf" = {
|
||||
owner = "acme";
|
||||
group = "acme";
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
security.acme = {
|
||||
acceptTerms = true;
|
||||
defaults = {
|
||||
email = "dev@nul.ie";
|
||||
server = "https://acme-v02.api.letsencrypt.org/directory";
|
||||
reloadServices = [ "nginx" ];
|
||||
dnsResolver = "8.8.8.8";
|
||||
};
|
||||
certs = {
|
||||
"${lib.my.kelder.domain}" = {
|
||||
extraDomainNames = [
|
||||
"*.${lib.my.kelder.domain}"
|
||||
];
|
||||
dnsProvider = "cloudflare";
|
||||
credentialsFile = config.age.secrets."kelder/cloudflare-credentials.conf".path;
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
users = {
|
||||
groups.storage.gid = lib.my.kelder.groups.storage;
|
||||
users = {
|
||||
nginx.extraGroups = [ "acme" ];
|
||||
|
||||
"${config.my.user.config.name}".extraGroups = [ "storage" ];
|
||||
};
|
||||
};
|
||||
|
||||
systemd = {
|
||||
network.networks."80-container-host0" = mkMerge [
|
||||
(networkdAssignment "host0" assignments.internal)
|
||||
{
|
||||
linkConfig.MTUBytes = "1420";
|
||||
}
|
||||
];
|
||||
services = {
|
||||
radarr.serviceConfig.UMask = "0002";
|
||||
sonarr.serviceConfig.UMask = "0002";
|
||||
};
|
||||
};
|
||||
|
||||
services = {
|
||||
resolved.extraConfig = mkForce "";
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
188
nixos/boxes/kelder/containers/spoder/nginx.nix
Normal file
188
nixos/boxes/kelder/containers/spoder/nginx.nix
Normal file
@@ -0,0 +1,188 @@
|
||||
{ lib, pkgs, config, allAssignments, ... }:
|
||||
let
|
||||
inherit (builtins) mapAttrs;
|
||||
inherit (lib) mkMerge mkIf mkDefault;
|
||||
in
|
||||
{
|
||||
config = {
|
||||
my = {
|
||||
secrets.files = {
|
||||
"kelder/htpasswd" = {
|
||||
owner = "nginx";
|
||||
group = "nginx";
|
||||
};
|
||||
"dhparams.pem" = {
|
||||
owner = "acme";
|
||||
group = "acme";
|
||||
mode = "440";
|
||||
};
|
||||
};
|
||||
|
||||
firewall = {
|
||||
tcp.allowed = [ "http" "https" ];
|
||||
};
|
||||
};
|
||||
|
||||
services = {
|
||||
nginx = {
|
||||
package = pkgs.openresty;
|
||||
enable = true;
|
||||
enableReload = true;
|
||||
|
||||
logError = "stderr info";
|
||||
recommendedTlsSettings = true;
|
||||
clientMaxBodySize = "0";
|
||||
serverTokens = true;
|
||||
sslDhparam = config.age.secrets."dhparams.pem".path;
|
||||
|
||||
# Based on recommended*Settings, but probably better to be explicit about these
|
||||
appendHttpConfig = ''
|
||||
# NixOS provides a logrotate config that auto-compresses :)
|
||||
log_format main
|
||||
'$remote_addr - $remote_user [$time_local] $scheme "$host" "$request" $status $body_bytes_sent "$http_referer" "$http_user_agent"';
|
||||
access_log /var/log/nginx/access.log main;
|
||||
|
||||
# optimisation
|
||||
sendfile on;
|
||||
tcp_nopush on;
|
||||
tcp_nodelay on;
|
||||
keepalive_timeout 65;
|
||||
|
||||
# gzip
|
||||
gzip on;
|
||||
gzip_proxied any;
|
||||
gzip_comp_level 5;
|
||||
gzip_types
|
||||
application/atom+xml
|
||||
application/javascript
|
||||
application/json
|
||||
application/xml
|
||||
application/xml+rss
|
||||
image/svg+xml
|
||||
text/css
|
||||
text/javascript
|
||||
text/plain
|
||||
text/xml;
|
||||
gzip_vary on;
|
||||
|
||||
# proxying
|
||||
proxy_buffering off;
|
||||
proxy_redirect off;
|
||||
proxy_connect_timeout 60s;
|
||||
proxy_read_timeout 60s;
|
||||
proxy_send_timeout 60s;
|
||||
proxy_http_version 1.1;
|
||||
|
||||
${lib.my.nginx.proxyHeaders}
|
||||
|
||||
# caching
|
||||
proxy_cache_path /var/cache/nginx levels=1:2 keys_zone=CACHE:10m inactive=7d max_size=4g;
|
||||
|
||||
init_worker_by_lua_block {
|
||||
local update_ip = function(premature)
|
||||
if premature then
|
||||
return
|
||||
end
|
||||
|
||||
local hdl, err = io.popen("${pkgs.curl}/bin/curl -s https://v4.ident.me")
|
||||
if not hdl then
|
||||
ngx.log(ngx.ERR, "failed to run command: ", err)
|
||||
return
|
||||
end
|
||||
|
||||
local ip, err = hdl:read("*l")
|
||||
hdl:close()
|
||||
if not ip then
|
||||
ngx.log(ngx.ERR, "failed to read ip: ", err)
|
||||
return
|
||||
end
|
||||
|
||||
pub_ip = ip
|
||||
ngx.log(ngx.INFO, "ip is now: ", pub_ip)
|
||||
end
|
||||
|
||||
local hdl, err = ngx.timer.every(5 * 60, update_ip)
|
||||
if not hdl then
|
||||
ngx.log(ngx.ERR, "failed to create timer: ", err)
|
||||
end
|
||||
update_ip()
|
||||
}
|
||||
'';
|
||||
|
||||
virtualHosts =
|
||||
let
|
||||
withAuth = c: mkMerge [
|
||||
{
|
||||
basicAuthFile = config.age.secrets."kelder/htpasswd".path;
|
||||
}
|
||||
c
|
||||
];
|
||||
acquisition = "http://${allAssignments.kelder-acquisition.internal.ipv4.address}";
|
||||
localRedirect = to: ''
|
||||
rewrite_by_lua_block {
|
||||
if ngx.var.remote_addr == pub_ip then
|
||||
ngx.redirect(ngx.var.scheme .. "://${to}" .. ngx.var.request_uri, ngx.HTTP_MOVED_PERMANENTLY)
|
||||
end
|
||||
}
|
||||
'';
|
||||
hosts = {
|
||||
"_" = {
|
||||
default = true;
|
||||
forceSSL = true;
|
||||
onlySSL = false;
|
||||
locations = {
|
||||
"/".root = "${pkgs.nginx}/html";
|
||||
};
|
||||
};
|
||||
|
||||
"media.${lib.my.kelder.domain}" = {
|
||||
extraConfig = localRedirect "media-local.${lib.my.kelder.domain}";
|
||||
serverAliases = [ "media-local.${lib.my.kelder.domain}" ];
|
||||
locations = {
|
||||
"/".proxyPass = "${acquisition}:8096";
|
||||
"= /".return = "302 $scheme://$host/web/";
|
||||
"= /web/".proxyPass = "${acquisition}:8096/web/index.html";
|
||||
"/socket" = {
|
||||
proxyPass = "${acquisition}:8096/socket";
|
||||
proxyWebsockets = true;
|
||||
extraConfig = lib.my.nginx.proxyHeaders;
|
||||
};
|
||||
};
|
||||
};
|
||||
"torrents.${lib.my.kelder.domain}" = withAuth {
|
||||
locations."/".proxyPass = "${acquisition}:9091";
|
||||
};
|
||||
"jackett.${lib.my.kelder.domain}" = withAuth {
|
||||
locations."/".proxyPass = "${acquisition}:9117";
|
||||
};
|
||||
"radarr.${lib.my.kelder.domain}" = withAuth {
|
||||
locations."/" = {
|
||||
proxyPass = "${acquisition}:7878";
|
||||
proxyWebsockets = true;
|
||||
extraConfig = lib.my.nginx.proxyHeaders;
|
||||
};
|
||||
};
|
||||
"sonarr.${lib.my.kelder.domain}" = withAuth {
|
||||
locations."/" = {
|
||||
proxyPass = "${acquisition}:8989";
|
||||
proxyWebsockets = true;
|
||||
extraConfig = lib.my.nginx.proxyHeaders;
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
defaultsFor = mapAttrs (n: _: {
|
||||
onlySSL = mkDefault true;
|
||||
useACMEHost = mkDefault lib.my.kelder.domain;
|
||||
kTLS = mkDefault true;
|
||||
http2 = mkDefault true;
|
||||
});
|
||||
in
|
||||
mkMerge [
|
||||
hosts
|
||||
(defaultsFor hosts)
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
Reference in New Issue
Block a user