nixconf/modules/websites/default.nix
2024-06-18 19:58:50 +02:00

133 lines
3.7 KiB
Nix

{ config, options, lib, ... }:
let
cfg = config.modules.websites;
in
{
options.modules.websites =
{
enable = lib.mkEnableOption "enable web hosting";
certMail = lib.mkOption {
type = lib.types.str;
description = "the email address the certificate will be requested to";
};
mainDomains = lib.mkOption {
description = "nginx domains for which a certificate is needed";
type = with lib.types; attrsOf (submodule {
options =
let
proxyOption = lib.mkOption { type = str; description = "what url to proxy the requests to"; };
in
{
enable = lib.mkEnableOption "enable this website";
extra_sites = lib.mkOption {
description = "extra sites that use this certificate";
type = attrsOf
(submodule {
options = {
enable = lib.mkEnableOption "enable this website";
proxy = proxyOption;
};
});
};
proxy = proxyOption;
};
});
};
};
config = lib.mkIf cfg.enable (
let
hostnames = lib.lists.flatten (
lib.attrsets.mapAttrsToList
(
name: config:
[ name ] ++ lib.attrsets.mapAttrsToList (n: c: lib.mkIf c.enable n) config.extra_sites
)
cfg.mainDomains
);
certs = lib.attrsets.mapAttrs
(
name: config:
lib.mkIf config.enable {
extraDomainNames = lib.attrsets.mapAttrsToList (n: c: lib.mkIf c.enable n) config.extra_sites;
}
)
cfg.mainDomains;
hosts = lib.attrsets.concatMapAttrs
(
name: config:
let
extra = ''
client_max_body_size 50000M;
proxy_redirect off;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
send_timeout 600s;'';
proxy = url: {
forceSSL = true;
useACMEHost = name;
extraConfig = extra;
locations."/" = {
proxyWebsockets = true;
proxyPass = url;
};
};
in
lib.mkIf config.enable (
lib.mkMerge [
{
${name} = {
forceSSL = true;
enableACME = true;
extraConfig = extra;
locations."/" = {
proxyWebsockets = true;
proxyPass = config.proxy;
};
};
}
(lib.attrsets.mapAttrs
(n: c:
proxy c.proxy
)
config.extra_sites)
]
)
)
cfg.mainDomains;
in
{
networking.hosts = {
# NOTE: this is needed because I don't have hairpin nat. :(
"127.0.0.1" = hostnames;
};
security.acme = {
acceptTerms = true;
defaults.email = cfg.certMail;
certs = certs;
};
services.nginx = {
enable = true;
recommendedGzipSettings = true;
recommendedOptimisation = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
sslCiphers = "AES256+EECDH:AES256+EDH:!aNULL";
virtualHosts = hosts;
};
networking.firewall.allowedTCPPorts = [
80 # http
443 # https
];
networking.firewall.allowedUDPPorts = [
80 # http
443 # https
];
}
);
}