infrastructure/nixos/hosts/olympus/nginx/configuration.nix

152 lines
4.3 KiB
Nix
Raw Normal View History

2023-05-05 10:04:38 +02:00
{ pkgs, ... }:
2021-10-30 18:31:37 +02:00
let
2022-07-28 14:23:32 +02:00
clientConfig = {
2022-07-28 17:01:28 +02:00
"m.homeserver" = {
base_url = "https://chat.meowy.tech";
server_name = "meowy.tech";
};
"m.identity_server" = { };
2022-07-28 14:23:32 +02:00
};
serverConfig."m.server" = "chat.meowy.tech:443";
mkWellKnown = data: ''
add_header Content-Type application/json;
add_header Access-Control-Allow-Origin *;
return 200 '${builtins.toJSON data}';
'';
2023-09-25 11:56:02 +02:00
in
{
2021-10-18 21:37:56 +02:00
# This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions
# on your system were taken. Its perfectly fine and recommended to leave
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "21.05"; # Did you read the comment?
2021-10-19 02:02:35 +02:00
networking.firewall.allowedTCPPorts = [ 80 443 ];
2023-09-25 11:56:02 +02:00
services = {
2021-10-19 02:02:35 +02:00
2023-09-25 11:56:02 +02:00
# Generates vhosts for all hosts that have an `exposes` section
v.nginx.autoExpose = true;
2023-05-05 10:04:38 +02:00
2023-09-25 11:56:02 +02:00
nginx = {
enable = true;
statusPage = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
recommendedOptimisation = true;
recommendedBrotliSettings = true;
clientMaxBodySize = "500m";
2021-10-18 23:26:26 +02:00
2023-09-25 11:56:02 +02:00
package = pkgs.nginxMainline;
2022-05-08 02:13:44 +02:00
2023-09-25 11:56:02 +02:00
# Templated
virtualHosts = {
"pass.0x76.dev" = {
enableACME = true;
forceSSL = true;
locations = {
"/".proxyPass = "http://vaultwarden.olympus:8222";
"/".proxyWebsockets = true;
"/notifications/hub/negotiate" = {
proxyPass = "http://vaultwarden.olympus:8222";
proxyWebsockets = true;
};
"/notifications/hub" = {
proxyPass = "http://vaultwarden.olympus:3012";
proxyWebsockets = true;
};
};
};
2022-10-03 15:17:09 +02:00
2023-09-25 11:56:02 +02:00
# Meow
"meowy.tech" = {
enableACME = true;
forceSSL = true;
locations = {
"/".extraConfig = ''
add_header Content-Type 'text/html; charset=UTF-8';
return 200 '<h1>meow</h1>';
'';
"= /.well-known/matrix/client".extraConfig =
mkWellKnown clientConfig;
"= /.well-known/matrix/server".extraConfig =
mkWellKnown serverConfig;
};
};
2023-09-25 11:56:02 +02:00
"chat.meowy.tech" = {
enableACME = true;
forceSSL = true;
locations = {
"/".extraConfig = ''
return 307 https://element.chat.meowy.tech;
'';
"/_matrix".proxyPass = "http://synapse.olympus:8008";
"/_synapse/client".proxyPass = "http://synapse.olympus:8008";
"/_synapse/admin" = {
# Allow only local and my own IPs
extraConfig = ''
allow 127.0.0.1;
allow 10.42.42.0/23;
allow 192.168.0.0/23;
allow 80.60.83.220;
allow 83.128.154.23;
2023-11-27 14:18:45 +01:00
allow 62.45.26.248;
2023-09-25 11:56:02 +02:00
allow 195.85.167.32/29;
deny all;
'';
proxyPass = "http://synapse.olympus:8008";
};
};
};
"element.chat.meowy.tech" = {
enableACME = true;
forceSSL = true;
2022-07-28 17:01:28 +02:00
2023-09-25 11:56:02 +02:00
root = pkgs.element-web.override {
conf = {
default_server_config = clientConfig;
show_labs_settings = true;
brand = "chat.meowy.tech";
};
};
2022-07-28 17:01:28 +02:00
};
2023-09-25 11:56:02 +02:00
"cinny.chat.meowy.tech" = {
enableACME = true;
forceSSL = true;
2022-10-03 15:17:09 +02:00
2023-09-25 11:56:02 +02:00
root = pkgs.cinny.override {
conf = {
defaultHomeserver = 0;
allowCustomHomeservers = false;
homeserverList = [ "chat.meowy.tech" ];
};
};
2022-10-03 15:17:09 +02:00
};
2023-09-25 11:56:02 +02:00
"admin.chat.meowy.tech" = {
enableACME = true;
forceSSL = true;
root = pkgs.synapse-admin;
};
2022-10-03 15:17:09 +02:00
};
2023-09-25 11:56:02 +02:00
};
prometheus.exporters = {
nginx = {
enable = true;
openFirewall = true;
};
};
2021-10-18 21:37:56 +02:00
};
2023-09-25 11:56:02 +02:00
security = {
acme = {
2021-10-18 23:31:35 +02:00
2023-11-16 20:14:11 +01:00
defaults.email = "vivian@0x76.dev";
2023-09-25 11:56:02 +02:00
acceptTerms = true;
preliminarySelfsigned = true;
2022-07-30 12:22:19 +02:00
};
};
2021-10-18 21:37:56 +02:00
}