Skyler Grey | d7e1acd | 2024-06-22 14:42:11 +0000 | [diff] [blame] | 1 | # SPDX-FileCopyrightText: 2024 Clicks Codes |
| 2 | # |
| 3 | # SPDX-License-Identifier: GPL-3.0-only |
| 4 | |
| 5 | { lib, config, ... }: |
| 6 | let |
| 7 | cfg = config.clicks.services.nginx; |
| 8 | in |
| 9 | { |
| 10 | options.clicks.services.nginx = { |
| 11 | enable = lib.mkEnableOption "Enable Nginx routing"; |
| 12 | hosts = lib.options.mkOption { |
| 13 | type = lib.types.attrsOf (lib.clicks.types.nginx.host config); |
| 14 | description = "Attrset of web domain to host data"; |
| 15 | default = {}; |
| 16 | }; |
| 17 | defaultDnsProvider = lib.options.mkOption { |
| 18 | type = lib.types.nullOr lib.types.str; |
| 19 | description = "Default provider for getting web certificates"; |
| 20 | default = null; |
| 21 | }; |
Skyler Grey | d7e1acd | 2024-06-22 14:42:11 +0000 | [diff] [blame] | 22 | }; |
| 23 | |
| 24 | config = lib.modules.mkIf cfg.enable (let |
| 25 | processedHosts = lib.clicks.nginx.http.internal.serviceTranslation cfg.hosts; |
| 26 | hostsList = lib.attrsets.attrsToList processedHosts; |
| 27 | nginxHosts = lib.attrsets.mapAttrs (_: host: lib.attrsets.removeAttrs host [ "authWith" "dnsProvider" ]) processedHosts; |
Skyler Grey | 4123759 | 2024-08-08 22:07:15 +0000 | [diff] [blame^] | 28 | acmeCerts = lib.attrsets.mapAttrs (name: host: { |
Skyler Grey | d7e1acd | 2024-06-22 14:42:11 +0000 | [diff] [blame] | 29 | inherit (host) dnsProvider; |
Skyler Grey | 7e63dd5 | 2024-08-08 21:15:49 +0000 | [diff] [blame] | 30 | webroot = if host.dnsProvider != null |
| 31 | then null |
Skyler Grey | 4123759 | 2024-08-08 22:07:15 +0000 | [diff] [blame^] | 32 | else if (config.services.nginx.virtualHosts.${name}.acmeRoot or null) != null |
| 33 | then config.services.nginx.virtualHosts.${name}.acmeRoot |
Skyler Grey | 7e63dd5 | 2024-08-08 21:15:49 +0000 | [diff] [blame] | 34 | else config.security.acme.defaults.webroot; |
Skyler Grey | d7e1acd | 2024-06-22 14:42:11 +0000 | [diff] [blame] | 35 | }) processedHosts; |
| 36 | tailscaleAuthHosts = lib.pipe hostsList [ |
| 37 | (lib.lists.filter (host: host.value.authWith == "tailscale")) |
| 38 | (map (host: host.name)) |
| 39 | ]; |
| 40 | in { |
| 41 | services.nginx = { |
| 42 | enable = true; |
| 43 | enableReload = true; |
| 44 | virtualHosts = { |
| 45 | "default_server_ssl" = { |
| 46 | listen = [ |
| 47 | { |
| 48 | ssl = true; |
| 49 | port = 443; |
| 50 | addr = "0.0.0.0"; |
| 51 | extraParameters = [ |
| 52 | "default_server" |
| 53 | ]; |
| 54 | } |
| 55 | ]; |
| 56 | |
| 57 | rejectSSL = true; |
| 58 | }; |
| 59 | "default_server" = { |
| 60 | listen = [ |
| 61 | { |
| 62 | port = 80; |
| 63 | addr = "0.0.0.0"; |
| 64 | extraParameters = [ |
| 65 | "default_server" |
| 66 | ]; |
| 67 | } |
| 68 | ]; |
| 69 | |
| 70 | locations."/" = { |
| 71 | return = 444; |
| 72 | }; |
| 73 | }; |
| 74 | } // nginxHosts; |
| 75 | }; |
| 76 | |
| 77 | security.acme.certs = acmeCerts; |
| 78 | |
| 79 | clicks.services.tailscaleAuth = lib.mkIf (lib.lists.length tailscaleAuthHosts > 0) { |
| 80 | enable = true; |
| 81 | |
| 82 | hosts = tailscaleAuthHosts; |
| 83 | }; |
| 84 | |
| 85 | networking.firewall.allowedTCPPorts = [ 80 443 ]; |
| 86 | }); |
| 87 | } |