nixos/hosts/architect/nginx.nix

74 lines
1.7 KiB
Nix
Raw Normal View History

{ services, pkgs, lib, ... }:
2021-07-07 10:45:37 +01:00
{
services.nginx = {
2021-11-25 11:42:32 +00:00
enable = true;
package = pkgs.openresty;
2021-11-25 11:42:32 +00:00
recommendedGzipSettings = true;
recommendedOptimisation = true;
2021-07-07 10:45:37 +01:00
recommendedProxySettings = true;
2021-11-25 11:42:32 +00:00
recommendedTlsSettings = true;
2022-10-13 15:04:56 +01:00
virtualHosts."architect.devs.giugl.io" = {
default = true;
enableACME = true;
addSSL = true;
root = "/var/lib/nginx/error_pages";
extraConfig = "error_page 404 /index.htm;";
locations = {
"/" = { return = "404"; };
"/index.htm" = { };
"/style.css" = { };
"/wat.jpg" = { };
};
};
appendHttpConfig = let
extraPureLuaPackages = with pkgs.luajitPackages; [
lua-resty-openidc
lua-resty-http
lua-resty-session
lua-resty-jwt
lua-resty-openssl
];
luaPath = pkg: "${pkg}/share/lua/5.1/?.lua";
makeLuaPath = lib.concatMapStringsSep ";" luaPath;
in ''
lua_package_path '${makeLuaPath extraPureLuaPackages};;';
lua_ssl_trusted_certificate /etc/ssl/certs/ca-certificates.crt;
lua_ssl_verify_depth 5;
# cache for OIDC discovery metadata
lua_shared_dict discovery 1m;
lua_shared_dict jwks 1m;
# https://github.com/openresty/lua-resty-redis/issues/159
resolver local=on ipv6=off;
init_worker_by_lua_block {
function check_role (res, role)
if res.user.roles == nil then
return false
end
for _,v in pairs(res.user.roles) do
if string.lower(v) == role then
return true
end
end
return false
end
}
'';
2022-07-06 19:34:12 +01:00
appendConfig = ''
worker_processes 24;
'';
2021-07-07 10:45:37 +01:00
};
2021-08-07 12:38:18 +01:00
users.groups.acme.members = [ "nginx" ];
2021-07-07 10:45:37 +01:00
}