forked from pub-solar/infra
Benjamin Yule Bädorf
68278ad983
This works towards having reusable modules * `config.pub-solar-os.networking.domain` is used for the main domain * `config.pub-solar-os.privacyPolicUrl` links towards the privacy policy * `config.pub-solar-os.imprintUrl` links towards the imprint * `config.pub-solar-os.auth.enable` enables the keycloak installation. This is needed because `config.pub-solar-os.auth` has to be available everywhere, but we do not want to install keycloak everywhere. * `config.pub-solar-os.auth.realm` sets the keycloak realm name
87 lines
2.8 KiB
Nix
87 lines
2.8 KiB
Nix
{
|
|
lib, config, ... }: {
|
|
systemd.tmpfiles.rules = [
|
|
"d '/srv/www/${config.pub-solar-os.networking.domain}' 0750 hakkonaut hakkonaut - -"
|
|
];
|
|
|
|
services.nginx.virtualHosts = {
|
|
"www.${config.pub-solar-os.networking.domain}" = {
|
|
enableACME = true;
|
|
addSSL = true;
|
|
|
|
extraConfig = ''
|
|
error_log /dev/null;
|
|
access_log /dev/null;
|
|
'';
|
|
|
|
locations."/" = {
|
|
extraConfig = ''
|
|
return 301 https://${config.pub-solar-os.networking.domain}$request_uri;
|
|
'';
|
|
};
|
|
};
|
|
|
|
"${config.pub-solar-os.networking.domain}" = {
|
|
default = true;
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
|
|
extraConfig = ''
|
|
error_log /dev/null;
|
|
access_log /dev/null;
|
|
'';
|
|
|
|
locations = {
|
|
# serve base domain pub.solar for mastodon.pub.solar
|
|
# https://masto.host/mastodon-usernames-different-from-the-domain-used-for-installation/
|
|
"/.well-known/host-meta" = {
|
|
extraConfig = ''
|
|
return 301 https://mastodon.${config.pub-solar-os.networking.domain}$request_uri;
|
|
'';
|
|
};
|
|
|
|
# Tailscale OIDC webfinger requirement plus Mastodon webfinger redirect
|
|
"/.well-known/webfinger" = {
|
|
# Redirect requests that match /.well-known/webfinger?resource=* to Mastodon
|
|
extraConfig = ''
|
|
if ($arg_resource) {
|
|
return 301 https://mastodon.${config.pub-solar-os.networking.domain}$request_uri;
|
|
}
|
|
|
|
add_header Content-Type text/plain;
|
|
return 200 '{\n "subject": "acct:admins@pub.solar",\n "links": [\n {\n "rel": "http://openid.net/specs/connect/1.0/issuer",\n "href": "https://auth.${config.pub-solar-os.networking.domain}/realms/pub.solar"\n }\n ]\n}';
|
|
'';
|
|
};
|
|
|
|
# Responsible disclosure information https://securitytxt.org/
|
|
"/.well-known/security.txt" = let
|
|
securityTXT = lib.lists.foldr (a: b: a + "\n" + b) "" [
|
|
"Contact: mailto:admins@pub.solar"
|
|
"Expires: 2025-01-04T23:00:00.000Z"
|
|
"Encryption: https://keys.openpgp.org/vks/v1/by-fingerprint/8A8987ADE3736C8CA2EB315A9B809EBBDD62BAE3"
|
|
"Preferred-Languages: en,de"
|
|
"Canonical: https://${config.pub-solar-os.networking.domain}/.well-known/security.txt"
|
|
];
|
|
in {
|
|
extraConfig = ''
|
|
add_header Content-Type text/plain;
|
|
return 200 '${securityTXT}';
|
|
'';
|
|
};
|
|
|
|
"/satzung" = {
|
|
extraConfig = ''
|
|
return 302 https://cloud.${config.pub-solar-os.networking.domain}/s/iaKqiW25QJpHPYs;
|
|
'';
|
|
};
|
|
|
|
"/" = {
|
|
root = "/srv/www/${config.pub-solar-os.networking.domain}";
|
|
index = "index.html";
|
|
tryFiles = "$uri $uri/ =404";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
}
|