forked from pub-solar/infra
Benjamin Yule Bädorf
68278ad983
This works towards having reusable modules * `config.pub-solar-os.networking.domain` is used for the main domain * `config.pub-solar-os.privacyPolicUrl` links towards the privacy policy * `config.pub-solar-os.imprintUrl` links towards the imprint * `config.pub-solar-os.auth.enable` enables the keycloak installation. This is needed because `config.pub-solar-os.auth` has to be available everywhere, but we do not want to install keycloak everywhere. * `config.pub-solar-os.auth.realm` sets the keycloak realm name
33 lines
1.1 KiB
Nix
33 lines
1.1 KiB
Nix
{ config, flake, lib, ... }:
|
|
let
|
|
# Find element in list config.services.matrix-synapse.settings.listeners
|
|
# that sets type = "metrics"
|
|
listenerWithMetrics = lib.findFirst
|
|
(listener:
|
|
listener.type == "metrics")
|
|
(throw "Found no matrix-synapse.settings.listeners.*.type containing string metrics")
|
|
config.services.matrix-synapse.settings.listeners
|
|
;
|
|
synapseMetricsPort = "${toString listenerWithMetrics.port}";
|
|
in
|
|
{
|
|
age.secrets.nachtigall-metrics-nginx-basic-auth = {
|
|
file = "${flake.self}/secrets/nachtigall-metrics-nginx-basic-auth.age";
|
|
mode = "600";
|
|
owner = "nginx";
|
|
};
|
|
services.nginx.virtualHosts = {
|
|
"nachtigall.${config.pub-solar-os.networking.domain}" = {
|
|
enableACME = true;
|
|
addSSL = true;
|
|
basicAuthFile = "${config.age.secrets.nachtigall-metrics-nginx-basic-auth.path}";
|
|
locations."/metrics" = {
|
|
proxyPass = "http://127.0.0.1:${toString(config.services.prometheus.exporters.node.port)}";
|
|
};
|
|
locations."/_synapse/metrics" = {
|
|
proxyPass = "http://127.0.0.1:${synapseMetricsPort}";
|
|
};
|
|
};
|
|
};
|
|
}
|