reciproka-ops/profiles/reciproka-web.nix

54 lines
1.5 KiB
Nix
Raw Permalink Normal View History

# Nix configuration for deploying the Reciproka Kolektivo website
2022-07-20 04:34:07 +00:00
{
self,
config,
pkgs,
...
}: let
flake = builtins.getFlake (toString ../.);
reciproka-web = flake.inputs.reciproka-web.packages."${pkgs.system}".default;
webdomain = "reciproka.net";
2021-11-16 10:13:12 +00:00
in {
environment.sessionVariables = {
LOCALE_ARCHIVE = "/run/current-system/sw/lib/locale/locale-archive";
};
services.nginx = {
enable = true; # Enable Nginx
recommendedGzipSettings = true;
recommendedOptimisation = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
virtualHosts = {
2022-07-20 04:34:07 +00:00
"${webdomain}" = {
# website hostname
2021-11-16 10:13:12 +00:00
enableACME = true; # Use ACME certs
forceSSL = true; # Force SSL
root = "${reciproka-web}"; # Wesbite root
2021-11-16 10:13:12 +00:00
};
2022-07-20 04:34:07 +00:00
"www.${webdomain}" = {
# Respect our elders :-)
locations."/".extraConfig = "return 301 $scheme://${webdomain}$request_uri;";
enableACME = true; # Use ACME certs
forceSSL = true; # Force SSL
};
"reciproka.co" = {
locations."/".extraConfig = "return 301 $scheme://${webdomain}$request_uri;";
enableACME = true; # Use ACME certs
forceSSL = true; # Force SSL
2021-11-16 10:13:12 +00:00
};
};
};
security.acme = {
acceptTerms = true;
certs = {
"${webdomain}" = {email = "admin@${webdomain}";};
"www.${webdomain}" = {email = "admin@${webdomain}";};
"reciproka.co" = {email = "admin@${webdomain}";};
2021-11-16 10:13:12 +00:00
};
};
2022-07-20 04:34:07 +00:00
networking.firewall.allowedTCPPorts = [80 443];
2021-11-16 10:13:12 +00:00
}