hakyll-skeleton: initial deployment

This commit is contained in:
Fiscal Velvet Poet 2021-11-18 10:16:34 +10:00
parent 04f102d7c4
commit 950c71e78d
Signed by: fiscalvelvetpoet
GPG key ID: D8EBFD58B023BD47
3 changed files with 56 additions and 8 deletions

View file

@ -6,10 +6,10 @@
{ {
imports = imports = [
[
../networks/linode.nix ../networks/linode.nix
../profiles/gitea.nix ../profiles/gitea.nix
../profiles/hakyll-skeleton.nix
../profiles/jfdic-web.nix ../profiles/jfdic-web.nix
../secrets/gitea.nix ../secrets/gitea.nix
]; ];

View file

@ -1,4 +1,10 @@
{ {
"hakyll-skeleton": {
"sha256": "1j8cv3fn6mhkqwqz9rg8cg5lf76z381rx5s4gb7rjyly53jbjbjv",
"type": "tarball",
"url": "https://source.jfdic.org/jfdic/hakyll-skeleton/archive/edd1e1bd083f3ad59572b35fd783865ec91e92f4.tar.gz",
"url_template": "https://source.jfdic.org/jfdic/hakyll-skeleton/archive/edd1e1bd083f3ad59572b35fd783865ec91e92f4.tar.gz"
},
"jfdic-web": { "jfdic-web": {
"sha256": "0qq4ww89isivyllqs15cg21f4g9fhy3zpiywxash2hk5dg6klx50", "sha256": "0qq4ww89isivyllqs15cg21f4g9fhy3zpiywxash2hk5dg6klx50",
"type": "tarball", "type": "tarball",

View file

@ -0,0 +1,42 @@
# NixOps configuration for deploying the JFDIC website
{ config, pkgs, ... }:
let
sources = import ../nix/sources.nix;
hakyll-skeleton = import sources.hakyll-skeleton { };
webdomain = "skeleton.jfdic.org";
in {
environment.sessionVariables = {
LOCALE_ARCHIVE = "/run/current-system/sw/lib/locale/locale-archive";
};
services.nginx = {
enable = true; # Enable Nginx
recommendedGzipSettings = true;
recommendedOptimisation = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
virtualHosts = {
"${webdomain}" = { # website hostname
enableACME = true; # Use ACME certs
forceSSL = true; # Force SSL
root = "${hakyll-skeleton}"; # Wesbite root
};
"www.${webdomain}" = { # Respect our elders :-)
locations."/".extraConfig =
"return 301 $scheme://${webdomain}$request_uri;";
};
};
};
security.acme = {
acceptTerms = true;
certs = { "${webdomain}" = { email = "admin@${webdomain}"; }; };
};
networking.firewall.allowedTCPPorts = [ 80 443 ];
}