flake/modules/services/caddy.nix
2025-04-13 16:05:46 +03:00

78 lines
2 KiB
Nix

{
pkgs,
lib,
config,
...
}: {
options = {
myModules.enableCaddy = lib.mkOption {
type = lib.types.bool;
default = false;
description = "Enable Caddy server";
};
};
config = lib.mkMerge [
(lib.mkIf config.myModules.enableCaddy {
services.caddy = {
enable = true;
package = pkgs.caddy.withPlugins {
# update time to time
# last update: 2025-03-02
plugins = ["github.com/caddy-dns/cloudflare@v0.0.0-20250228175314-1fb64108d4de"];
hash = "sha256-YYpsf8HMONR1teMiSymo2y+HrKoxuJMKIea5/NEykGc=";
};
email = "contact@osbm.dev";
extraConfig = ''
(cloudflare) {
tls {
dns cloudflare {env.CF_API_TOKEN}
}
}
'';
# globalConfig = ''
# acme_dns cloudflare {env.CF_API_TOKEN}
# '';
virtualHosts = {
"chat.osbm.dev" = {
extraConfig = ''
reverse_proxy ymir.curl-boga.ts.net:3000
import cloudflare
'';
};
"aifred.osbm.dev" = {
extraConfig = ''
reverse_proxy ymir.curl-boga.ts.net:8000
import cloudflare
'';
};
"git.osbm.dev" = {
serverAliases = [
"www.git.osbm.dev"
];
extraConfig = ''
reverse_proxy pochita.curl-boga.ts.net:${toString config.services.forgejo.settings.server.HTTP_PORT}
import cloudflare
'';
};
};
};
networking.firewall.allowedTCPPorts = [80 443 3000];
environment.systemPackages = with pkgs; [
nssTools
];
age.secrets.cloudflare = {
file = ../../secrets/cloudflare.age;
path = "/etc/caddy/.env";
owner = "caddy";
mode = "0600";
};
systemd.services.caddy.serviceConfig = {
EnvironmentFile = "/etc/caddy/.env";
};
})
];
}