flake/modules/services/caddy.nix
2025-04-13 15:37:12 +03:00

73 lines
1.8 KiB
Nix

{
pkgs,
lib,
config,
...
}: {
options = {
myModules.enableCaddy = lib.mkOption {
type = lib.types.bool;
default = false;
description = "Enable Caddy server";
};
};
config = lib.mkMerge [
(lib.mkIf config.myModules.enableCaddy {
services.caddy = {
enable = true;
package = pkgs.caddy.withPlugins {
# update time to time
# last update: 2025-03-02
plugins = ["github.com/caddy-dns/cloudflare@v0.0.0-20250228175314-1fb64108d4de"];
hash = "sha256-YYpsf8HMONR1teMiSymo2y+HrKoxuJMKIea5/NEykGc=";
};
email = "contact@osbm.dev";
# extraConfig = ''
# (cloudflare) {
# tls {
# dns cloudflare {env.CLOUDFLARE_API_TOKEN}
# }
# }
# '';
virtualHosts = {
"chat.osbm.dev" = {
extraConfig = ''
reverse_proxy ymir.curl-boga.ts.net:3000
'';
};
"aifred.osbm.dev" = {
extraConfig = ''
reverse_proxy localhost:8000
'';
};
"git.osbm.dev" = {
serverAliases = [
"git.osbm.dev"
"www.git.osbm.dev"
];
extraConfig = ''
reverse_proxy pochita.curl-boga.ts.net:${toString config.services.forgejo.settings.server.HTTP_PORT}
'';
};
};
};
networking.firewall.allowedTCPPorts = [80 443 3000];
environment.systemPackages = with pkgs; [
nssTools
];
age.secrets.cloudflare = {
file = ../../secrets/cloudflare.age;
path = "/etc/caddy/.env";
owner = "caddy";
mode = "0600";
};
systemd.services.caddy.serviceConfig = {
EnvironmentFile = "/etc/caddy/.env";
};
})
];
}