nix/container/proxy/host/Iot.nix

33 lines
1 KiB
Nix
Raw Normal View History

2024-06-25 04:04:39 +03:00
{ util, container, config, ... }: let
cfg = config.container.module.iot;
2024-06-09 23:35:53 +03:00
name = "iot";
in {
${cfg.domain} = container.mkServer {
extraConfig = util.trimTabs ''
listen 443 ssl;
set ''$${name} ${cfg.address}:${toString cfg.port};
location / {
2024-06-25 04:04:39 +03:00
allow ${config.container.localAccess};
allow ${config.container.module.status.address};
allow ${config.container.module.vpn.address};
2024-08-08 01:59:00 +03:00
allow ${config.container.module.zapret.address};
2024-06-09 23:35:53 +03:00
deny all;
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Host $host;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_pass http://''$${name}$request_uri;
}
2024-06-25 04:04:39 +03:00
ssl_certificate /etc/letsencrypt/live/${config.container.domain}/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/${config.container.domain}/privkey.pem;
2024-06-09 23:35:53 +03:00
include /etc/letsencrypt/conf/options-ssl-nginx.conf;
ssl_dhparam /etc/letsencrypt/conf/ssl-dhparams.pem;
'';
};
}