depot/cluster/services/ipfs/gateway.nix

116 lines
3 KiB
Nix
Raw Normal View History

2023-08-31 01:55:45 +03:00
{ config, depot, lib, ... }:
with depot.lib.nginx;
2021-10-16 20:36:25 +03:00
let
2023-08-31 01:55:45 +03:00
inherit (depot.lib.meta) domain;
2022-06-18 03:44:51 +03:00
gw = config.links.ipfsGateway;
cfg = config.services.ipfs;
metrics = config.links.ipfsMetrics;
2021-10-16 20:36:25 +03:00
in
{
users.users.nginx.extraGroups = [ cfg.group ];
links.ipfsMetrics = {
protocol = "http";
path = "/debug/metrics/prometheus";
};
2021-10-16 20:36:25 +03:00
services.nginx.virtualHosts = {
"top-level.${domain}".locations = {
"~ ^/ip[fn]s" = {
2022-06-18 03:44:51 +03:00
proxyPass = gw.url;
2021-10-16 20:36:25 +03:00
extraConfig = ''
add_header X-Content-Type-Options "";
add_header Access-Control-Allow-Origin *;
'';
};
};
ipfs-metrics = {
serverName = null;
listen = lib.singleton {
addr = metrics.ipv4;
inherit (metrics) port;
2022-05-16 01:10:58 +03:00
};
extraConfig = "access_log off;";
locations."/".return = "204";
locations."${metrics.path}".proxyPass = "http://unix:/run/ipfs/ipfs-api.sock:";
2021-10-16 20:36:25 +03:00
};
"p2p.${domain}" = vhosts.basic // {
locations."/".return = "204";
locations."/routing" = {
proxyPass = gw.url;
extraConfig = ''
add_header X-Content-Type-Options "";
add_header Access-Control-Allow-Origin *;
'';
};
};
2021-10-16 20:36:25 +03:00
};
security.acme.certs."ipfs.${domain}" = {
domain = "*.ipfs.${domain}";
extraDomainNames = [ "*.ipns.${domain}" ];
2022-08-07 22:06:17 +03:00
dnsProvider = "pdns";
group = "nginx";
};
security.acme.certs."p2p.${domain}" = {
dnsProvider = "pdns";
webroot = lib.mkForce null;
};
services.nginx.virtualHosts."ipfs.${domain}" = vhosts.basic // {
serverName = "~^(.+)\.(ip[fn]s)\.${domain}$";
enableACME = false;
useACMEHost = "ipfs.${domain}";
locations = {
"/" = {
2022-06-18 03:44:51 +03:00
proxyPass = gw.url;
extraConfig = ''
add_header X-Content-Type-Options "";
add_header Access-Control-Allow-Origin *;
'';
};
};
};
services.ipfs.extraConfig.Gateway.PublicGateways = {
"${domain}" = {
Paths = [ "/ipfs" "/ipns" ];
NoDNSLink = false;
UseSubdomains = true;
};
"p2p.${domain}" = {
Paths = [ "/routing" ];
NoDNSLink = true;
UseSubdomains = false;
};
};
consul.services.ipfs-gateway = {
mode = "external";
unit = "ipfs";
definition = rec {
name = "ipfs-gateway";
address = depot.reflection.interfaces.primary.addrPublic;
port = 443;
checks = [
rec {
name = "Frontend";
id = "service:ipfs-gateway:frontend";
interval = "60s";
http = "https://${address}/";
tls_server_name = "bafybeiczsscdsbs7ffqz55asqdf3smv6klcw3gofszvwlyarci47bgf354.ipfs.${domain}"; # empty directory
header.Host = lib.singleton tls_server_name;
method = "HEAD";
}
{
name = "IPFS Node";
id = "service:ipfs-gateway:ipfs";
interval = "60s";
http = "${gw.url}/ipfs/QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn/"; # empty directory
method = "HEAD";
}
];
};
};
2021-10-16 20:36:25 +03:00
}