115 lines
3 KiB
Nix
115 lines
3 KiB
Nix
{ config, depot, lib, ... }:
|
|
with depot.lib.nginx;
|
|
let
|
|
inherit (depot.lib.meta) domain;
|
|
gw = config.links.ipfsGateway;
|
|
cfg = config.services.ipfs;
|
|
metrics = config.links.ipfsMetrics;
|
|
in
|
|
{
|
|
users.users.nginx.extraGroups = [ cfg.group ];
|
|
|
|
links.ipfsMetrics = {
|
|
protocol = "http";
|
|
path = "/debug/metrics/prometheus";
|
|
};
|
|
|
|
services.nginx.virtualHosts = {
|
|
"top-level.${domain}".locations = {
|
|
"~ ^/ip[fn]s" = {
|
|
proxyPass = gw.url;
|
|
extraConfig = ''
|
|
add_header X-Content-Type-Options "";
|
|
add_header Access-Control-Allow-Origin *;
|
|
'';
|
|
};
|
|
};
|
|
ipfs-metrics = {
|
|
serverName = null;
|
|
listen = lib.singleton {
|
|
addr = metrics.ipv4;
|
|
inherit (metrics) port;
|
|
};
|
|
extraConfig = "access_log off;";
|
|
locations."/".return = "204";
|
|
locations."${metrics.path}".proxyPass = "http://unix:/run/ipfs/ipfs-api.sock:";
|
|
};
|
|
"p2p.${domain}" = vhosts.basic // {
|
|
locations."/".return = "204";
|
|
locations."/routing" = {
|
|
proxyPass = gw.url;
|
|
extraConfig = ''
|
|
add_header X-Content-Type-Options "";
|
|
add_header Access-Control-Allow-Origin *;
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
security.acme.certs."ipfs.${domain}" = {
|
|
domain = "*.ipfs.${domain}";
|
|
extraDomainNames = [ "*.ipns.${domain}" ];
|
|
dnsProvider = "pdns";
|
|
group = "nginx";
|
|
};
|
|
|
|
security.acme.certs."p2p.${domain}" = {
|
|
dnsProvider = "pdns";
|
|
webroot = lib.mkForce null;
|
|
};
|
|
|
|
services.nginx.virtualHosts."ipfs.${domain}" = vhosts.basic // {
|
|
serverName = "~^(.+)\.(ip[fn]s)\.${domain}$";
|
|
enableACME = false;
|
|
useACMEHost = "ipfs.${domain}";
|
|
locations = {
|
|
"/" = {
|
|
proxyPass = gw.url;
|
|
extraConfig = ''
|
|
add_header X-Content-Type-Options "";
|
|
add_header Access-Control-Allow-Origin *;
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
services.ipfs.extraConfig.Gateway.PublicGateways = {
|
|
"${domain}" = {
|
|
Paths = [ "/ipfs" "/ipns" ];
|
|
NoDNSLink = false;
|
|
UseSubdomains = true;
|
|
};
|
|
"p2p.${domain}" = {
|
|
Paths = [ "/routing" ];
|
|
NoDNSLink = true;
|
|
UseSubdomains = false;
|
|
};
|
|
};
|
|
|
|
consul.services.ipfs-gateway = {
|
|
mode = "external";
|
|
unit = "ipfs";
|
|
definition = rec {
|
|
name = "ipfs-gateway";
|
|
address = depot.reflection.interfaces.primary.addrPublic;
|
|
port = 443;
|
|
checks = [
|
|
rec {
|
|
name = "Frontend";
|
|
id = "service:ipfs-gateway:frontend";
|
|
interval = "60s";
|
|
http = "https://${address}/";
|
|
tls_server_name = "bafybeiczsscdsbs7ffqz55asqdf3smv6klcw3gofszvwlyarci47bgf354.ipfs.${domain}"; # empty directory
|
|
header.Host = lib.singleton tls_server_name;
|
|
method = "HEAD";
|
|
}
|
|
{
|
|
name = "IPFS Node";
|
|
id = "service:ipfs-gateway:ipfs";
|
|
interval = "60s";
|
|
http = "${gw.url}/ipfs/QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn/"; # empty directory
|
|
method = "HEAD";
|
|
}
|
|
];
|
|
};
|
|
};
|
|
}
|