blob: c07a4fcd62bf729dd80a93bc868c158ddf69839e (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
|
{ config, lib, pkgs, ... }:
let
mpd_loc = (import ../data/aliases.nix).services.mpd;
mpdweb_loc = (import ../data/aliases.nix).services.mpdweb;
pjournal_loc = (import ../data/aliases.nix).services.pjournal;
in {
imports = [ ./orbekk-pkgs.nix ];
security.acme.acceptTerms = true;
security.acme.email = "kj@orbekk.com";
networking.firewall.allowedTCPPorts = [ 80 443 ];
# I'm storing web files in /home.
systemd.services.nginx.serviceConfig.ProtectHome = "read-only";
systemd.services.nginx.serviceConfig.ReadWritePaths = [
"/storage/srv/kj.orbekk.com/tmp/hls/"
"/storage/srv/kj.orbekk.com/dav/"
];
services.nginx = {
enable = true;
package = pkgs.nginxStable.override {
modules = with pkgs.nginxModules; [ dav rtmp ];
};
recommendedProxySettings = true;
appendHttpConfig = ''
# Extra mime types.
types {
text/plain org;
}
# This is a workaround to deal with closed connections on
# large downloads.
proxy_buffering off;
charset utf-8;
tcp_nopush on;
aio on;
directio 512;
'';
appendConfig = ''
rtmp {
server {
listen 1935;
allow publish 10.0.0.0/8;
deny publish all;
allow play all;
chunk_size 4906;
application live {
live on;
record off;
hls on;
hls_path /storage/srv/kj.orbekk.com/tmp/hls/;
hls_fragment 1s;
hls_playlist_length 2s;
}
}
}
'';
virtualHosts = let
template = {
enableACME = true;
forceSSL = true;
};
in {
"tommvo.com" = template // { root = "/storage/srv/tommvo.com"; };
"orbekk.no" = template // { root = "/storage/srv/orbekk.com"; };
"orbekk.com" = template // { root = "/storage/srv/orbekk.com"; };
"wifi.orbekk.com" = template // {
root = "/storage/srv/wifi.orbekk.com";
};
"wifi.orbekk.no" = template // { root = "/storage/srv/wifi.orbekk.com"; };
"kj.orbekk.com" = template // {
root = "/storage/srv/kj.orbekk.com";
extraConfig = ''
autoindex on;
'';
locations."/hls" = {
extraConfig = ''
default_type application/octet-stream;
# Disable cache
# add_header Cache-Control no-cache;
# CORS setup
add_header 'Access-Control-Allow-Origin' '*' always;
add_header 'Access-Control-Expose-Headers' 'Content-Length';
# allow CORS preflight requests
if ($request_method = 'OPTIONS') {
add_header 'Access-Control-Allow-Origin' '*';
add_header 'Access-Control-Max-Age' 1728000;
add_header 'Content-Type' 'text/plain charset=UTF-8';
add_header 'Content-Length' 0;
return 204;
}
types {
application/vnd.apple.mpegurl m3u8;
video/mp2t ts;
}
root /storage/srv/kj.orbekk.com/tmp/;
'';
};
locations."/dav" = {
root = "/storage/srv/kj.orbekk.com";
extraConfig = ''
auth_basic webdav;
dav_ext_methods PROPFIND OPTIONS;
# htpasswd -c /opt/secret/nginx-webdav.htpasswd
auth_basic_user_file "/opt/secret/nginx-webdav.htpasswd";
dav_methods put delete mkcol copy move;
dav_access user:rw group:rw all:rw;
create_full_put_path on;
autoindex on;
'';
};
};
"git.orbekk.com" = template // {
locations."/".proxyPass = "http://localhost:11103";
};
"nextcloud.orbekk.com" = template;
};
};
}
|