blob: 791a5a61d21bf6d5c908c6450abd27c94502486d (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
|
{
config,
lib,
...
}: let
cfg = config.services.headscale;
url = "mesh.${config.networking.domain}";
in {
networking.firewall.allowedUDPPorts = [3478];
services.headscale = {
enable = true;
port = 8001;
settings = {
server_url = "https://${url}:443";
derps = {
server = {
enabled = true;
stun_listen_addr = "0.0.0.0:3478";
};
urls = [];
};
dns.base_domain = "aristote.mesh";
};
};
services.nginx.virtualHosts.mesh = lib.mkIf cfg.enable {
serverName = "${url}";
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://${cfg.address}:${toString cfg.port}";
proxyWebsockets = true;
extraConfig = ''
proxy_set_header Host $server_name;
proxy_redirect http:// https://;
proxy_buffering off;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
add_header Strict-Transport-Security "max-age=15552000; includeSubDomains" always;
'';
};
};
}
|