40 lines
1.3 KiB
Nix
40 lines
1.3 KiB
Nix
{ config, pkgs, ... }:
|
|
{
|
|
services.nginx = {
|
|
|
|
additionalModules = [ pkgs.nginxModules.pam ];
|
|
enable = true;
|
|
recommendedProxySettings = true;
|
|
recommendedGzipSettings = true;
|
|
recommendedOptimisation = true;
|
|
recommendedTlsSettings = true;
|
|
|
|
# appendHttpConfig = ''
|
|
# map $remote_addr $remote_addr_anon {
|
|
# ~(?P<ip>\d+\.\d+\.\d+)\. $ip.0;
|
|
# ~(?P<ip>[^:]+:[^:]+): $ip::;
|
|
# # IP addresses to not anonymize
|
|
# 127.0.0.1 $remote_addr;
|
|
# ::1 $remote_addr;
|
|
# default 0.0.0.0;
|
|
# }
|
|
# log_format anon_ip '$remote_addr_anon - $remote_user [$time_local] "$request" '
|
|
# '$status $body_bytes_sent "$http_referer" '
|
|
# '"$http_user_agent" "$http_x_forwarded_for"';
|
|
|
|
# access_log /var/log/nginx/access.log anon_ip;
|
|
# '';
|
|
};
|
|
security.acme = {
|
|
acceptTerms = true;
|
|
defaults = {
|
|
#server = "https://acme-staging-v02.api.letsencrypt.org/directory";
|
|
email = "root@${config.networking.domain}";
|
|
};
|
|
};
|
|
security.pam.services.nginx.text = ''
|
|
auth required ${pkgs.nss_pam_ldapd}/lib/security/pam_ldap.so
|
|
account required ${pkgs.nss_pam_ldapd}/lib/security/pam_ldap.so
|
|
'';
|
|
}
|