nixpkgs/nixos/modules/services/web-servers/nginx/vhost-options.nix

229 lines
6.9 KiB
Nix
Raw Normal View History

2016-01-24 15:50:54 +00:00
# This file defines the options that can be used both for the Apache
# main server configuration, and for the virtual hosts. (The latter
# has additional options that affect the web server as a whole, like
# the user/group to run under.)
{ lib, ... }:
2016-01-24 15:50:54 +00:00
with lib;
{
options = {
serverName = mkOption {
type = types.nullOr types.str;
default = null;
description = ''
Name of this virtual host. Defaults to attribute name in virtualHosts.
'';
example = "example.org";
};
2016-01-24 15:50:54 +00:00
serverAliases = mkOption {
type = types.listOf types.str;
default = [];
example = ["www.example.org" "example.org"];
description = ''
Additional names of virtual hosts served by this virtual host configuration.
'';
};
listen = mkOption {
2017-07-16 17:20:27 +01:00
type = with types; listOf (submodule { options = {
addr = mkOption { type = str; description = "IP address."; };
port = mkOption { type = int; description = "Port number."; default = 80; };
ssl = mkOption { type = bool; description = "Enable SSL."; default = false; };
extraParameters = mkOption { type = listOf str; description = "Extra parameters of this listen directive."; default = []; example = [ "reuseport" "deferred" ]; };
2017-07-16 17:20:27 +01:00
}; });
default = [];
example = [
2017-07-16 17:20:27 +01:00
{ addr = "195.154.1.1"; port = 443; ssl = true;}
{ addr = "192.154.1.1"; port = 80; }
];
2016-01-24 15:50:54 +00:00
description = ''
Listen addresses and ports for this virtual host.
IPv6 addresses must be enclosed in square brackets.
2017-07-16 17:20:27 +01:00
Note: this option overrides <literal>addSSL</literal>
and <literal>onlySSL</literal>.
2016-01-24 15:50:54 +00:00
'';
};
enableACME = mkOption {
type = types.bool;
default = false;
description = ''
Whether to ask Let's Encrypt to sign a certificate for this vhost.
Alternately, you can use an existing certificate through <option>useACMEHost</option>.
'';
};
useACMEHost = mkOption {
type = types.nullOr types.str;
default = null;
description = ''
A host of an existing Let's Encrypt certificate to use.
This is useful if you have many subdomains and want to avoid hitting the
<link xlink:href="https://letsencrypt.org/docs/rate-limits/">rate limit</link>.
Alternately, you can generate a certificate through <option>enableACME</option>.
<emphasis>Note that this option does not create any certificates, nor it does add subdomains to existing ones you will need to create them manually using <xref linkend="opt-security.acme.certs"/>.</emphasis>
'';
};
acmeRoot = mkOption {
type = types.str;
default = "/var/lib/acme/acme-challenge";
2018-12-11 11:02:56 +00:00
description = "Directory for the acme challenge which is PUBLIC, don't put certs or keys in here";
};
acmeFallbackHost = mkOption {
type = types.nullOr types.str;
default = null;
description = ''
Host which to proxy requests to if acme challenge is not found. Useful
if you want multiple hosts to be able to verify the same domain name.
'';
};
2017-07-16 17:20:27 +01:00
addSSL = mkOption {
type = types.bool;
default = false;
description = ''
Whether to enable HTTPS in addition to plain HTTP. This will set defaults for
<literal>listen</literal> to listen on all interfaces on the respective default
ports (80, 443).
'';
};
onlySSL = mkOption {
type = types.bool;
default = false;
description = ''
Whether to enable HTTPS and reject plain HTTP connections. This will set
defaults for <literal>listen</literal> to listen on all interfaces on port 443.
'';
};
2016-01-24 15:50:54 +00:00
enableSSL = mkOption {
type = types.bool;
2017-07-16 17:20:27 +01:00
visible = false;
2016-01-24 15:50:54 +00:00
default = false;
};
forceSSL = mkOption {
type = types.bool;
default = false;
2017-07-16 17:20:27 +01:00
description = ''
Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS. This will set defaults for
<literal>listen</literal> to listen on all interfaces on the respective default
ports (80, 443), where the non-SSL listens are used for the redirect vhosts.
2017-07-16 17:20:27 +01:00
'';
2016-01-24 15:50:54 +00:00
};
sslCertificate = mkOption {
type = types.path;
example = "/var/host.cert";
description = "Path to server SSL certificate.";
};
sslCertificateKey = mkOption {
2016-01-24 15:50:54 +00:00
type = types.path;
example = "/var/host.key";
description = "Path to server SSL certificate key.";
};
sslTrustedCertificate = mkOption {
type = types.nullOr types.path;
default = null;
example = "/var/root.cert";
description = "Path to root SSL certificate for stapling and client certificates.";
};
http2 = mkOption {
type = types.bool;
default = true;
description = ''
Whether to enable HTTP 2.
Note that (as of writing) due to nginx's implementation, to disable
HTTP 2 you have to disable it on all vhosts that use a given
IP address / port.
If there is one server block configured to enable http2,then it is
enabled for all server blocks on this IP.
See https://stackoverflow.com/a/39466948/263061.
'';
};
2016-01-24 15:50:54 +00:00
root = mkOption {
type = types.nullOr types.path;
default = null;
example = "/data/webserver/docs";
description = ''
The path of the web root directory.
'';
};
default = mkOption {
type = types.bool;
default = false;
description = ''
Makes this vhost the default.
'';
};
2016-01-24 15:50:54 +00:00
extraConfig = mkOption {
type = types.lines;
default = "";
description = ''
These lines go to the end of the vhost verbatim.
'';
};
globalRedirect = mkOption {
type = types.nullOr types.str;
default = null;
example = "newserver.example.org";
2016-01-24 15:50:54 +00:00
description = ''
If set, all requests for this host are redirected permanently to
the given hostname.
2016-01-24 15:50:54 +00:00
'';
};
basicAuth = mkOption {
type = types.attrsOf types.str;
default = {};
2016-05-09 15:46:44 +01:00
example = literalExample ''
{
user = "password";
};
'';
description = ''
Basic Auth protection for a vhost.
WARNING: This is implemented to store the password in plain text in the
nix store.
'';
2016-01-24 15:50:54 +00:00
};
basicAuthFile = mkOption {
type = types.nullOr types.path;
default = null;
description = ''
Basic Auth password file for a vhost.
'';
};
2016-01-24 15:50:54 +00:00
locations = mkOption {
type = types.attrsOf (types.submodule (import ./location-options.nix {
inherit lib;
}));
default = {};
2016-05-09 15:46:44 +01:00
example = literalExample ''
{
"/" = {
proxyPass = "http://localhost:3000";
};
};
2016-01-24 15:50:54 +00:00
'';
2016-05-09 15:46:44 +01:00
description = "Declarative location config";
2016-01-24 15:50:54 +00:00
};
};
}