sail: Move more hosts away from CF
This commit is contained in:
parent
2ba78483db
commit
779371ac42
7 changed files with 25 additions and 65 deletions
|
@ -1,4 +1,4 @@
|
||||||
{ config, ... }:
|
{ config, secret, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
virtualisation.arion.projects.proxitok.settings = {
|
virtualisation.arion.projects.proxitok.settings = {
|
||||||
|
@ -38,24 +38,12 @@
|
||||||
];
|
];
|
||||||
|
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
enable = true;
|
virtualHosts."tictac.daniel.sx" = {
|
||||||
recommendedOptimisation = true;
|
forceSSL = true;
|
||||||
recommendedGzipSettings = true;
|
useACMEHost = "daniel.sx";
|
||||||
recommendedBrotliSettings = true;
|
basicAuthFile = config.age.secrets.proxitok-auth.path;
|
||||||
|
|
||||||
virtualHosts."proxitok.only.internal" = {
|
|
||||||
listen = [
|
|
||||||
{
|
|
||||||
addr = "127.0.0.1";
|
|
||||||
port = 80;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
|
|
||||||
forceSSL = false;
|
|
||||||
enableACME = false;
|
|
||||||
|
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
basicAuthFile = config.age.secrets.proxitok-auth.path;
|
|
||||||
recommendedProxySettings = true;
|
recommendedProxySettings = true;
|
||||||
proxyPass = "http://127.0.0.1:8005";
|
proxyPass = "http://127.0.0.1:8005";
|
||||||
};
|
};
|
||||||
|
|
Binary file not shown.
|
@ -29,7 +29,7 @@ in
|
||||||
|
|
||||||
(import ../nixos/mastodon.nix (args // { inherit secret; }))
|
(import ../nixos/mastodon.nix (args // { inherit secret; }))
|
||||||
|
|
||||||
../nixos/nitter.nix
|
(import ../nixos/nitter.nix (args // { inherit secret; }))
|
||||||
|
|
||||||
(import ../nixos/ntfy-sh.nix (args // { inherit secret; }))
|
(import ../nixos/ntfy-sh.nix (args // { inherit secret; }))
|
||||||
|
|
||||||
|
|
|
@ -39,23 +39,10 @@ in
|
||||||
};
|
};
|
||||||
|
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
enable = true;
|
virtualHosts."overflow.daniel.sx" = {
|
||||||
recommendedOptimisation = true;
|
|
||||||
recommendedGzipSettings = true;
|
|
||||||
recommendedBrotliSettings = true;
|
|
||||||
|
|
||||||
virtualHosts."anonymous-overflow.only.internal" = {
|
|
||||||
listen = [
|
|
||||||
{
|
|
||||||
addr = "127.0.0.1";
|
|
||||||
port = 80;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
|
|
||||||
root = "${anonymous-overflow-pkg}/share/anonymous-overflow/public/";
|
root = "${anonymous-overflow-pkg}/share/anonymous-overflow/public/";
|
||||||
forceSSL = false;
|
forceSSL = true;
|
||||||
enableACME = false;
|
useACMEHost = "daniel.sx";
|
||||||
|
|
||||||
basicAuthFile = config.age.secrets.anonymous-overflow-auth.path;
|
basicAuthFile = config.age.secrets.anonymous-overflow-auth.path;
|
||||||
|
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
|
|
|
@ -6,4 +6,13 @@
|
||||||
recommendedBrotliSettings = true;
|
recommendedBrotliSettings = true;
|
||||||
recommendedTlsSettings = true;
|
recommendedTlsSettings = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
networking.firewall.interfaces =
|
||||||
|
let
|
||||||
|
nginxTCPPorts = [ 80 443 ];
|
||||||
|
in
|
||||||
|
{
|
||||||
|
"enp1s0".allowedTCPPorts = nginxTCPPorts;
|
||||||
|
"tailscale0".allowedTCPPorts = nginxTCPPorts;
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{ pkgs, config, ... }:
|
{ pkgs, config, secret, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
nitter-pkg = pkgs.nitter-unstable;
|
nitter-pkg = pkgs.nitter-unstable;
|
||||||
|
@ -52,22 +52,10 @@ in
|
||||||
};
|
};
|
||||||
|
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
enable = true;
|
virtualHosts."${secret.nginx.hostnames.nitter}" = {
|
||||||
recommendedOptimisation = true;
|
|
||||||
recommendedGzipSettings = true;
|
|
||||||
recommendedBrotliSettings = true;
|
|
||||||
|
|
||||||
virtualHosts."nitter.only.internal" = {
|
|
||||||
listen = [
|
|
||||||
{
|
|
||||||
addr = "127.0.0.1";
|
|
||||||
port = 80;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
|
|
||||||
root = "${nitter-pkg}/share/nitter/public/";
|
root = "${nitter-pkg}/share/nitter/public/";
|
||||||
forceSSL = false;
|
forceSSL = true;
|
||||||
enableACME = false;
|
useACMEHost = "daniel.sx";
|
||||||
|
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
tryFiles = "$uri @proxy";
|
tryFiles = "$uri @proxy";
|
||||||
|
|
|
@ -41,21 +41,9 @@ in
|
||||||
};
|
};
|
||||||
|
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
enable = true;
|
virtualHosts."ringo.daniel.sx" = {
|
||||||
recommendedOptimisation = true;
|
forceSSL = true;
|
||||||
recommendedGzipSettings = true;
|
useACMEHost = "daniel.sx";
|
||||||
recommendedBrotliSettings = true;
|
|
||||||
|
|
||||||
virtualHosts."rimgo.only.internal" = {
|
|
||||||
listen = [
|
|
||||||
{
|
|
||||||
addr = "127.0.0.1";
|
|
||||||
port = 80;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
|
|
||||||
forceSSL = false;
|
|
||||||
enableACME = false;
|
|
||||||
basicAuthFile = config.age.secrets.rimgo-auth.path;
|
basicAuthFile = config.age.secrets.rimgo-auth.path;
|
||||||
|
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
|
|
Loading…
Reference in a new issue