1
0
Fork 0

sail: Move more hosts away from CF

This commit is contained in:
Daniel Kempkens 2023-03-06 09:55:28 +01:00
parent 2ba78483db
commit 779371ac42
Signed by: daniel
SSH key fingerprint: SHA256:Ks/MyhQYcPRQiwMKLAKquWCdCPe3JXlb1WttgnAoSeM
7 changed files with 25 additions and 65 deletions

View file

@ -1,4 +1,4 @@
{ config, ... }: { config, secret, ... }:
{ {
virtualisation.arion.projects.proxitok.settings = { virtualisation.arion.projects.proxitok.settings = {
@ -38,24 +38,12 @@
]; ];
services.nginx = { services.nginx = {
enable = true; virtualHosts."tictac.daniel.sx" = {
recommendedOptimisation = true; forceSSL = true;
recommendedGzipSettings = true; useACMEHost = "daniel.sx";
recommendedBrotliSettings = true; basicAuthFile = config.age.secrets.proxitok-auth.path;
virtualHosts."proxitok.only.internal" = {
listen = [
{
addr = "127.0.0.1";
port = 80;
}
];
forceSSL = false;
enableACME = false;
locations."/" = { locations."/" = {
basicAuthFile = config.age.secrets.proxitok-auth.path;
recommendedProxySettings = true; recommendedProxySettings = true;
proxyPass = "http://127.0.0.1:8005"; proxyPass = "http://127.0.0.1:8005";
}; };

Binary file not shown.

View file

@ -29,7 +29,7 @@ in
(import ../nixos/mastodon.nix (args // { inherit secret; })) (import ../nixos/mastodon.nix (args // { inherit secret; }))
../nixos/nitter.nix (import ../nixos/nitter.nix (args // { inherit secret; }))
(import ../nixos/ntfy-sh.nix (args // { inherit secret; })) (import ../nixos/ntfy-sh.nix (args // { inherit secret; }))

View file

@ -39,23 +39,10 @@ in
}; };
services.nginx = { services.nginx = {
enable = true; virtualHosts."overflow.daniel.sx" = {
recommendedOptimisation = true;
recommendedGzipSettings = true;
recommendedBrotliSettings = true;
virtualHosts."anonymous-overflow.only.internal" = {
listen = [
{
addr = "127.0.0.1";
port = 80;
}
];
root = "${anonymous-overflow-pkg}/share/anonymous-overflow/public/"; root = "${anonymous-overflow-pkg}/share/anonymous-overflow/public/";
forceSSL = false; forceSSL = true;
enableACME = false; useACMEHost = "daniel.sx";
basicAuthFile = config.age.secrets.anonymous-overflow-auth.path; basicAuthFile = config.age.secrets.anonymous-overflow-auth.path;
locations."/" = { locations."/" = {

View file

@ -6,4 +6,13 @@
recommendedBrotliSettings = true; recommendedBrotliSettings = true;
recommendedTlsSettings = true; recommendedTlsSettings = true;
}; };
networking.firewall.interfaces =
let
nginxTCPPorts = [ 80 443 ];
in
{
"enp1s0".allowedTCPPorts = nginxTCPPorts;
"tailscale0".allowedTCPPorts = nginxTCPPorts;
};
} }

View file

@ -1,4 +1,4 @@
{ pkgs, config, ... }: { pkgs, config, secret, ... }:
let let
nitter-pkg = pkgs.nitter-unstable; nitter-pkg = pkgs.nitter-unstable;
@ -52,22 +52,10 @@ in
}; };
services.nginx = { services.nginx = {
enable = true; virtualHosts."${secret.nginx.hostnames.nitter}" = {
recommendedOptimisation = true;
recommendedGzipSettings = true;
recommendedBrotliSettings = true;
virtualHosts."nitter.only.internal" = {
listen = [
{
addr = "127.0.0.1";
port = 80;
}
];
root = "${nitter-pkg}/share/nitter/public/"; root = "${nitter-pkg}/share/nitter/public/";
forceSSL = false; forceSSL = true;
enableACME = false; useACMEHost = "daniel.sx";
locations."/" = { locations."/" = {
tryFiles = "$uri @proxy"; tryFiles = "$uri @proxy";

View file

@ -41,21 +41,9 @@ in
}; };
services.nginx = { services.nginx = {
enable = true; virtualHosts."ringo.daniel.sx" = {
recommendedOptimisation = true; forceSSL = true;
recommendedGzipSettings = true; useACMEHost = "daniel.sx";
recommendedBrotliSettings = true;
virtualHosts."rimgo.only.internal" = {
listen = [
{
addr = "127.0.0.1";
port = 80;
}
];
forceSSL = false;
enableACME = false;
basicAuthFile = config.age.secrets.rimgo-auth.path; basicAuthFile = config.age.secrets.rimgo-auth.path;
locations."/" = { locations."/" = {