mirror of
https://github.com/Ahwxorg/nixos-config.git
synced 2026-02-22 12:55:13 +08:00
chore: comment out anubis
This commit is contained in:
parent
2c2e1544c5
commit
7671014026
7 changed files with 69 additions and 57 deletions
|
|
@ -1,12 +1,12 @@
|
|||
{ config, lib, ... }:
|
||||
{
|
||||
users.users.nginx.extraGroups = [ config.users.groups.anubis.name ];
|
||||
services.anubis = {
|
||||
defaultOptions = {
|
||||
enable = true;
|
||||
settings = {
|
||||
SERVE_ROBOTS_TXT = true;
|
||||
};
|
||||
};
|
||||
};
|
||||
# users.users.nginx.extraGroups = [ config.users.groups.anubis.name ];
|
||||
#services.anubis = {
|
||||
# defaultOptions = {
|
||||
# enable = true;
|
||||
# settings = {
|
||||
# SERVE_ROBOTS_TXT = true;
|
||||
# };
|
||||
# };
|
||||
#};
|
||||
}
|
||||
|
|
|
|||
|
|
@ -32,19 +32,20 @@
|
|||
};
|
||||
};
|
||||
};
|
||||
anubis.instances.atticd = {
|
||||
settings = {
|
||||
TARGET = "http://localhost:8060";
|
||||
BIND = ":8061";
|
||||
BIND_NETWORK = "tcp";
|
||||
};
|
||||
};
|
||||
#anubis.instances.atticd = {
|
||||
# settings = {
|
||||
# TARGET = "http://localhost:8060";
|
||||
# BIND = "/run/anubis/anubis-atticd/anubis.sock";
|
||||
# METRICS_BIND = "/run/anubis/anubis-atticd/anubis.sock";
|
||||
# };
|
||||
#};
|
||||
nginx.virtualHosts."cache.liv.town" = {
|
||||
forceSSL = true;
|
||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost${toString config.services.anubis.instances.atticd.settings.BIND}";
|
||||
# proxyPass = "http://unix:${toString config.services.anubis.instances.atticd.settings.BIND}";
|
||||
proxyPass = "http://localhost:8060";
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -1,19 +1,23 @@
|
|||
{ config, ... }:
|
||||
let
|
||||
target = "http://localhost:8081";
|
||||
in
|
||||
{
|
||||
services = {
|
||||
anubis.instances.binternet = {
|
||||
settings = {
|
||||
TARGET = "http://localhost:8081";
|
||||
BIND = ":8082";
|
||||
BIND_NETWORK = "tcp";
|
||||
};
|
||||
};
|
||||
#anubis.instances.binternet = {
|
||||
# settings = {
|
||||
# TARGET = target;
|
||||
# BIND = "/run/anubis/anubis-binternet/anubis.sock";
|
||||
# METRICS_BIND = "/run/anubis/anubis-binternet/anubis.sock";
|
||||
# };
|
||||
#};
|
||||
nginx.virtualHosts."curate.liv.town" = {
|
||||
forceSSL = true;
|
||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost${toString config.services.anubis.instances.binternet.settings.BIND}";
|
||||
# proxyPass = "http://unix:${toString config.services.anubis.instances.binternet.settings.BIND}";
|
||||
proxyPass = target;
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -68,19 +68,20 @@ in
|
|||
# };
|
||||
# };
|
||||
# };
|
||||
anubis.instances.forgejo = {
|
||||
settings = {
|
||||
TARGET = "http://localhost:3050";
|
||||
BIND = ":3051";
|
||||
BIND_NETWORK = "tcp";
|
||||
};
|
||||
};
|
||||
#anubis.instances.forgejo = {
|
||||
# settings = {
|
||||
# TARGET = "http://localhost:3050";
|
||||
# BIND = "/run/anubis/anubis-forgejo/anubis.sock";
|
||||
# METRICS_BIND = "/run/anubis/anubis-forgejo/anubis.sock";
|
||||
# };
|
||||
#};
|
||||
nginx.virtualHosts."code.liv.town" = {
|
||||
forceSSL = true;
|
||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost${toString config.services.anubis.instances.forgejo.settings.BIND}";
|
||||
# proxyPass = "http://unix:${toString config.services.anubis.instances.forgejo.settings.BIND}";
|
||||
proxyPass = "http://localhost:3050";
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -17,19 +17,20 @@
|
|||
guacd-hostname = "localhost";
|
||||
};
|
||||
};
|
||||
anubis.instances.guacamole = {
|
||||
settings = {
|
||||
TARGET = "http://localhost:4822";
|
||||
BIND = ":4883";
|
||||
BIND_NETWORK = "tcp";
|
||||
};
|
||||
};
|
||||
#anubis.instances.guacamole = {
|
||||
# settings = {
|
||||
# TARGET = "http://localhost:4822";
|
||||
# BIND = "/run/anubis/anubis-guacamole/anubis.sock";
|
||||
# METRICS_BIND = "/run/anubis/anubis-guacamole/anubis.sock";
|
||||
# };
|
||||
#};
|
||||
nginx.virtualHosts."remote.liv.town" = {
|
||||
forceSSL = true;
|
||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost${toString config.services.anubis.instances.guacamole.settings.BIND}";
|
||||
# proxyPass = "http://unix:${toString config.services.anubis.instances.guacamole.settings.BIND}";
|
||||
proxyPass = "http://${toString config.services.guacamole-server.host}:${toString config.services.guacamole-server.port}";
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -1,19 +1,23 @@
|
|||
{ config, ... }:
|
||||
let
|
||||
target = "http://localhost:8078";
|
||||
in
|
||||
{
|
||||
services = {
|
||||
anubis.instances.librey = {
|
||||
settings = {
|
||||
TARGET = "http://localhost:8078";
|
||||
BIND = ":8079";
|
||||
BIND_NETWORK = "tcp";
|
||||
};
|
||||
};
|
||||
#anubis.instances.librey = {
|
||||
# settings = {
|
||||
# TARGET = target;
|
||||
# BIND = "/run/anubis/anubis-librey/anubis.sock";
|
||||
# METRICS_BIND = "/run/anubis/anubis-librey/anubis.sock";
|
||||
# };
|
||||
#};
|
||||
nginx.virtualHosts."search.liv.town" = {
|
||||
forceSSL = true;
|
||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost${toString config.services.anubis.instances.librey.settings.BIND}";
|
||||
# proxyPass = "http://unix:${toString config.services.anubis.instances.librey.settings.BIND}";
|
||||
proxyPass = target;
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -5,19 +5,20 @@
|
|||
enable = true;
|
||||
settings.PORT = "4800";
|
||||
};
|
||||
anubis.instances.uptime-kuma = {
|
||||
settings = {
|
||||
TARGET = "http://localhost:4800";
|
||||
BIND = ":4801";
|
||||
BIND_NETWORK = "tcp";
|
||||
};
|
||||
};
|
||||
#anubis.instances.uptime-kuma = {
|
||||
# settings = {
|
||||
# TARGET = "http://localhost:4800";
|
||||
# BIND = "/run/anubis/anubis-uptime-kuma/anubis.sock";
|
||||
# METRICS_BIND = "/run/anubis/anubis-uptime-kuma/anubis.sock";
|
||||
# };
|
||||
#};
|
||||
nginx.virtualHosts."uptime.liv.town" = {
|
||||
forceSSL = true;
|
||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost${toString config.services.anubis.instances.uptime-kuma.settings.BIND}";
|
||||
# proxyPass = "http://unix:${toString config.services.anubis.instances.uptime-kuma.settings.BIND}";
|
||||
proxyPass = "http://localhost:4800";
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
};
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue