chore: comment out anubis

This commit is contained in:
Ahwx 2025-12-31 01:35:01 +01:00
parent 2c2e1544c5
commit 7671014026
7 changed files with 69 additions and 57 deletions

View file

@ -1,12 +1,12 @@
{ config, lib, ... }:
{
users.users.nginx.extraGroups = [ config.users.groups.anubis.name ];
services.anubis = {
defaultOptions = {
enable = true;
settings = {
SERVE_ROBOTS_TXT = true;
};
};
};
# users.users.nginx.extraGroups = [ config.users.groups.anubis.name ];
#services.anubis = {
# defaultOptions = {
# enable = true;
# settings = {
# SERVE_ROBOTS_TXT = true;
# };
# };
#};
}

View file

@ -32,19 +32,20 @@
};
};
};
anubis.instances.atticd = {
settings = {
TARGET = "http://localhost:8060";
BIND = ":8061";
BIND_NETWORK = "tcp";
};
};
#anubis.instances.atticd = {
# settings = {
# TARGET = "http://localhost:8060";
# BIND = "/run/anubis/anubis-atticd/anubis.sock";
# METRICS_BIND = "/run/anubis/anubis-atticd/anubis.sock";
# };
#};
nginx.virtualHosts."cache.liv.town" = {
forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = {
proxyPass = "http://localhost${toString config.services.anubis.instances.atticd.settings.BIND}";
# proxyPass = "http://unix:${toString config.services.anubis.instances.atticd.settings.BIND}";
proxyPass = "http://localhost:8060";
proxyWebsockets = true;
};
};

View file

@ -1,19 +1,23 @@
{ config, ... }:
let
target = "http://localhost:8081";
in
{
services = {
anubis.instances.binternet = {
settings = {
TARGET = "http://localhost:8081";
BIND = ":8082";
BIND_NETWORK = "tcp";
};
};
#anubis.instances.binternet = {
# settings = {
# TARGET = target;
# BIND = "/run/anubis/anubis-binternet/anubis.sock";
# METRICS_BIND = "/run/anubis/anubis-binternet/anubis.sock";
# };
#};
nginx.virtualHosts."curate.liv.town" = {
forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = {
proxyPass = "http://localhost${toString config.services.anubis.instances.binternet.settings.BIND}";
# proxyPass = "http://unix:${toString config.services.anubis.instances.binternet.settings.BIND}";
proxyPass = target;
proxyWebsockets = true;
};
};

View file

@ -68,19 +68,20 @@ in
# };
# };
# };
anubis.instances.forgejo = {
settings = {
TARGET = "http://localhost:3050";
BIND = ":3051";
BIND_NETWORK = "tcp";
};
};
#anubis.instances.forgejo = {
# settings = {
# TARGET = "http://localhost:3050";
# BIND = "/run/anubis/anubis-forgejo/anubis.sock";
# METRICS_BIND = "/run/anubis/anubis-forgejo/anubis.sock";
# };
#};
nginx.virtualHosts."code.liv.town" = {
forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = {
proxyPass = "http://localhost${toString config.services.anubis.instances.forgejo.settings.BIND}";
# proxyPass = "http://unix:${toString config.services.anubis.instances.forgejo.settings.BIND}";
proxyPass = "http://localhost:3050";
proxyWebsockets = true;
};
};

View file

@ -17,19 +17,20 @@
guacd-hostname = "localhost";
};
};
anubis.instances.guacamole = {
settings = {
TARGET = "http://localhost:4822";
BIND = ":4883";
BIND_NETWORK = "tcp";
};
};
#anubis.instances.guacamole = {
# settings = {
# TARGET = "http://localhost:4822";
# BIND = "/run/anubis/anubis-guacamole/anubis.sock";
# METRICS_BIND = "/run/anubis/anubis-guacamole/anubis.sock";
# };
#};
nginx.virtualHosts."remote.liv.town" = {
forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = {
proxyPass = "http://localhost${toString config.services.anubis.instances.guacamole.settings.BIND}";
# proxyPass = "http://unix:${toString config.services.anubis.instances.guacamole.settings.BIND}";
proxyPass = "http://${toString config.services.guacamole-server.host}:${toString config.services.guacamole-server.port}";
proxyWebsockets = true;
};
};

View file

@ -1,19 +1,23 @@
{ config, ... }:
let
target = "http://localhost:8078";
in
{
services = {
anubis.instances.librey = {
settings = {
TARGET = "http://localhost:8078";
BIND = ":8079";
BIND_NETWORK = "tcp";
};
};
#anubis.instances.librey = {
# settings = {
# TARGET = target;
# BIND = "/run/anubis/anubis-librey/anubis.sock";
# METRICS_BIND = "/run/anubis/anubis-librey/anubis.sock";
# };
#};
nginx.virtualHosts."search.liv.town" = {
forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = {
proxyPass = "http://localhost${toString config.services.anubis.instances.librey.settings.BIND}";
# proxyPass = "http://unix:${toString config.services.anubis.instances.librey.settings.BIND}";
proxyPass = target;
proxyWebsockets = true;
};
};

View file

@ -5,19 +5,20 @@
enable = true;
settings.PORT = "4800";
};
anubis.instances.uptime-kuma = {
settings = {
TARGET = "http://localhost:4800";
BIND = ":4801";
BIND_NETWORK = "tcp";
};
};
#anubis.instances.uptime-kuma = {
# settings = {
# TARGET = "http://localhost:4800";
# BIND = "/run/anubis/anubis-uptime-kuma/anubis.sock";
# METRICS_BIND = "/run/anubis/anubis-uptime-kuma/anubis.sock";
# };
#};
nginx.virtualHosts."uptime.liv.town" = {
forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = {
proxyPass = "http://localhost${toString config.services.anubis.instances.uptime-kuma.settings.BIND}";
# proxyPass = "http://unix:${toString config.services.anubis.instances.uptime-kuma.settings.BIND}";
proxyPass = "http://localhost:4800";
proxyWebsockets = true;
};
};