mirror of
https://github.com/Ahwxorg/nixos-config.git
synced 2026-02-22 21:05:14 +08:00
chore: comment out anubis
This commit is contained in:
parent
2c2e1544c5
commit
7671014026
7 changed files with 69 additions and 57 deletions
|
|
@ -1,12 +1,12 @@
|
||||||
{ config, lib, ... }:
|
{ config, lib, ... }:
|
||||||
{
|
{
|
||||||
users.users.nginx.extraGroups = [ config.users.groups.anubis.name ];
|
# users.users.nginx.extraGroups = [ config.users.groups.anubis.name ];
|
||||||
services.anubis = {
|
#services.anubis = {
|
||||||
defaultOptions = {
|
# defaultOptions = {
|
||||||
enable = true;
|
# enable = true;
|
||||||
settings = {
|
# settings = {
|
||||||
SERVE_ROBOTS_TXT = true;
|
# SERVE_ROBOTS_TXT = true;
|
||||||
};
|
# };
|
||||||
};
|
# };
|
||||||
};
|
#};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -32,19 +32,20 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
anubis.instances.atticd = {
|
#anubis.instances.atticd = {
|
||||||
settings = {
|
# settings = {
|
||||||
TARGET = "http://localhost:8060";
|
# TARGET = "http://localhost:8060";
|
||||||
BIND = ":8061";
|
# BIND = "/run/anubis/anubis-atticd/anubis.sock";
|
||||||
BIND_NETWORK = "tcp";
|
# METRICS_BIND = "/run/anubis/anubis-atticd/anubis.sock";
|
||||||
};
|
# };
|
||||||
};
|
#};
|
||||||
nginx.virtualHosts."cache.liv.town" = {
|
nginx.virtualHosts."cache.liv.town" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://localhost${toString config.services.anubis.instances.atticd.settings.BIND}";
|
# proxyPass = "http://unix:${toString config.services.anubis.instances.atticd.settings.BIND}";
|
||||||
|
proxyPass = "http://localhost:8060";
|
||||||
proxyWebsockets = true;
|
proxyWebsockets = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -1,19 +1,23 @@
|
||||||
{ config, ... }:
|
{ config, ... }:
|
||||||
|
let
|
||||||
|
target = "http://localhost:8081";
|
||||||
|
in
|
||||||
{
|
{
|
||||||
services = {
|
services = {
|
||||||
anubis.instances.binternet = {
|
#anubis.instances.binternet = {
|
||||||
settings = {
|
# settings = {
|
||||||
TARGET = "http://localhost:8081";
|
# TARGET = target;
|
||||||
BIND = ":8082";
|
# BIND = "/run/anubis/anubis-binternet/anubis.sock";
|
||||||
BIND_NETWORK = "tcp";
|
# METRICS_BIND = "/run/anubis/anubis-binternet/anubis.sock";
|
||||||
};
|
# };
|
||||||
};
|
#};
|
||||||
nginx.virtualHosts."curate.liv.town" = {
|
nginx.virtualHosts."curate.liv.town" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://localhost${toString config.services.anubis.instances.binternet.settings.BIND}";
|
# proxyPass = "http://unix:${toString config.services.anubis.instances.binternet.settings.BIND}";
|
||||||
|
proxyPass = target;
|
||||||
proxyWebsockets = true;
|
proxyWebsockets = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -68,19 +68,20 @@ in
|
||||||
# };
|
# };
|
||||||
# };
|
# };
|
||||||
# };
|
# };
|
||||||
anubis.instances.forgejo = {
|
#anubis.instances.forgejo = {
|
||||||
settings = {
|
# settings = {
|
||||||
TARGET = "http://localhost:3050";
|
# TARGET = "http://localhost:3050";
|
||||||
BIND = ":3051";
|
# BIND = "/run/anubis/anubis-forgejo/anubis.sock";
|
||||||
BIND_NETWORK = "tcp";
|
# METRICS_BIND = "/run/anubis/anubis-forgejo/anubis.sock";
|
||||||
};
|
# };
|
||||||
};
|
#};
|
||||||
nginx.virtualHosts."code.liv.town" = {
|
nginx.virtualHosts."code.liv.town" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://localhost${toString config.services.anubis.instances.forgejo.settings.BIND}";
|
# proxyPass = "http://unix:${toString config.services.anubis.instances.forgejo.settings.BIND}";
|
||||||
|
proxyPass = "http://localhost:3050";
|
||||||
proxyWebsockets = true;
|
proxyWebsockets = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -17,19 +17,20 @@
|
||||||
guacd-hostname = "localhost";
|
guacd-hostname = "localhost";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
anubis.instances.guacamole = {
|
#anubis.instances.guacamole = {
|
||||||
settings = {
|
# settings = {
|
||||||
TARGET = "http://localhost:4822";
|
# TARGET = "http://localhost:4822";
|
||||||
BIND = ":4883";
|
# BIND = "/run/anubis/anubis-guacamole/anubis.sock";
|
||||||
BIND_NETWORK = "tcp";
|
# METRICS_BIND = "/run/anubis/anubis-guacamole/anubis.sock";
|
||||||
};
|
# };
|
||||||
};
|
#};
|
||||||
nginx.virtualHosts."remote.liv.town" = {
|
nginx.virtualHosts."remote.liv.town" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://localhost${toString config.services.anubis.instances.guacamole.settings.BIND}";
|
# proxyPass = "http://unix:${toString config.services.anubis.instances.guacamole.settings.BIND}";
|
||||||
|
proxyPass = "http://${toString config.services.guacamole-server.host}:${toString config.services.guacamole-server.port}";
|
||||||
proxyWebsockets = true;
|
proxyWebsockets = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -1,19 +1,23 @@
|
||||||
{ config, ... }:
|
{ config, ... }:
|
||||||
|
let
|
||||||
|
target = "http://localhost:8078";
|
||||||
|
in
|
||||||
{
|
{
|
||||||
services = {
|
services = {
|
||||||
anubis.instances.librey = {
|
#anubis.instances.librey = {
|
||||||
settings = {
|
# settings = {
|
||||||
TARGET = "http://localhost:8078";
|
# TARGET = target;
|
||||||
BIND = ":8079";
|
# BIND = "/run/anubis/anubis-librey/anubis.sock";
|
||||||
BIND_NETWORK = "tcp";
|
# METRICS_BIND = "/run/anubis/anubis-librey/anubis.sock";
|
||||||
};
|
# };
|
||||||
};
|
#};
|
||||||
nginx.virtualHosts."search.liv.town" = {
|
nginx.virtualHosts."search.liv.town" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://localhost${toString config.services.anubis.instances.librey.settings.BIND}";
|
# proxyPass = "http://unix:${toString config.services.anubis.instances.librey.settings.BIND}";
|
||||||
|
proxyPass = target;
|
||||||
proxyWebsockets = true;
|
proxyWebsockets = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -5,19 +5,20 @@
|
||||||
enable = true;
|
enable = true;
|
||||||
settings.PORT = "4800";
|
settings.PORT = "4800";
|
||||||
};
|
};
|
||||||
anubis.instances.uptime-kuma = {
|
#anubis.instances.uptime-kuma = {
|
||||||
settings = {
|
# settings = {
|
||||||
TARGET = "http://localhost:4800";
|
# TARGET = "http://localhost:4800";
|
||||||
BIND = ":4801";
|
# BIND = "/run/anubis/anubis-uptime-kuma/anubis.sock";
|
||||||
BIND_NETWORK = "tcp";
|
# METRICS_BIND = "/run/anubis/anubis-uptime-kuma/anubis.sock";
|
||||||
};
|
# };
|
||||||
};
|
#};
|
||||||
nginx.virtualHosts."uptime.liv.town" = {
|
nginx.virtualHosts."uptime.liv.town" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
sslCertificate = "/var/lib/acme/liv.town/cert.pem";
|
||||||
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://localhost${toString config.services.anubis.instances.uptime-kuma.settings.BIND}";
|
# proxyPass = "http://unix:${toString config.services.anubis.instances.uptime-kuma.settings.BIND}";
|
||||||
|
proxyPass = "http://localhost:4800";
|
||||||
proxyWebsockets = true;
|
proxyWebsockets = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue