chore: comment out anubis

This commit is contained in:
Ahwx 2025-12-31 01:35:01 +01:00
parent 2c2e1544c5
commit 7671014026
7 changed files with 69 additions and 57 deletions

View file

@ -1,12 +1,12 @@
{ config, lib, ... }: { config, lib, ... }:
{ {
users.users.nginx.extraGroups = [ config.users.groups.anubis.name ]; # users.users.nginx.extraGroups = [ config.users.groups.anubis.name ];
services.anubis = { #services.anubis = {
defaultOptions = { # defaultOptions = {
enable = true; # enable = true;
settings = { # settings = {
SERVE_ROBOTS_TXT = true; # SERVE_ROBOTS_TXT = true;
}; # };
}; # };
}; #};
} }

View file

@ -32,19 +32,20 @@
}; };
}; };
}; };
anubis.instances.atticd = { #anubis.instances.atticd = {
settings = { # settings = {
TARGET = "http://localhost:8060"; # TARGET = "http://localhost:8060";
BIND = ":8061"; # BIND = "/run/anubis/anubis-atticd/anubis.sock";
BIND_NETWORK = "tcp"; # METRICS_BIND = "/run/anubis/anubis-atticd/anubis.sock";
}; # };
}; #};
nginx.virtualHosts."cache.liv.town" = { nginx.virtualHosts."cache.liv.town" = {
forceSSL = true; forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem"; sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem"; sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = { locations."/" = {
proxyPass = "http://localhost${toString config.services.anubis.instances.atticd.settings.BIND}"; # proxyPass = "http://unix:${toString config.services.anubis.instances.atticd.settings.BIND}";
proxyPass = "http://localhost:8060";
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };

View file

@ -1,19 +1,23 @@
{ config, ... }: { config, ... }:
let
target = "http://localhost:8081";
in
{ {
services = { services = {
anubis.instances.binternet = { #anubis.instances.binternet = {
settings = { # settings = {
TARGET = "http://localhost:8081"; # TARGET = target;
BIND = ":8082"; # BIND = "/run/anubis/anubis-binternet/anubis.sock";
BIND_NETWORK = "tcp"; # METRICS_BIND = "/run/anubis/anubis-binternet/anubis.sock";
}; # };
}; #};
nginx.virtualHosts."curate.liv.town" = { nginx.virtualHosts."curate.liv.town" = {
forceSSL = true; forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem"; sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem"; sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = { locations."/" = {
proxyPass = "http://localhost${toString config.services.anubis.instances.binternet.settings.BIND}"; # proxyPass = "http://unix:${toString config.services.anubis.instances.binternet.settings.BIND}";
proxyPass = target;
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };

View file

@ -68,19 +68,20 @@ in
# }; # };
# }; # };
# }; # };
anubis.instances.forgejo = { #anubis.instances.forgejo = {
settings = { # settings = {
TARGET = "http://localhost:3050"; # TARGET = "http://localhost:3050";
BIND = ":3051"; # BIND = "/run/anubis/anubis-forgejo/anubis.sock";
BIND_NETWORK = "tcp"; # METRICS_BIND = "/run/anubis/anubis-forgejo/anubis.sock";
}; # };
}; #};
nginx.virtualHosts."code.liv.town" = { nginx.virtualHosts."code.liv.town" = {
forceSSL = true; forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem"; sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem"; sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = { locations."/" = {
proxyPass = "http://localhost${toString config.services.anubis.instances.forgejo.settings.BIND}"; # proxyPass = "http://unix:${toString config.services.anubis.instances.forgejo.settings.BIND}";
proxyPass = "http://localhost:3050";
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };

View file

@ -17,19 +17,20 @@
guacd-hostname = "localhost"; guacd-hostname = "localhost";
}; };
}; };
anubis.instances.guacamole = { #anubis.instances.guacamole = {
settings = { # settings = {
TARGET = "http://localhost:4822"; # TARGET = "http://localhost:4822";
BIND = ":4883"; # BIND = "/run/anubis/anubis-guacamole/anubis.sock";
BIND_NETWORK = "tcp"; # METRICS_BIND = "/run/anubis/anubis-guacamole/anubis.sock";
}; # };
}; #};
nginx.virtualHosts."remote.liv.town" = { nginx.virtualHosts."remote.liv.town" = {
forceSSL = true; forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem"; sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem"; sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = { locations."/" = {
proxyPass = "http://localhost${toString config.services.anubis.instances.guacamole.settings.BIND}"; # proxyPass = "http://unix:${toString config.services.anubis.instances.guacamole.settings.BIND}";
proxyPass = "http://${toString config.services.guacamole-server.host}:${toString config.services.guacamole-server.port}";
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };

View file

@ -1,19 +1,23 @@
{ config, ... }: { config, ... }:
let
target = "http://localhost:8078";
in
{ {
services = { services = {
anubis.instances.librey = { #anubis.instances.librey = {
settings = { # settings = {
TARGET = "http://localhost:8078"; # TARGET = target;
BIND = ":8079"; # BIND = "/run/anubis/anubis-librey/anubis.sock";
BIND_NETWORK = "tcp"; # METRICS_BIND = "/run/anubis/anubis-librey/anubis.sock";
}; # };
}; #};
nginx.virtualHosts."search.liv.town" = { nginx.virtualHosts."search.liv.town" = {
forceSSL = true; forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem"; sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem"; sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = { locations."/" = {
proxyPass = "http://localhost${toString config.services.anubis.instances.librey.settings.BIND}"; # proxyPass = "http://unix:${toString config.services.anubis.instances.librey.settings.BIND}";
proxyPass = target;
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };

View file

@ -5,19 +5,20 @@
enable = true; enable = true;
settings.PORT = "4800"; settings.PORT = "4800";
}; };
anubis.instances.uptime-kuma = { #anubis.instances.uptime-kuma = {
settings = { # settings = {
TARGET = "http://localhost:4800"; # TARGET = "http://localhost:4800";
BIND = ":4801"; # BIND = "/run/anubis/anubis-uptime-kuma/anubis.sock";
BIND_NETWORK = "tcp"; # METRICS_BIND = "/run/anubis/anubis-uptime-kuma/anubis.sock";
}; # };
}; #};
nginx.virtualHosts."uptime.liv.town" = { nginx.virtualHosts."uptime.liv.town" = {
forceSSL = true; forceSSL = true;
sslCertificate = "/var/lib/acme/liv.town/cert.pem"; sslCertificate = "/var/lib/acme/liv.town/cert.pem";
sslCertificateKey = "/var/lib/acme/liv.town/key.pem"; sslCertificateKey = "/var/lib/acme/liv.town/key.pem";
locations."/" = { locations."/" = {
proxyPass = "http://localhost${toString config.services.anubis.instances.uptime-kuma.settings.BIND}"; # proxyPass = "http://unix:${toString config.services.anubis.instances.uptime-kuma.settings.BIND}";
proxyPass = "http://localhost:4800";
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };