nix machine / user configurations

refactor(wolumonde): atp stuff

ptr.pet dace81e0 d0ddf902

verified
Changed files
+22 -14
dns
hosts
wolumonde
+1
dns/dnsconfig.js
···
A("likes", WOLUMONDE_IP, CF_PROXY_OFF),
A("vpn", WOLUMONDE_IP, CF_PROXY_OFF),
A("id", WOLUMONDE_IP, CF_PROXY_OFF),
// thing
// TXT("id", "a data endpoint for entity with serial id /90008/."),
// TXT("id", "entity linked here uses it/they pronouns. it can be referred to as /dusk/ or /dawn/."),
···
A("likes", WOLUMONDE_IP, CF_PROXY_OFF),
A("vpn", WOLUMONDE_IP, CF_PROXY_OFF),
A("id", WOLUMONDE_IP, CF_PROXY_OFF),
+
// A("meow", WOLUMONDE_IP, CF_PROXY_OFF),
// thing
// TXT("id", "a data endpoint for entity with serial id /90008/."),
// TXT("id", "entity linked here uses it/they pronouns. it can be referred to as /dusk/ or /dawn/."),
+7
hosts/wolumonde/modules/atproto.nix
···
{
security.acme.certs."gaze.systems".extraDomainNames = [
dawnDid guestbookDid
];
services.nginx.virtualHosts = {
# "gaze.systems" = mkWellKnownCfg {
···
};
# "9.0.0.0.8.e.f.1.5.0.7.4.0.1.0.0.2.ip6.arpa" = mkWellKnownCfg {
# "atproto-did" = pkgs.writeText "server" "did:plc:dfl62fgb7wtjj3fcbb72naae";
# };
}
// (mkDidWebCfg dawnDid)
···
{
security.acme.certs."gaze.systems".extraDomainNames = [
dawnDid guestbookDid
+
# "meow.gaze.systems"
];
services.nginx.virtualHosts = {
# "gaze.systems" = mkWellKnownCfg {
···
};
# "9.0.0.0.8.e.f.1.5.0.7.4.0.1.0.0.2.ip6.arpa" = mkWellKnownCfg {
# "atproto-did" = pkgs.writeText "server" "did:plc:dfl62fgb7wtjj3fcbb72naae";
+
# };
+
# "meow.gaze.systems" = {
+
# useACMEHost = "gaze.systems";
+
# quic = true;
+
# kTLS = true;
+
# forceSSL = true;
# };
}
// (mkDidWebCfg dawnDid)
+14 -14
hosts/wolumonde/modules/blog.nix
···
};
};
-
systemd.services.annoy-keep-alive = {
-
description = "keeps annoy peer connection alive";
-
wantedBy = [ "multi-user.target" ];
-
after = [ "network.target" ];
-
serviceConfig = {
-
Type = "oneshot";
-
ExecStart = "${pkgs.curl}/bin/curl http://100.64.0.1:3111/";
-
};
-
};
-
systemd.timers.annoy-keep-alive.timerConfig = {
-
OnBootSec = "5 min";
-
OnUnitActiveSec = "5 min";
-
Unit = "annoy-keep-alive.service";
-
};
services.nginx.virtualHosts."gaze.systems" = {
locations."/".proxyPass = "http://localhost:${toString port}";
···
};
};
+
# systemd.services.annoy-keep-alive = {
+
# description = "keeps annoy peer connection alive";
+
# wantedBy = [ "multi-user.target" ];
+
# after = [ "network.target" ];
+
# serviceConfig = {
+
# Type = "oneshot";
+
# ExecStart = "${pkgs.curl}/bin/curl http://100.64.0.1:3111/";
+
# };
+
# };
+
# systemd.timers.annoy-keep-alive.timerConfig = {
+
# OnBootSec = "5 min";
+
# OnUnitActiveSec = "5 min";
+
# Unit = "annoy-keep-alive.service";
+
# };
services.nginx.virtualHosts."gaze.systems" = {
locations."/".proxyPass = "http://localhost:${toString port}";