My Nix Configuration

[prefect.caddy] Add pocket-id and block adding mail config

pyrox.dev 2d6cb810 0e521d60

verified
Changed files
+47 -33
systems
x86_64-linux
prefect
services
+47 -33
systems/x86_64-linux/prefect/services/caddy.nix
···
'';
};
-
# Authentik
+
# Authentication
${pns.pocket-id.extUrl} = {
extraConfig = ''
reverse_proxy /api/* ${marvin}:${toString pns.pocket-id.be-port} {
···
'';
};
+
# Pingvin Share
+
${pns.pingvin-share.extUrl} = {
+
extraConfig = ''
+
reverse_proxy /api/* ${marvin}:${toString pns.pingvin-share.be-anubis} {
+
header_up X-Real-IP {remote_host}
+
header_up X-Http-Version {http.request.proto}
+
}
+
reverse_proxy /* ${marvin}:${toString pns.pingvin-share.anubis} {
+
header_up X-Real-IP {remote_host}
+
header_up X-Http-Version {http.request.proto}
+
}
+
'';
+
};
+
# Simple Tailscale Hosts
# Deemix
···
reverse_proxy ${marvin}:${toString pns.pinchflat.port}
'';
};
-
"mail.pyrox.dev:80" = {
-
extraConfig = ''
-
reverse_proxy ${marvin}:${mail.intHTTP}
-
'';
-
};
+
# "mail.pyrox.dev:80" = {
+
# extraConfig = ''
+
# reverse_proxy ${marvin}:${mail.intHTTP}
+
# '';
+
# };
};
# Mail Config
extraConfig = ''
-
filesystem blog-repo git ${marvin}:${pns.git.port}/pyrox/new-blog {
+
filesystem blog-repo git ${marvin}:${toString pns.git.port}/pyrox/new-blog {
ref pages
refresh_period 10m
}
-
layer4 {
-
0.0.0.0:465 {
-
route {
-
proxy {
-
proxy_protocol v2
-
upstream ${marvinIP}:${mail.intSMTPS}
-
}
-
}
-
}
-
0.0.0.0:993 {
-
route {
-
proxy {
-
proxy_protocol v2
-
upstream ${marvinIP}:${mail.intIMAPS}
-
}
-
}
-
}
-
0.0.0.0:4190 {
-
route {
-
proxy {
-
proxy_protocol v2
-
upstream ${marvinIP}:${mail.intManageSieve}
-
}
-
}
-
}
-
}
'';
+
# layer4 {
+
# 0.0.0.0:465 {
+
# route {
+
# proxy {
+
# proxy_protocol v2
+
# upstream ${marvinIP}:${mail.intSMTPS}
+
# }
+
# }
+
# }
+
# 0.0.0.0:993 {
+
# route {
+
# proxy {
+
# proxy_protocol v2
+
# upstream ${marvinIP}:${mail.intIMAPS}
+
# }
+
# }
+
# }
+
# 0.0.0.0:4190 {
+
# route {
+
# proxy {
+
# proxy_protocol v2
+
# upstream ${marvinIP}:${mail.intManageSieve}
+
# }
+
# }
+
# }
+
# }
};
systemd.services.caddy.serviceConfig.CapabilityBoundingSet = "CAP_NET_BIND_SERVICE";
systemd.services.caddy.serviceConfig.AmbientCapabilities = "CAP_NET_BIND_SERVICE";