My Nix Configuration

[prefect.caddy] Use the anubis ports for services that have it enabled

pyrox.dev 588c4d58 67559496

verified
Changed files
+37 -11
systems
x86_64-linux
prefect
services
+37 -11
systems/x86_64-linux/prefect/services/caddy.nix
···
enable = true;
package = pkgs.caddy.withPlugins {
plugins = [
-
"github.com/caddy-dns/desec@v0.0.0-20240526070323-822a6a2014b2"
+
"github.com/caddy-dns/desec@v1.0.1"
"github.com/greenpau/caddy-security@v1.1.31"
"github.com/tailscale/caddy-tailscale@v0.0.0-20250207163903-69a970c84556"
];
-
hash = "sha256-rvPZ/Lomx40tvlqqhUBIG9wCHJorN2FGus7gtO7ob/0=";
+
hash = "sha256-lsceZXoTPJCDjl84OQTZUTBRuVAxo8KMWjTXzCFwA6U=";
};
email = "pyrox@pyrox.dev";
virtualHosts = {
···
};
# Authentik
-
"${pns.authentik.extUrl}:443" = reverseProxyToMarvin pns.authentik.port false;
-
"${pns.authentik.extUrl}:80" = reverseProxyToMarvin pns.authentik.port false;
+
"${pns.authentik.extUrl}:443" = {
+
serverAliases = [ "${pns.authentik.extUrl}:80" ];
+
extraConfig = ''
+
reverse_proxy http://${marvin}:${toString pns.authentik.anubis} {
+
header_up X-Real-Ip {remote_host}
+
header_up X-Http-Version {http.request.proto}
+
}
+
'';
+
};
"http://${pns.authentik.extUrl}:389" = reverseProxyToMarvin 389 false;
"${pns.authentik.extUrl}:636" = reverseProxyToMarvin 636 false;
···
-X-Powered-By
-Last-Modified
}
-
reverse_proxy ${marvin}:${toString pns.vaultwarden.port} {
+
reverse_proxy ${marvin}:${toString pns.vaultwarden.anubis} {
header_up X-Real-IP {remote_host}
+
header_up X-Http-Version {http.request.proto}
}
'';
};
···
# Forgejo
${pns.git.extUrl} = {
extraConfig = ''
-
reverse_proxy http://${marvin}:${toString pns.git.port}
+
reverse_proxy http://${marvin}:${toString pns.git.anubis} {
+
header_up X-Real-Ip {remote_host}
+
header_up X-Http-Version {http.request.proto}
+
}
'';
};
# Grafana
${pns.grafana.extUrl} = {
extraConfig = ''
-
reverse_proxy http://${marvin}:${toString pns.grafana.port}
+
reverse_proxy http://${marvin}:${toString pns.grafana.anubis} {
+
header_up X-Real-Ip {remote_host}
+
header_up X-Http-Version {http.request.proto}
+
}
'';
};
# Miniflux
${pns.miniflux.extUrl} = {
extraConfig = ''
-
reverse_proxy http://${marvin}:${toString pns.miniflux.port}
+
reverse_proxy http://${marvin}:${toString pns.miniflux.anubis} {
+
header_up X-Real-Ip {remote_host}
+
header_up X-Http-Version {http.request.proto}
+
}
'';
};
# Nextcloud
${pns.nextcloud.extUrl} = {
extraConfig = ''
-
reverse_proxy http://${marvin}:${toString pns.nextcloud.port}
+
reverse_proxy http://${marvin}:${toString pns.nextcloud.anubis} {
+
header_up X-Real-Ip {remote_host}
+
header_up X-Http-Version {http.request.proto}
+
}
'';
};
# Nextcloud-Office(Collabora)
${pns.nextcloud-office.extUrl} = {
extraConfig = ''
-
reverse_proxy http://${marvin}:${toString pns.nextcloud-office.port}
+
reverse_proxy http://${marvin}:${toString pns.nextcloud-office.anubis} {
+
header_up X-Real-Ip {remote_host}
+
header_up X-Http-Version {http.request.proto}
+
}
'';
};
# Planka
${pns.planka.extUrl} = {
extraConfig = ''
-
reverse_proxy http://${marvin}:${toString pns.planka.port}
+
reverse_proxy http://${marvin}:${toString pns.planka.anubis} {
+
header_up X-Real-Ip {remote_host}
+
header_up X-Http-Version {http.request.proto}
+
}
'';
};