nix-dotfiles/machines/elrond/routes.nix

66 lines
1.9 KiB
Nix
Raw Normal View History

{ config, pkgs, lib, ... }:
{
services.nginx = {
2024-05-21 23:58:55 +02:00
virtualHosts."managment.lauterer.it" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
2024-05-21 23:58:55 +02:00
proxyPass = "http://100.104.182.48";
};
basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
};
virtualHosts."funn-nas.lauterer.it" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
proxyPass = "https://100.104.182.48:30044";
};
basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
};
virtualHosts."home.lauterer.it" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
proxyPass = "http://10.0.0.32:8123";
};
# ignorerer sikkerhet for littegran for å oprettholde lettvinthet og app kompatibilitet.
#basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
};
2024-05-19 00:15:13 +02:00
virtualHosts."jellyfin.lauterer.it" = {
2024-04-28 14:42:49 +02:00
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
proxyPass = "http://100.84.215.84:8096";
};
};
2024-05-01 16:17:45 +02:00
virtualHosts."podgrab.lauterer.it" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
proxyPass = "http://100.84.215.84:4242";
};
basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
2024-05-18 20:32:54 +02:00
};
2024-04-28 15:04:31 +02:00
2024-05-21 23:58:55 +02:00
virtualHosts."rss.lauterer.it" = {
2024-05-18 20:32:54 +02:00
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
2024-05-21 23:58:55 +02:00
proxyPass = "http://100.84.215.84:8081";
2024-05-18 20:32:54 +02:00
};
2024-05-21 23:58:55 +02:00
#basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
2024-05-18 20:32:54 +02:00
};
2024-04-28 15:04:31 +02:00
2024-04-28 14:42:49 +02:00
};
}