config/services/access: Trusted addition

This commit is contained in:
kat witch 2021-11-14 21:00:54 +00:00
parent cbcf987180
commit 086c513321
No known key found for this signature in database
GPG key ID: 1B477797DCA5EC72

View file

@ -1,4 +1,4 @@
{ config, lib, meta, ... }: {
{ config, lib, meta, ... }: with lib; {
deploy.tf.dns.records.services_media_forward = {
inherit (config.network.dns) zone;
domain = "media";
@ -11,27 +11,30 @@
cname = { inherit (config.network.addresses.public) target; };
};
services.nginx.virtualHosts = {
"cast.${config.network.dns.domain}" = {
forceSSL = true;
enableACME = true;
locations = {
"/".proxyPass = "http://127.0.0.1:8082";
};
};
"media.${config.network.dns.domain}" = {
forceSSL = true;
enableACME = true;
locations = {
"/jellyfin/".proxyPass = "http://${meta.network.nodes.yukari.network.addresses.wireguard.nixos.ipv4.address}:8096/jellyfin/";
"/jellyfin/socket" = {
proxyPass = "http://${meta.network.nodes.yukari.network.addresses.wireguard.nixos.ipv4.address}:8096/jellyfin/";
extraConfig = ''
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
'';
services.nginx.virtualHosts = mkMerge [
{
"cast.${config.network.dns.domain}" = {
forceSSL = true;
enableACME = true;
locations = {
"/".proxyPass = "http://127.0.0.1:8082";
};
};
};
};
"media.${config.network.dns.domain}" = {
forceSSL = true;
enableACME = true;
locations = {
"/jellyfin/".proxyPass = "http://${meta.network.nodes.yukari.network.addresses.wireguard.nixos.ipv4.address}:8096/jellyfin/";
"/jellyfin/socket" = {
proxyPass = "http://${meta.network.nodes.yukari.network.addresses.wireguard.nixos.ipv4.address}:8096/jellyfin/";
extraConfig = ''
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
'';
};
};
};
}
(mkIf config.deploy.profile.trusted (import config.kw.secrets.repo.access.source { inherit config meta; }))
];
}