services -> less folders where possible

This commit is contained in:
kat witch 2021-09-18 03:30:55 +01:00
parent 2df501fe19
commit 5469e9e37a
No known key found for this signature in database
GPG key ID: 1B477797DCA5EC72
34 changed files with 3 additions and 65 deletions

View file

@ -4,10 +4,10 @@
profiles.hardware.oracle.ubuntu
profiles.network
services.nginx
services.filehost
services.keycloak
services.vikunja
services.tt-rss
services.roundcube
services.openldap
services.mail
services.hedgedoc

View file

@ -10,16 +10,13 @@ with lib;
profiles.network
users.kat.server
users.kat.services.weechat
services.filehost
services.gitea
services.logrotate
# services.nixos-mailserver
services.matrix
services.synapse
services.murmur
services.nginx
services.postgres
services.prosody
# services.radicale
services.restic
services.syncplay
services.taskserver

View file

@ -1,17 +0,0 @@
{ config, lib, pkgs, ... }:
{
services.nginx.virtualHosts = {
"files.${config.network.dns.domain}" = {
root = "/var/www/files";
enableACME = true;
forceSSL = true;
};
};
deploy.tf.dns.records.services_filehost = {
inherit (config.network.dns) zone;
domain = "files";
cname = { inherit (config.network.addresses.public) target; };
};
}

View file

@ -6,5 +6,6 @@
./dovecot.nix
./opendkim.nix
./autoconfig.nix
./roundcube.nix
];
}

View file

@ -1,43 +0,0 @@
{ config, pkgs, lib, tf, ... }:
with lib;
{
secrets.files.radicale_htpasswd = {
text = ''
kat@kittywit.ch:${tf.variables.mail-kat-hash.ref}
'';
};
services.radicale = {
enable = true;
settings = {
auth = {
type = "htpasswd";
htpasswd_filename = config.secrets.files.radicale_htpasswd.path;
htpasswd_encryption = "bcrypt";
};
};
};
services.nginx.virtualHosts = {
"cal.${config.network.dns.domain}" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://localhost:5232/";
extraConfig = ''
proxy_set_header X-Script-Name /;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_pass_header Authorization;
'';
};
};
};
deploy.tf.dns.records.services_radicale = {
inherit (config.network.dns) zone;
domain = "cal";
cname = { inherit (config.network.addresses.public) target; };
};
}