servo: add recommendedProxySettings to all nginx services which were missing it
This commit is contained in:
@@ -46,6 +46,7 @@
|
|||||||
enableACME = true;
|
enableACME = true;
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://${config.sane.netns.ovpns.veth.netns.ipv4}:3333";
|
proxyPass = "http://${config.sane.netns.ovpns.veth.netns.ipv4}:3333";
|
||||||
|
recommendedProxySettings = true;
|
||||||
};
|
};
|
||||||
basicAuthFile = config.sops.secrets.bitmagnet_passwd.path;
|
basicAuthFile = config.sops.secrets.bitmagnet_passwd.path;
|
||||||
};
|
};
|
||||||
|
@@ -56,6 +56,7 @@ lib.mkIf false #< 2024/09/30: disabled because i haven't used it in several mon
|
|||||||
|
|
||||||
locations."/ws" = {
|
locations."/ws" = {
|
||||||
proxyPass = "http://127.0.0.1:7890";
|
proxyPass = "http://127.0.0.1:7890";
|
||||||
|
recommendedProxySettings = true;
|
||||||
# XXX not sure how much of this is necessary
|
# XXX not sure how much of this is necessary
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
proxy_http_version 1.1;
|
proxy_http_version 1.1;
|
||||||
|
@@ -27,6 +27,7 @@ lib.mkIf false # i don't actively use ipfs anymore
|
|||||||
|
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://127.0.0.1:8080";
|
proxyPass = "http://127.0.0.1:8080";
|
||||||
|
recommendedProxySettings = true;
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
proxy_set_header Host $host;
|
proxy_set_header Host $host;
|
||||||
proxy_set_header X-Ipfs-Gateway-Prefix "";
|
proxy_set_header X-Ipfs-Gateway-Prefix "";
|
||||||
|
@@ -27,7 +27,10 @@
|
|||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
# inherit kTLS;
|
# inherit kTLS;
|
||||||
locations."/".proxyPass = "http://127.0.0.1:8013";
|
locations."/" = {
|
||||||
|
proxyPass = "http://127.0.0.1:8013";
|
||||||
|
recommendedProxySettings = true;
|
||||||
|
};
|
||||||
locations."= /robots.txt".extraConfig = ''
|
locations."= /robots.txt".extraConfig = ''
|
||||||
return 200 "User-agent: *\nDisallow: /\n";
|
return 200 "User-agent: *\nDisallow: /\n";
|
||||||
'';
|
'';
|
||||||
|
@@ -17,6 +17,7 @@ lib.mkIf false #< 2024/09/30: disabled because i haven't used this for several
|
|||||||
enableACME = true;
|
enableACME = true;
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://127.0.0.1:${builtins.toString port}";
|
proxyPass = "http://127.0.0.1:${builtins.toString port}";
|
||||||
|
recommendedProxySettings = true;
|
||||||
};
|
};
|
||||||
locations."= /robots.txt".extraConfig = ''
|
locations."= /robots.txt".extraConfig = ''
|
||||||
return 200 "User-agent: *\nDisallow: /\n";
|
return 200 "User-agent: *\nDisallow: /\n";
|
||||||
|
@@ -123,6 +123,7 @@ in
|
|||||||
|
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://127.0.0.1:8008";
|
proxyPass = "http://127.0.0.1:8008";
|
||||||
|
recommendedProxySettings = true;
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
# allow uploading large files (matrix enforces a separate limit, downstream)
|
# allow uploading large files (matrix enforces a separate limit, downstream)
|
||||||
client_max_body_size 512m;
|
client_max_body_size 512m;
|
||||||
|
@@ -184,6 +184,7 @@ in
|
|||||||
enableACME = true;
|
enableACME = true;
|
||||||
locations."/media" = {
|
locations."/media" = {
|
||||||
proxyPass = "http://127.0.0.1:11111";
|
proxyPass = "http://127.0.0.1:11111";
|
||||||
|
recommendedProxySettings = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@@ -34,7 +34,10 @@ lib.mkIf false #< i don't actively use navidrome
|
|||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
# inherit kTLS;
|
# inherit kTLS;
|
||||||
locations."/".proxyPass = "http://127.0.0.1:4533";
|
locations."/" = {
|
||||||
|
proxyPass = "http://127.0.0.1:4533";
|
||||||
|
recommendedProxySettings = true;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
sane.dns.zones."uninsane.org".inet.CNAME."music" = "native";
|
sane.dns.zones."uninsane.org".inet.CNAME."music" = "native";
|
||||||
|
@@ -105,12 +105,8 @@
|
|||||||
|
|
||||||
# static URLs might not be aware of .well-known (e.g. registration confirmation URLs),
|
# static URLs might not be aware of .well-known (e.g. registration confirmation URLs),
|
||||||
# so hack around that.
|
# so hack around that.
|
||||||
locations."/_matrix" = {
|
locations."/_matrix".extraConfig = "return 301 https://matrix.uninsane.org$request_uri;";
|
||||||
proxyPass = "http://127.0.0.1:8008";
|
locations."/_synapse".extraConfig = "return 301 https://matrix.uninsane.org$request_uri;";
|
||||||
};
|
|
||||||
locations."/_synapse" = {
|
|
||||||
proxyPass = "http://127.0.0.1:8008";
|
|
||||||
};
|
|
||||||
|
|
||||||
# allow ActivityPub clients to discover how to reach @user@uninsane.org
|
# allow ActivityPub clients to discover how to reach @user@uninsane.org
|
||||||
# see: https://git.pleroma.social/pleroma/pleroma/-/merge_requests/3361/
|
# see: https://git.pleroma.social/pleroma/pleroma/-/merge_requests/3361/
|
||||||
|
@@ -36,6 +36,7 @@
|
|||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://${config.sane.netns.ovpns.veth.netns.ipv4}:5030";
|
proxyPass = "http://${config.sane.netns.ovpns.veth.netns.ipv4}:5030";
|
||||||
proxyWebsockets = true;
|
proxyWebsockets = true;
|
||||||
|
recommendedProxySettings = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@@ -159,6 +159,7 @@ in
|
|||||||
locations."/" = {
|
locations."/" = {
|
||||||
# proxyPass = "http://ovpns.uninsane.org:9091";
|
# proxyPass = "http://ovpns.uninsane.org:9091";
|
||||||
proxyPass = "http://${config.sane.netns.ovpns.veth.netns.ipv4}:9091";
|
proxyPass = "http://${config.sane.netns.ovpns.veth.netns.ipv4}:9091";
|
||||||
|
recommendedProxySettings = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user