nixos-config/config/services/old-homepage.nix

43 lines
1.3 KiB
Nix
Raw Normal View History

2022-01-17 15:59:51 +00:00
{ ... }:
let
2022-01-17 16:00:34 +00:00
homepage-old = import ../../packages/old-homepage.nix { };
2022-01-17 15:59:51 +00:00
in
{
2022-01-17 16:01:38 +00:00
systemd.services.homepage-old = {
2022-01-17 15:59:51 +00:00
enable = true;
description = "darkkirb.de";
script = "${homepage-old.homepage-old}/homepage";
serviceConfig = {
WorkingDirectory = homepage-old.homepage-old;
2022-01-17 16:09:51 +00:00
EnvironmentFile = "/run/secrets/services/old-homepage";
2022-01-17 15:59:51 +00:00
};
wantedBy = [ "multi-user.target" ];
};
services.nginx.virtualHosts."darkkirb.de" = {
forceSSL = true;
http2 = true;
listenAddresses = [ "0.0.0.0" "[::]" ];
sslCertificate = "/var/lib/acme/darkkirb.de/cert.pem";
sslCertificateKey = "/var/lib/acme/darkkirb.de/key.pem";
serverAliases = [ "www.darkkirb.de" ];
locations."/" = {
proxyPass = "http://localhost:3002/";
};
locations."/.well-known/matrix" = {
proxyPass = "http://localhost:3002/.well-known/matrix";
extraConfig = "add_header Access-Control-Allow-Origin '*';";
};
};
2022-01-17 14:54:37 +00:00
services.nginx.virtualHosts."static.darkkirb.de" = {
2022-01-17 14:55:54 +00:00
addSSL = true;
2022-01-17 14:54:37 +00:00
http2 = true;
listenAddresses = [ "0.0.0.0" "[::]" ];
sslCertificate = "/var/lib/acme/darkkirb.de/cert.pem";
sslCertificateKey = "/var/lib/acme/darkkirb.de/key.pem";
locations."/" = {
proxyPass = "http://127.0.0.1:9000/static.darkkirb.de/";
2022-01-17 14:54:37 +00:00
};
};
sops.secrets."services/old-homepage" = { };
2022-01-17 14:54:37 +00:00
}