+4
-4
flake.lock
+4
-4
flake.lock
···
288
288
"sqlite-lib-src": "sqlite-lib-src"
289
289
},
290
290
"locked": {
291
-
"lastModified": 1751894783,
292
-
"narHash": "sha256-kVsDo+VW3eOJFwRGUept/ik+o9qN8MJY0m+ijDaL/BY=",
291
+
"lastModified": 1751902881,
292
+
"narHash": "sha256-eHew7tldSi2Q1z6/K1sUAtpBTP1j5LjSdeQT5ULne14=",
293
293
"ref": "refs/heads/master",
294
-
"rev": "2d6f048f4a81ab5a542d18029a54d342a2c5b47e",
295
-
"revCount": 881,
294
+
"rev": "10b3b561c4c6e100f668da93ec48bbd968f4b453",
295
+
"revCount": 882,
296
296
"type": "git",
297
297
"url": "https://tangled.sh/@tangled.sh/core"
298
298
},
+1
-1
hosts/nixery/configuration.nix
+1
-1
hosts/nixery/configuration.nix
+29
-5
hosts/nixery/services/nginx.nix
+29
-5
hosts/nixery/services/nginx.nix
···
1
1
{
2
2
services.nginx = {
3
3
enable = true;
4
-
virtualHosts."nixery.tangled.sh" = {
5
-
addSSL = true;
6
-
enableACME = true;
7
-
locations."/" = {
8
-
proxyPass = "http://localhost:8080";
4
+
virtualHosts = {
5
+
"nixery.tangled.sh" = {
6
+
forceSSL = true;
7
+
enableACME = true;
8
+
locations."/" = {
9
+
proxyPass = "http://localhost:8080";
10
+
extraConfig = ''
11
+
proxy_set_header Host $host;
12
+
proxy_set_header X-Real-IP $remote_addr;
13
+
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
14
+
proxy_set_header X-Forwarded-Proto $scheme;
15
+
'';
16
+
};
17
+
};
18
+
"spindle.tangled.sh" = {
19
+
forceSSL = true;
20
+
enableACME = true;
21
+
locations."/" = {
22
+
proxyPass = "http://localhost:6555";
23
+
};
24
+
locations."/events" = {
25
+
proxyPass = "http://localhost:6555";
26
+
extraConfig = ''
27
+
proxy_set_header X-Forwarded-For $remote_addr;
28
+
proxy_set_header Host $host;
29
+
proxy_set_header Upgrade $http_upgrade;
30
+
proxy_set_header Connection Upgrade;
31
+
'';
32
+
};
9
33
};
10
34
};
11
35
};