Compare commits

..

No commits in common. "def00d7a52978de33212dbdfe4d56ff3fa3a28b4" and "7a429c5177440a38b79433a89e460df79b37a980" have entirely different histories.

3 changed files with 8 additions and 23 deletions

View file

@ -13,12 +13,6 @@ let
publicHostsExist = virtualHosts |> lib.any (vHost: (!self.lib.isPrivateDomain vHost.domain)); publicHostsExist = virtualHosts |> lib.any (vHost: (!self.lib.isPrivateDomain vHost.domain));
privateHostsExist = virtualHosts |> lib.any (vHost: self.lib.isPrivateDomain vHost.domain); privateHostsExist = virtualHosts |> lib.any (vHost: self.lib.isPrivateDomain vHost.domain);
privateDomains =
virtualHosts
|> lib.filter (vHost: self.lib.isPrivateDomain vHost.domain)
|> lib.map (vHost: vHost.domain)
|> lib.unique;
mkVirtualHost = mkVirtualHost =
{ {
domain, domain,
@ -144,7 +138,11 @@ in
reloadServices = [ "caddy.service" ]; reloadServices = [ "caddy.service" ];
}; };
certs = privateDomains |> lib.map (domain: lib.nameValuePair domain { }) |> lib.listToAttrs; certs =
virtualHosts
|> lib.filter (host: self.lib.isPrivateDomain host.domain)
|> lib.map (host: lib.nameValuePair host.domain { })
|> lib.listToAttrs;
}; };
services.nebula.networks.mesh.firewall.inbound = [ services.nebula.networks.mesh.firewall.inbound = [
@ -162,11 +160,7 @@ in
systemd.services.caddy = { systemd.services.caddy = {
requires = [ netCfg.overlay.systemdUnit ]; requires = [ netCfg.overlay.systemdUnit ];
wants = privateDomains |> lib.map (domain: "acme-${domain}.service"); after = [ netCfg.overlay.systemdUnit ];
after = [
netCfg.overlay.systemdUnit
]
++ (privateDomains |> lib.map (domain: "acme-${domain}.service"));
}; };
custom.persistence.directories = [ "/var/lib/acme" ]; custom.persistence.directories = [ "/var/lib/acme" ];

View file

@ -17,7 +17,7 @@ let
|> lib.map (host: { |> lib.map (host: {
type = "monitor"; type = "monitor";
cache = "1m"; cache = "1m";
title = "${host.config.networking.hostName} Services"; title = host.config.networking.hostName;
sites = sites =
host.config.custom.meta.sites host.config.custom.meta.sites
|> lib.attrValues |> lib.attrValues

View file

@ -34,16 +34,7 @@ in
}; };
}; };
systemd.services.scrutiny = { systemd.services.scrutiny.enableStrictShellChecks = false;
enableStrictShellChecks = false;
serviceConfig = {
DynamicUser = lib.mkForce false;
ProtectSystem = "strict";
ProtectHome = "read-only";
PrivateTmp = true;
RemoveIPC = true;
};
};
custom = { custom = {
services.caddy.virtualHosts.${cfg.domain}.port = cfg.port; services.caddy.virtualHosts.${cfg.domain}.port = cfg.port;