feat: firefly-iii test

This commit is contained in:
Nick 2025-06-27 03:18:27 -05:00
parent 0004183f51
commit 195ed9eba6

View file

@ -12,7 +12,7 @@ in
services = { services = {
firefly-iii = { firefly-iii = {
enable = true; enable = true;
virtualHost = "localhost"; virtualHost = host;
settings = { settings = {
APP_KEY_FILE = config.sops.secrets."${service.name}-key".path; APP_KEY_FILE = config.sops.secrets."${service.name}-key".path;
SITE_OWNER = email.address0; SITE_OWNER = email.address0;
@ -21,38 +21,49 @@ in
DB_PASSWORD_FILE = config.sops.secrets."${service.name}-pass".path; DB_PASSWORD_FILE = config.sops.secrets."${service.name}-pass".path;
}; };
}; };
caddy = { ngnix = {
virtualHosts = { enable = true;
"${host}" = { virtualHosts.${config.services.firefly-iii.virtualHost} = {
extraConfig = '' listen = [
encode gzip {
addr = "0.0.0.0";
reverse_proxy localhost:8080 { port = 8080;
header_up Host {host}:{server_port}
header_up X-Real-IP {remote_host}
header_up X-Forwarded-For {remote_host}
header_up X-Forwarded-Proto https
header_up X-Forwarded-Host {host}
header_up X-Forwarded-Ssl on
header_up Connection ""
timeout 240s
dial_timeout 240s
} }
];
@session_cookie header Cookie *session*
handle @session_cookie {
header Cache-Control "no-cache, no-store, must-revalidate"
}
request_body {
max_size 64MB
}
tls ${service.ssl.cert} ${service.ssl.key}
'';
};
}; };
}; };
# caddy = {
# virtualHosts = {
# "${host}" = {
# extraConfig = ''
# encode gzip
# reverse_proxy localhost:8080 {
# header_up Host {host}:{server_port}
# header_up X-Real-IP {remote_host}
# header_up X-Forwarded-For {remote_host}
# header_up X-Forwarded-Proto https
# header_up X-Forwarded-Host {host}
# header_up X-Forwarded-Ssl on
# header_up Connection ""
# timeout 240s
# dial_timeout 240s
# }
# @session_cookie header Cookie *session*
# handle @session_cookie {
# header Cache-Control "no-cache, no-store, must-revalidate"
# }
# request_body {
# max_size 64MB
# }
# tls ${service.ssl.cert} ${service.ssl.key}
# '';
# };
# };
# };
}; };
sops = sops =
@ -100,6 +111,7 @@ in
networking = { networking = {
firewall = { firewall = {
allowedTCPPorts = [ allowedTCPPorts = [
8080
service.ports.port0 service.ports.port0
]; ];
}; };