Compare commits

..

10 commits

Author SHA1 Message Date
Nick
2932b9f18d feat: spun up firefly-iii 2025-11-17 20:21:01 -06:00
Nick
4b86ce3f4e feat: spun up firefly-iii 2025-11-17 20:02:06 -06:00
Nick
c3be13e210 feat: spun up firefly-iii 2025-11-17 19:48:14 -06:00
Nick
78d4524d69 feat: spun up firefly-iii 2025-11-17 19:38:30 -06:00
Nick
a2eb91f66c feat: spun up firefly-iii 2025-11-17 19:27:09 -06:00
Nick
be482eae73 feat: spun up firefly-iii 2025-11-17 19:09:15 -06:00
Nick
2dd987b77e feat: spun up firefly-iii 2025-11-17 18:30:28 -06:00
Nick
f9f4b8b8ec feat: spun up firefly-iii 2025-11-17 18:06:10 -06:00
Nick
99c40c5362 feat: spun up firefly-iii 2025-11-17 17:54:32 -06:00
Nick
f0aa2b0ebe feat: spun up firefly-iii 2025-11-17 17:20:59 -06:00

View file

@ -56,6 +56,11 @@ in
}; };
}; };
phpfpm.pools.firefly-iii.phpEnv = {
TRUSTED_PROXIES = "*";
APP_URL = "https://${host}";
};
firefly-iii-data-importer = { firefly-iii-data-importer = {
enable = true; enable = true;
}; };
@ -70,7 +75,10 @@ in
encode gzip encode gzip
php_fastcgi unix//run/phpfpm/firefly-iii.sock php_fastcgi unix//run/phpfpm/firefly-iii.sock {
env HTTPS {http.request.header.X-Forwarded-Proto}
env HTTP_X_FORWARDED_PROTO {http.request.header.X-Forwarded-Proto}
}
''; '';
}; };
}; };
@ -95,6 +103,10 @@ in
}; };
}; };
users.users.caddy = {
extraGroups = [ "firefly-iii" ];
};
networking.firewall.allowedTCPPorts = [ networking.firewall.allowedTCPPorts = [
22 22
80 80
@ -104,6 +116,10 @@ in
systemd = { systemd = {
services = { services = {
caddy = {
after = [ "phpfpm-firefly-iii.service" ];
requires = [ "phpfpm-firefly-iii.service" ];
};
fix-secrets-permissions = { fix-secrets-permissions = {
description = "Fix secrets permissions for firefly-iii"; description = "Fix secrets permissions for firefly-iii";
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
@ -239,7 +255,10 @@ in
}; };
services.caddy.virtualHosts."${host}" = { services.caddy.virtualHosts."${host}" = {
extraConfig = '' extraConfig = ''
reverse_proxy http://${serviceCfg.interface.ip}:80 reverse_proxy http://${serviceCfg.interface.ip}:80 {
header_up X-Forwarded-Proto https
header_up X-Forwarded-Host {host}
}
tls ${serviceCfg.ssl.cert} ${serviceCfg.ssl.key} tls ${serviceCfg.ssl.cert} ${serviceCfg.ssl.key}