disable anubis for now

This commit is contained in:
Lillian Violet 2026-02-19 22:29:45 +01:00
parent a15584654c
commit b8bbe16a7b

View file

@ -32,33 +32,33 @@
preservation.enable = lib.mkForce false;
services.anubis.instances.default.settings.TARGET = "http://localhost:8123";
# services.anubis.instances.default.settings.TARGET = "http://localhost:8123";
# required due to unix socket permissions
users.users.nginx.extraGroups = [config.users.groups.anubis.name];
services.nginx.virtualHosts."*.gladtherescake.eu" = {
locations = {
"/".proxyPass = "http://unix:${config.services.anubis.instances.default.settings.BIND}";
};
};
services.nginx.virtualHosts."*.lillianviolet.dev" = {
locations = {
"/".proxyPass = "http://unix:${config.services.anubis.instances.default.settings.BIND}";
};
};
# # required due to unix socket permissions
# users.users.nginx.extraGroups = [config.users.groups.anubis.name];
# services.nginx.virtualHosts."*.gladtherescake.eu" = {
# locations = {
# "/".proxyPass = "http://unix:${config.services.anubis.instances.default.settings.BIND}";
# };
# };
# services.nginx.virtualHosts."*.lillianviolet.dev" = {
# locations = {
# "/".proxyPass = "http://unix:${config.services.anubis.instances.default.settings.BIND}";
# };
# };
zramSwap.enable = false;
services = {
openssh = {
enable = true;
settings = {
# require public key authentication for better security
PasswordAuthentication = false;
KbdInteractiveAuthentication = false;
PermitRootLogin = "no";
};
};
};
# zramSwap.enable = false;
# services = {
# openssh = {
# enable = true;
# settings = {
# # require public key authentication for better security
# PasswordAuthentication = false;
# KbdInteractiveAuthentication = false;
# PermitRootLogin = "no";
# };
# };
# };
nixpkgs = {
# You can add overlays here