forked from DGNum/infrastructure
feat(dgn-web): Enable module on nodes serving web content
Also remove the firewall config as it is now centralized.
This commit is contained in:
parent
958afe957f
commit
4be2f40abe
6 changed files with 3 additions and 8 deletions
|
@ -9,6 +9,7 @@ let
|
||||||
# List of modules to enable
|
# List of modules to enable
|
||||||
enabledModules = [
|
enabledModules = [
|
||||||
"dgn-dns"
|
"dgn-dns"
|
||||||
|
"dgn-web"
|
||||||
];
|
];
|
||||||
|
|
||||||
# List of services to enable
|
# List of services to enable
|
||||||
|
|
|
@ -75,6 +75,4 @@ in {
|
||||||
(setDefault { owner = "nextcloud"; }
|
(setDefault { owner = "nextcloud"; }
|
||||||
(builtins.filter (lib.hasPrefix "nextcloud-") config.dgn-secrets.names))
|
(builtins.filter (lib.hasPrefix "nextcloud-") config.dgn-secrets.names))
|
||||||
];
|
];
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 80 443 ];
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -8,6 +8,7 @@ let
|
||||||
|
|
||||||
# List of modules to enable
|
# List of modules to enable
|
||||||
enabledModules = [
|
enabledModules = [
|
||||||
|
"dgn-web"
|
||||||
];
|
];
|
||||||
|
|
||||||
# List of services to enable
|
# List of services to enable
|
||||||
|
|
|
@ -94,6 +94,4 @@ in {
|
||||||
(setDefault { owner = "git"; }
|
(setDefault { owner = "git"; }
|
||||||
(builtins.filter (lib.hasPrefix "forgejo-") config.dgn-secrets.names))
|
(builtins.filter (lib.hasPrefix "forgejo-") config.dgn-secrets.names))
|
||||||
];
|
];
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 80 443 ];
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -8,6 +8,7 @@ let
|
||||||
|
|
||||||
# List of modules to enable
|
# List of modules to enable
|
||||||
enabledModules = [
|
enabledModules = [
|
||||||
|
"dgn-web"
|
||||||
];
|
];
|
||||||
|
|
||||||
# List of services to enable
|
# List of services to enable
|
||||||
|
|
|
@ -52,8 +52,4 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# dgn-secrets.options."_smtp-password-file".owner = "plausible";
|
|
||||||
#
|
|
||||||
networking.firewall.allowedTCPPorts = [ 80 443 ];
|
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue