calibre, gitea, invidious, matrix, minio, navidrome, nitter: Use 127.0.0.1 instead of localhost, avoiding ipv6 listening adddress

This commit is contained in:
Giulio De Pasquale 2022-11-11 19:12:24 +01:00
parent fac8937571
commit e17d9f5a45
7 changed files with 8 additions and 8 deletions

View File

@ -18,7 +18,7 @@ in {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
proxyPass = "http://localhost:8083"; proxyPass = "http://127.0.0.1:8083";
extraConfig = '' extraConfig = ''
client_max_body_size 500M; client_max_body_size 500M;
''; '';

View File

@ -18,7 +18,7 @@ in {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
proxyPass = "http://localhost:3000"; proxyPass = "http://127.0.0.1:3000";
extraConfig = '' extraConfig = ''
allow 127.0.0.1; allow 127.0.0.1;
allow 10.0.0.0/24; allow 10.0.0.0/24;

View File

@ -13,7 +13,7 @@ in {
nginx.virtualHosts.${domain} = { nginx.virtualHosts.${domain} = {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations."/" = { proxyPass = "http://localhost:9092"; }; locations."/" = { proxyPass = "http://127.0.0.1:9092"; };
}; };
}; };

View File

@ -25,7 +25,7 @@ in {
]; ];
listeners = [{ listeners = [{
port = 8008; port = 8008;
bind_addresses = [ "::1" ]; bind_addresses = [ "127.0.0.1" ];
type = "http"; type = "http";
tls = false; tls = false;
x_forwarded = true; x_forwarded = true;
@ -86,7 +86,7 @@ in {
# forward all Matrix API calls to the synapse Matrix homeserver # forward all Matrix API calls to the synapse Matrix homeserver
locations."/_matrix" = { locations."/_matrix" = {
proxyPass = "http://[::1]:8008"; # without a trailing / proxyPass = "http://127.0.0.1:8008"; # without a trailing /
}; };
}; };

View File

@ -11,7 +11,7 @@ in {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
proxyPass = "http://localhost:9000"; proxyPass = "http://127.0.0.1:9000";
extraConfig = '' extraConfig = ''
allow 10.0.0.0/24; allow 10.0.0.0/24;
${lib.concatMapStrings (x: "allow ${x};") network.gdevices-wg} ${lib.concatMapStrings (x: "allow ${x};") network.gdevices-wg}

View File

@ -26,7 +26,7 @@ in {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
proxyPass = "http://localhost:4533"; proxyPass = "http://127.0.0.1:4533";
# extraConfig = '' # extraConfig = ''
# allow 10.0.0.0/24; # allow 10.0.0.0/24;
# ${lib.concatMapStrings (x: "allow ${x};") network.gdevices-wg} # ${lib.concatMapStrings (x: "allow ${x};") network.gdevices-wg}

View File

@ -21,7 +21,7 @@ in {
nginx.virtualHosts.${domain} = { nginx.virtualHosts.${domain} = {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations."/" = { proxyPass = "http://localhost:9093"; }; locations."/" = { proxyPass = "http://127.0.0.1:9093"; };
}; };
}; };