Nginx: Fix ipv6 listen addresses.

This commit is contained in:
Dmitry Voronin 2025-01-05 10:04:19 +03:00
parent 642ce3d327
commit fd97704264
Signed by: voronind
SSH key fingerprint: SHA256:3kBb4iV2ahufEBNq+vFbUe4QYfHt98DHQjN7QaptY9k
18 changed files with 23 additions and 35 deletions

View file

@ -4,12 +4,12 @@ Host *
ControlPersist yes ControlPersist yes
Host dasha Host dasha
HostName 10.0.0.7 HostName dasha.local
User root User root
Port 22143 Port 22143
Host desktop Host desktop
HostName 10.0.0.3 HostName desktop.local
User root User root
Port 22143 Port 22143
@ -19,41 +19,41 @@ Host fmpmaven
Port 22 Port 22
Host home Host home
HostName 10.0.0.1 HostName [fd09:8d46:b26:0:8079:82ff:fe1a:916a]
User root User root
Port 22143 Port 22143
Host laptop Host laptop
HostName 192.168.1.9 HostName laptop.local
User root User root
Port 22143 Port 22143
Host max Host max
HostName 10.0.0.13 HostName max.local
User root User root
Port 22143 Port 22143
Host nixbuilder Host nixbuilder
HostName 10.0.0.1 HostName [fd09:8d46:b26:0:8079:82ff:fe1a:916a]
User nixbuilder User nixbuilder
Port 22143 Port 22143
Host pi Host pi
HostName 192.168.1.6 HostName pi.local
User root User root
Port 22143 Port 22143
Host pocket Host pocket
HostName 192.168.1.11 HostName pocket.local
User root User root
Port 22143 Port 22143
Host vpn Host vpn
HostName 194.113.233.38 HostName vpn.local
User root User root
Port 22143 Port 22143
Host work Host work
HostName 192.168.1.5 HostName work.local
User root User root
Port 22143 Port 22143

View file

@ -3,7 +3,6 @@
networking = { networking = {
firewall.extraCommands = '' firewall.extraCommands = ''
# Local access. # Local access.
iptables -I INPUT -j ACCEPT -s 10.0.0.0/8
ip6tables -I INPUT -j ACCEPT -s fd09:8d46:0b26::/48 ip6tables -I INPUT -j ACCEPT -s fd09:8d46:0b26::/48
''; '';
}; };

View file

@ -3,7 +3,6 @@
networking = { networking = {
firewall.extraCommands = '' firewall.extraCommands = ''
# Local access. # Local access.
iptables -I INPUT -j ACCEPT -s 10.0.0.0/8
ip6tables -I INPUT -j ACCEPT -s fd09:8d46:0b26::/48 ip6tables -I INPUT -j ACCEPT -s fd09:8d46:0b26::/48
''; '';
}; };

View file

@ -4,7 +4,6 @@
enable = true; enable = true;
baseURL = "change.voronind.com"; baseURL = "change.voronind.com";
behindProxy = true; behindProxy = true;
listenAddress = "0.0.0.0";
port = 5001; port = 5001;
}; };
} }

View file

@ -12,7 +12,7 @@ in
browsing = true; browsing = true;
defaultShared = true; defaultShared = true;
drivers = [ package ]; drivers = [ package ];
listenAddresses = [ "0.0.0.0:631" ]; listenAddresses = [ "[::1]:631" ];
startWhenNeeded = true; startWhenNeeded = true;
stateless = false; stateless = false;
webInterface = true; webInterface = true;

View file

@ -14,6 +14,7 @@
enable = true; enable = true;
domain = "yt.voronind.com"; domain = "yt.voronind.com";
package = pkgsMaster.invidious; package = pkgsMaster.invidious;
address = "::1";
port = 3001; port = 3001;
nginx.enable = false; nginx.enable = false;
database = { database = {

View file

@ -2,10 +2,8 @@
{ {
services.paperless = { services.paperless = {
enable = true; enable = true;
address = "0.0.0.0"; address = "[::1]";
dataDir = "/var/lib/paperless"; passwordFile = pkgs.writeText "PaperlessPassword" "root"; # WARN: Only for initial setup, change later.
# port = cfg.port;
passwordFile = pkgs.writeText "PaperlessPassword" "root"; # NOTE: Only for initial setup, change later.
settings = { settings = {
PAPERLESS_ADMIN_USER = "root"; PAPERLESS_ADMIN_USER = "root";
PAPERLESS_DBHOST = "/run/postgresql"; PAPERLESS_DBHOST = "/run/postgresql";

View file

@ -11,7 +11,7 @@
instance_name = "SearX"; instance_name = "SearX";
}; };
server = { server = {
# bind_address = cfg.address; bind_address = "::1";
image_proxy = false; image_proxy = false;
limiter = false; limiter = false;
method = "GET"; method = "GET";

View file

@ -5,7 +5,7 @@
settings = { settings = {
DATA_DIR = "/var/lib/uptime-kuma/"; DATA_DIR = "/var/lib/uptime-kuma/";
PORT = "64901"; PORT = "64901";
# HOST = cfg.address; HOST = "::1";
}; };
}; };

View file

@ -7,7 +7,7 @@
config = { config = {
DATA_FOLDER = "/var/lib/vaultwarden"; DATA_FOLDER = "/var/lib/vaultwarden";
DOMAIN = "https://pass.voronind.com"; DOMAIN = "https://pass.voronind.com";
# ROCKET_ADDRESS = cfg.address; ROCKET_ADDRESS = "::1";
ROCKET_PORT = 8001; ROCKET_PORT = 8001;
SIGNUPS_ALLOWED = false; SIGNUPS_ALLOWED = false;
WEB_VAULT_ENABLED = true; WEB_VAULT_ENABLED = true;

View file

@ -8,7 +8,7 @@
allow fd09:8d46:b26::/48; allow fd09:8d46:b26::/48;
deny all; deny all;
proxy_pass http://[::1]:5001$request_uri; proxy_pass http://127.0.0.1:5001$request_uri;
add_header Referrer-Policy 'origin'; add_header Referrer-Policy 'origin';
} }

View file

@ -7,7 +7,7 @@
allow 10.0.0.0/8; allow 10.0.0.0/8;
allow fd09:8d46:b26::/48; allow fd09:8d46:b26::/48;
deny all; deny all;
proxy_pass http://[::1]:8112$request_uri; proxy_pass http://127.0.0.1:8112$request_uri;
} }
ssl_certificate /etc/letsencrypt/live/voronind.com/fullchain.pem; ssl_certificate /etc/letsencrypt/live/voronind.com/fullchain.pem;

View file

@ -7,7 +7,7 @@
allow 10.0.0.0/8; allow 10.0.0.0/8;
allow fd09:8d46:b26::/48; allow fd09:8d46:b26::/48;
deny all; deny all;
proxy_pass http://[::1]:8096$request_uri; proxy_pass http://127.0.0.1:8096$request_uri;
} }
ssl_certificate /etc/letsencrypt/live/voronind.com/fullchain.pem; ssl_certificate /etc/letsencrypt/live/voronind.com/fullchain.pem;

View file

@ -3,7 +3,6 @@
networking = { networking = {
firewall.extraCommands = '' firewall.extraCommands = ''
# Local access. # Local access.
iptables -I INPUT -j ACCEPT -s 10.0.0.0/8
ip6tables -I INPUT -j ACCEPT -s fd09:8d46:0b26::/48 ip6tables -I INPUT -j ACCEPT -s fd09:8d46:0b26::/48
''; '';
}; };

View file

@ -3,7 +3,6 @@
networking = { networking = {
firewall.extraCommands = '' firewall.extraCommands = ''
# Local access. # Local access.
iptables -I INPUT -j ACCEPT -s 10.0.0.0/8
ip6tables -I INPUT -j ACCEPT -s fd09:8d46:0b26::/48 ip6tables -I INPUT -j ACCEPT -s fd09:8d46:0b26::/48
''; '';
}; };

View file

@ -3,7 +3,6 @@
networking = { networking = {
firewall.extraCommands = '' firewall.extraCommands = ''
# Local access. # Local access.
iptables -I INPUT -j ACCEPT -s 10.0.0.0/8
ip6tables -I INPUT -j ACCEPT -s fd09:8d46:0b26::/48 ip6tables -I INPUT -j ACCEPT -s fd09:8d46:0b26::/48
''; '';
}; };

View file

@ -2,9 +2,8 @@
{ {
networking = { networking = {
firewall.extraCommands = '' firewall.extraCommands = ''
# Ssh access. # Local access.
iptables -I INPUT -j ACCEPT -s 10.0.0.0/8 -p tcp --dport 22143 ip6tables -I INPUT -j ACCEPT -s fd09:8d46:0b26::/48
ip6tables -I INPUT -j ACCEPT -s fd09:8d46:0b26::/48 -p tcp --dport 22143 '';
'';
}; };
} }

View file

@ -6,10 +6,6 @@
allowSFTP = true; allowSFTP = true;
ports = [ 22143 ]; ports = [ 22143 ];
listenAddresses = [ listenAddresses = [
{
addr = "0.0.0.0";
port = 22143;
}
{ {
addr = "[::]"; addr = "[::]";
port = 22143; port = 22143;