Compare commits

..

No commits in common. "8492679843ccff6b6aa77754b59af7a4f68f34da" and "8e46bfc6626b0a05616168a18dad324cdbe55429" have entirely different histories.

2 changed files with 0 additions and 12 deletions

View file

@ -7,17 +7,6 @@ in
enable = true; enable = true;
}; };
services.caddy.virtualHosts."${domain}".extraConfig = '' services.caddy.virtualHosts."${domain}".extraConfig = ''
# for some reason this only works with http and not with https so we send every request through our wireguard tunnel
reverse_proxy /outpost.goauthentik.io/* http://nuc.vpn.rfive.de:9000
# forward authentication to authentik
@NoAccess not path /api*
forward_auth @NoAccess http://nuc.vpn.rfive.de:9000 {
uri /outpost.goauthentik.io/auth/caddy
# capitalization of the headers is important, otherwise they will be empty
copy_headers X-Authentik-Username X-Authentik-Groups X-Authentik-Email X-Authentik-Name X-Authentik-Uid X-Authentik-Jwt X-Authentik-Meta-Jwks X-Authentik-Meta-Outpost X-Authentik-Meta-Provider X-Authentik-Meta-App X-Authentik-Meta-Version
}
reverse_proxy 127.0.0.1:${toString config.services.sonarr.settings.server.port} reverse_proxy 127.0.0.1:${toString config.services.sonarr.settings.server.port}
''; '';
} }

View file

@ -15,7 +15,6 @@
enableIPv6 = true; enableIPv6 = true;
nftables.enable = true; nftables.enable = true;
firewall = { firewall = {
trustedInterfaces = [ "podman0" ];
extraInputRules = '' extraInputRules = ''
ip saddr 192.168.0.0/16 tcp dport 19531 accept comment "Allow journald gateway access from local networks" ip saddr 192.168.0.0/16 tcp dport 19531 accept comment "Allow journald gateway access from local networks"
''; '';