forked from Fediversity/Fediversity
Consolidate Garage options
- `fediversity.internal.garage` -> `fediversity.garage` - all in the same place
This commit is contained in:
parent
d9188427ed
commit
f4babe38a8
10 changed files with 80 additions and 79 deletions
|
@ -1,7 +1,6 @@
|
||||||
{ lib, config, ... }:
|
{ lib, config, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
inherit (builtins) toString;
|
|
||||||
inherit (lib) mkOption mkEnableOption mkForce;
|
inherit (lib) mkOption mkEnableOption mkForce;
|
||||||
inherit (lib.types) types;
|
inherit (lib.types) types;
|
||||||
|
|
||||||
|
@ -55,49 +54,6 @@ in
|
||||||
default = { };
|
default = { };
|
||||||
type = types.submodule {
|
type = types.submodule {
|
||||||
options = {
|
options = {
|
||||||
garage = {
|
|
||||||
api = {
|
|
||||||
domain = mkOption {
|
|
||||||
type = types.str;
|
|
||||||
default = "s3.garage.${config.fediversity.domain}";
|
|
||||||
};
|
|
||||||
port = mkOption {
|
|
||||||
type = types.int;
|
|
||||||
default = 3900;
|
|
||||||
};
|
|
||||||
url = mkOption {
|
|
||||||
type = types.str;
|
|
||||||
default = "http://${config.fediversity.internal.garage.api.domain}:${toString config.fediversity.internal.garage.api.port}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
rpc = {
|
|
||||||
port = mkOption {
|
|
||||||
type = types.int;
|
|
||||||
default = 3901;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
web = {
|
|
||||||
rootDomain = mkOption {
|
|
||||||
type = types.str;
|
|
||||||
default = "web.garage.${config.fediversity.domain}";
|
|
||||||
};
|
|
||||||
internalPort = mkOption {
|
|
||||||
type = types.int;
|
|
||||||
default = 3902;
|
|
||||||
};
|
|
||||||
domainForBucket = mkOption {
|
|
||||||
type = types.functionTo types.str;
|
|
||||||
default = bucket: "${bucket}.${config.fediversity.internal.garage.web.rootDomain}";
|
|
||||||
};
|
|
||||||
urlForBucket = mkOption {
|
|
||||||
type = types.functionTo types.str;
|
|
||||||
default = bucket: "http://${config.fediversity.internal.garage.web.domainForBucket bucket}";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
## REVIEW: Do we want to recreate options under
|
## REVIEW: Do we want to recreate options under
|
||||||
## `fediversity.internal` or would we rather use the options from
|
## `fediversity.internal` or would we rather use the options from
|
||||||
## the respective services? See Taeer's comment:
|
## the respective services? See Taeer's comment:
|
||||||
|
@ -132,6 +88,6 @@ in
|
||||||
## NOTE: For a one-machine deployment, this removes the need to provide an
|
## NOTE: For a one-machine deployment, this removes the need to provide an
|
||||||
## `s3.garage.<domain>` domain. However, this will quickly stop working once
|
## `s3.garage.<domain>` domain. However, this will quickly stop working once
|
||||||
## we go to multi-machines deployment.
|
## we go to multi-machines deployment.
|
||||||
fediversity.internal.garage.api.domain = mkForce "s3.garage.localhost";
|
fediversity.garage.api.domain = mkForce "s3.garage.localhost";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -19,9 +19,10 @@ let
|
||||||
inherit (lib) optionalString concatStringsSep;
|
inherit (lib) optionalString concatStringsSep;
|
||||||
inherit (lib.strings) escapeShellArg;
|
inherit (lib.strings) escapeShellArg;
|
||||||
inherit (lib.attrsets) filterAttrs mapAttrs';
|
inherit (lib.attrsets) filterAttrs mapAttrs';
|
||||||
cfg = config.services.garage;
|
|
||||||
fedicfg = config.fediversity.internal.garage;
|
|
||||||
concatMapAttrs = scriptFn: attrset: concatStringsSep "\n" (lib.mapAttrsToList scriptFn attrset);
|
concatMapAttrs = scriptFn: attrset: concatStringsSep "\n" (lib.mapAttrsToList scriptFn attrset);
|
||||||
|
|
||||||
|
cfg = config.services.garage;
|
||||||
|
|
||||||
ensureBucketScriptFn =
|
ensureBucketScriptFn =
|
||||||
bucket:
|
bucket:
|
||||||
{
|
{
|
||||||
|
@ -61,11 +62,13 @@ let
|
||||||
${optionalString corsRules.enable ''
|
${optionalString corsRules.enable ''
|
||||||
garage bucket allow --read --write --owner ${bucketArg} --key tmp
|
garage bucket allow --read --write --owner ${bucketArg} --key tmp
|
||||||
# TODO: endpoin-url should not be hard-coded
|
# TODO: endpoin-url should not be hard-coded
|
||||||
aws --region ${cfg.settings.s3_api.s3_region} --endpoint-url ${fedicfg.api.url} s3api put-bucket-cors --bucket ${bucketArg} --cors-configuration ${corsRulesJSON}
|
aws --region ${cfg.settings.s3_api.s3_region} --endpoint-url ${config.fediversity.garage.api.url} s3api put-bucket-cors --bucket ${bucketArg} --cors-configuration ${corsRulesJSON}
|
||||||
garage bucket deny --read --write --owner ${bucketArg} --key tmp
|
garage bucket deny --read --write --owner ${bucketArg} --key tmp
|
||||||
''}
|
''}
|
||||||
'';
|
'';
|
||||||
|
|
||||||
ensureBucketsScript = concatMapAttrs ensureBucketScriptFn config.fediversity.garage.ensureBuckets;
|
ensureBucketsScript = concatMapAttrs ensureBucketScriptFn config.fediversity.garage.ensureBuckets;
|
||||||
|
|
||||||
ensureAccessScriptFn =
|
ensureAccessScriptFn =
|
||||||
key: bucket:
|
key: bucket:
|
||||||
{
|
{
|
||||||
|
@ -89,9 +92,10 @@ let
|
||||||
garage key import --yes -n ${escapeShellArg key} ${escapeShellArg id} ${escapeShellArg secret} || :
|
garage key import --yes -n ${escapeShellArg key} ${escapeShellArg id} ${escapeShellArg secret} || :
|
||||||
${concatMapAttrs (ensureAccessScriptFn key) ensureAccess}
|
${concatMapAttrs (ensureAccessScriptFn key) ensureAccess}
|
||||||
'';
|
'';
|
||||||
ensureKeysScript = concatMapAttrs ensureKeyScriptFn config.fediversity.garage.ensureKeys;
|
|
||||||
in
|
|
||||||
|
|
||||||
|
ensureKeysScript = concatMapAttrs ensureKeyScriptFn config.fediversity.garage.ensureKeys;
|
||||||
|
|
||||||
|
in
|
||||||
{
|
{
|
||||||
imports = [ ./options.nix ];
|
imports = [ ./options.nix ];
|
||||||
|
|
||||||
|
@ -101,7 +105,7 @@ in
|
||||||
pkgs.awscli
|
pkgs.awscli
|
||||||
];
|
];
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ fedicfg.rpc.port ];
|
networking.firewall.allowedTCPPorts = [ config.fediversity.garage.rpc.port ];
|
||||||
services.garage = {
|
services.garage = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.garage_0_9;
|
package = pkgs.garage_0_9;
|
||||||
|
@ -110,15 +114,15 @@ in
|
||||||
# TODO: use a secret file
|
# TODO: use a secret file
|
||||||
rpc_secret = "d576c4478cc7d0d94cfc127138cbb82018b0155c037d1c827dfb6c36be5f6625";
|
rpc_secret = "d576c4478cc7d0d94cfc127138cbb82018b0155c037d1c827dfb6c36be5f6625";
|
||||||
# TODO: why does this have to be set? is there not a sensible default?
|
# TODO: why does this have to be set? is there not a sensible default?
|
||||||
rpc_bind_addr = "[::]:${toString fedicfg.rpc.port}";
|
rpc_bind_addr = "[::]:${toString config.fediversity.garage.rpc.port}";
|
||||||
rpc_public_addr = "[::1]:${toString fedicfg.rpc.port}";
|
rpc_public_addr = "[::1]:${toString config.fediversity.garage.rpc.port}";
|
||||||
s3_api.api_bind_addr = "[::]:${toString fedicfg.api.port}";
|
s3_api.api_bind_addr = "[::]:${toString config.fediversity.garage.api.port}";
|
||||||
s3_web.bind_addr = "[::]:${toString fedicfg.web.internalPort}";
|
s3_web.bind_addr = "[::]:${toString config.fediversity.garage.web.internalPort}";
|
||||||
s3_web.root_domain = ".${fedicfg.web.rootDomain}";
|
s3_web.root_domain = ".${config.fediversity.garage.web.rootDomain}";
|
||||||
index = "index.html";
|
index = "index.html";
|
||||||
|
|
||||||
s3_api.s3_region = "garage";
|
s3_api.s3_region = "garage";
|
||||||
s3_api.root_domain = ".${fedicfg.api.domain}";
|
s3_api.root_domain = ".${config.fediversity.garage.api.domain}";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -146,7 +150,7 @@ in
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
mapAttrs' (bucket: _: {
|
mapAttrs' (bucket: _: {
|
||||||
name = fedicfg.web.domainForBucket bucket;
|
name = config.fediversity.garage.web.domainForBucket bucket;
|
||||||
inherit value;
|
inherit value;
|
||||||
}) (filterAttrs (_: { website, ... }: website) config.fediversity.garage.ensureBuckets);
|
}) (filterAttrs (_: { website, ... }: website) config.fediversity.garage.ensureBuckets);
|
||||||
|
|
||||||
|
@ -166,7 +170,7 @@ in
|
||||||
|
|
||||||
# Give Garage time to start up by waiting until somethings speaks HTTP
|
# Give Garage time to start up by waiting until somethings speaks HTTP
|
||||||
# behind Garage's API URL.
|
# behind Garage's API URL.
|
||||||
until ${pkgs.curl}/bin/curl -sio /dev/null ${fedicfg.api.url}; do sleep 1; done
|
until ${pkgs.curl}/bin/curl -sio /dev/null ${config.fediversity.garage.api.url}; do sleep 1; done
|
||||||
|
|
||||||
# XXX: this is very sensitive to being a single instance
|
# XXX: this is very sensitive to being a single instance
|
||||||
# (doing the bare minimum to get garage up and running)
|
# (doing the bare minimum to get garage up and running)
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{ lib, ... }:
|
{ config, lib, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
inherit (lib) types mkOption mkEnableOption;
|
inherit (lib) types mkOption mkEnableOption;
|
||||||
|
@ -75,5 +75,46 @@ in
|
||||||
);
|
);
|
||||||
default = { };
|
default = { };
|
||||||
};
|
};
|
||||||
|
|
||||||
|
api = {
|
||||||
|
domain = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "s3.garage.${config.fediversity.domain}";
|
||||||
|
};
|
||||||
|
port = mkOption {
|
||||||
|
type = types.int;
|
||||||
|
default = 3900;
|
||||||
|
};
|
||||||
|
url = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "http://${config.fediversity.garage.api.domain}:${toString config.fediversity.garage.api.port}";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
rpc = {
|
||||||
|
port = mkOption {
|
||||||
|
type = types.int;
|
||||||
|
default = 3901;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
web = {
|
||||||
|
rootDomain = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "web.garage.${config.fediversity.domain}";
|
||||||
|
};
|
||||||
|
internalPort = mkOption {
|
||||||
|
type = types.int;
|
||||||
|
default = 3902;
|
||||||
|
};
|
||||||
|
domainForBucket = mkOption {
|
||||||
|
type = types.functionTo types.str;
|
||||||
|
default = bucket: "${bucket}.${config.fediversity.garage.web.rootDomain}";
|
||||||
|
};
|
||||||
|
urlForBucket = mkOption {
|
||||||
|
type = types.functionTo types.str;
|
||||||
|
default = bucket: "http://${config.fediversity.garage.web.domainForBucket bucket}";
|
||||||
|
};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -38,7 +38,7 @@ lib.mkIf (config.fediversity.enable && config.fediversity.mastodon.enable) {
|
||||||
extraConfig = rec {
|
extraConfig = rec {
|
||||||
S3_ENABLED = "true";
|
S3_ENABLED = "true";
|
||||||
# TODO: this shouldn't be hard-coded, it should come from the garage configuration
|
# TODO: this shouldn't be hard-coded, it should come from the garage configuration
|
||||||
S3_ENDPOINT = config.fediversity.internal.garage.api.url;
|
S3_ENDPOINT = config.fediversity.garage.api.url;
|
||||||
S3_REGION = "garage";
|
S3_REGION = "garage";
|
||||||
S3_BUCKET = "mastodon";
|
S3_BUCKET = "mastodon";
|
||||||
# use <S3_BUCKET>.<S3_ENDPOINT>
|
# use <S3_BUCKET>.<S3_ENDPOINT>
|
||||||
|
@ -46,7 +46,7 @@ lib.mkIf (config.fediversity.enable && config.fediversity.mastodon.enable) {
|
||||||
AWS_ACCESS_KEY_ID = snakeoil_key.id;
|
AWS_ACCESS_KEY_ID = snakeoil_key.id;
|
||||||
AWS_SECRET_ACCESS_KEY = snakeoil_key.secret;
|
AWS_SECRET_ACCESS_KEY = snakeoil_key.secret;
|
||||||
S3_PROTOCOL = "http";
|
S3_PROTOCOL = "http";
|
||||||
S3_ALIAS_HOST = "${S3_BUCKET}.${config.fediversity.internal.garage.web.rootDomain}";
|
S3_ALIAS_HOST = "${S3_BUCKET}.${config.fediversity.garage.web.rootDomain}";
|
||||||
# SEE: the last section in https://docs.joinmastodon.org/admin/optional/object-storage/
|
# SEE: the last section in https://docs.joinmastodon.org/admin/optional/object-storage/
|
||||||
# TODO: can we set up ACLs with garage?
|
# TODO: can we set up ACLs with garage?
|
||||||
S3_PERMISSION = "";
|
S3_PERMISSION = "";
|
||||||
|
|
|
@ -72,7 +72,7 @@ lib.mkIf (config.fediversity.enable && config.fediversity.peertube.enable) {
|
||||||
settings = {
|
settings = {
|
||||||
object_storage = {
|
object_storage = {
|
||||||
enabled = true;
|
enabled = true;
|
||||||
endpoint = config.fediversity.internal.garage.api.url;
|
endpoint = config.fediversity.garage.api.url;
|
||||||
region = "garage";
|
region = "garage";
|
||||||
upload_acl.public = null; # Garage does not support ACL
|
upload_acl.public = null; # Garage does not support ACL
|
||||||
upload_acl.private = null; # Garage does not support ACL
|
upload_acl.private = null; # Garage does not support ACL
|
||||||
|
@ -84,17 +84,17 @@ lib.mkIf (config.fediversity.enable && config.fediversity.peertube.enable) {
|
||||||
web_videos = rec {
|
web_videos = rec {
|
||||||
bucket_name = "peertube-videos";
|
bucket_name = "peertube-videos";
|
||||||
prefix = "";
|
prefix = "";
|
||||||
base_url = config.fediversity.internal.garage.web.urlForBucket bucket_name;
|
base_url = config.fediversity.garage.web.urlForBucket bucket_name;
|
||||||
};
|
};
|
||||||
videos = rec {
|
videos = rec {
|
||||||
bucket_name = "peertube-videos";
|
bucket_name = "peertube-videos";
|
||||||
prefix = "";
|
prefix = "";
|
||||||
base_url = config.fediversity.internal.garage.web.urlForBucket bucket_name;
|
base_url = config.fediversity.garage.web.urlForBucket bucket_name;
|
||||||
};
|
};
|
||||||
streaming_playlists = rec {
|
streaming_playlists = rec {
|
||||||
bucket_name = "peertube-playlists";
|
bucket_name = "peertube-playlists";
|
||||||
prefix = "";
|
prefix = "";
|
||||||
base_url = config.fediversity.internal.garage.web.urlForBucket bucket_name;
|
base_url = config.fediversity.garage.web.urlForBucket bucket_name;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -57,7 +57,7 @@ lib.mkIf (config.fediversity.enable && config.fediversity.pixelfed.enable) {
|
||||||
nginx = {
|
nginx = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
# locations."/public/".proxyPass = "${config.fediversity.internal.garage.web.urlForBucket "pixelfed"}/public/";
|
# locations."/public/".proxyPass = "${config.fediversity.garage.web.urlForBucket "pixelfed"}/public/";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -73,9 +73,9 @@ lib.mkIf (config.fediversity.enable && config.fediversity.pixelfed.enable) {
|
||||||
AWS_ACCESS_KEY_ID = snakeoil_key.id;
|
AWS_ACCESS_KEY_ID = snakeoil_key.id;
|
||||||
AWS_SECRET_ACCESS_KEY = snakeoil_key.secret;
|
AWS_SECRET_ACCESS_KEY = snakeoil_key.secret;
|
||||||
AWS_DEFAULT_REGION = "garage";
|
AWS_DEFAULT_REGION = "garage";
|
||||||
AWS_URL = config.fediversity.internal.garage.web.urlForBucket "pixelfed";
|
AWS_URL = config.fediversity.garage.web.urlForBucket "pixelfed";
|
||||||
AWS_BUCKET = "pixelfed";
|
AWS_BUCKET = "pixelfed";
|
||||||
AWS_ENDPOINT = config.fediversity.internal.garage.api.url;
|
AWS_ENDPOINT = config.fediversity.garage.api.url;
|
||||||
AWS_USE_PATH_STYLE_ENDPOINT = false;
|
AWS_USE_PATH_STYLE_ENDPOINT = false;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -118,7 +118,7 @@ pkgs.nixosTest {
|
||||||
server.succeed("toot post --media ${testImage}")
|
server.succeed("toot post --media ${testImage}")
|
||||||
|
|
||||||
with subtest("Access garage"):
|
with subtest("Access garage"):
|
||||||
server.succeed("mc alias set garage ${nodes.server.fediversity.internal.garage.api.url} --api s3v4 --path off $AWS_ACCESS_KEY_ID $AWS_SECRET_ACCESS_KEY")
|
server.succeed("mc alias set garage ${nodes.server.fediversity.garage.api.url} --api s3v4 --path off $AWS_ACCESS_KEY_ID $AWS_SECRET_ACCESS_KEY")
|
||||||
server.succeed("mc ls garage/mastodon")
|
server.succeed("mc ls garage/mastodon")
|
||||||
|
|
||||||
with subtest("Access image in garage"):
|
with subtest("Access image in garage"):
|
||||||
|
@ -144,7 +144,7 @@ pkgs.nixosTest {
|
||||||
raise Exception("mastodon did not send a content security policy header")
|
raise Exception("mastodon did not send a content security policy header")
|
||||||
csp = csp_match.group(1)
|
csp = csp_match.group(1)
|
||||||
# the connect-src content security policy should include the garage server
|
# the connect-src content security policy should include the garage server
|
||||||
## TODO: use `nodes.server.fediversity.internal.garage.api.url` same as above, but beware of escaping the regex. Be careful with port 80 though.
|
## TODO: use `nodes.server.fediversity.garage.api.url` same as above, but beware of escaping the regex. Be careful with port 80 though.
|
||||||
garage_csp = re.match(".*; img-src[^;]*web\.garage\.localhost.*", csp)
|
garage_csp = re.match(".*; img-src[^;]*web\.garage\.localhost.*", csp)
|
||||||
if garage_csp is None:
|
if garage_csp is None:
|
||||||
raise Exception("Mastodon's Content-Security-Policy does not include Garage.")
|
raise Exception("Mastodon's Content-Security-Policy does not include Garage.")
|
||||||
|
|
|
@ -220,7 +220,7 @@ pkgs.nixosTest {
|
||||||
server.succeed(f"post-video-in-browser {root_password}")
|
server.succeed(f"post-video-in-browser {root_password}")
|
||||||
|
|
||||||
with subtest("Find video in garage"):
|
with subtest("Find video in garage"):
|
||||||
server.succeed("mc alias set garage ${nodes.server.fediversity.internal.garage.api.url} --api s3v4 --path off $AWS_ACCESS_KEY_ID $AWS_SECRET_ACCESS_KEY")
|
server.succeed("mc alias set garage ${nodes.server.fediversity.garage.api.url} --api s3v4 --path off $AWS_ACCESS_KEY_ID $AWS_SECRET_ACCESS_KEY")
|
||||||
video = server.succeed("mc find garage --regex '\\.mp4'").rstrip()
|
video = server.succeed("mc find garage --regex '\\.mp4'").rstrip()
|
||||||
if video == "":
|
if video == "":
|
||||||
raise Exception("Could not find any .mp4 video stored in Garage")
|
raise Exception("Could not find any .mp4 video stored in Garage")
|
||||||
|
|
|
@ -201,7 +201,7 @@ pkgs.nixosTest {
|
||||||
raise Exception("cannot detect the uploaded image on pixelfed page.")
|
raise Exception("cannot detect the uploaded image on pixelfed page.")
|
||||||
|
|
||||||
with subtest("access garage"):
|
with subtest("access garage"):
|
||||||
server.succeed("mc alias set garage ${nodes.server.fediversity.internal.garage.api.url} --api s3v4 --path off $AWS_ACCESS_KEY_ID $AWS_SECRET_ACCESS_KEY")
|
server.succeed("mc alias set garage ${nodes.server.fediversity.garage.api.url} --api s3v4 --path off $AWS_ACCESS_KEY_ID $AWS_SECRET_ACCESS_KEY")
|
||||||
server.succeed("mc ls garage/pixelfed")
|
server.succeed("mc ls garage/pixelfed")
|
||||||
|
|
||||||
with subtest("access image in garage"):
|
with subtest("access image in garage"):
|
||||||
|
@ -217,7 +217,7 @@ pkgs.nixosTest {
|
||||||
|
|
||||||
with subtest("Check that image comes from garage"):
|
with subtest("Check that image comes from garage"):
|
||||||
src = server.succeed("su - selenium -c 'selenium-script-get-src ${email} ${password}'")
|
src = server.succeed("su - selenium -c 'selenium-script-get-src ${email} ${password}'")
|
||||||
if not src.startswith("${nodes.server.fediversity.internal.garage.web.urlForBucket "pixelfed"}"):
|
if not src.startswith("${nodes.server.fediversity.garage.web.urlForBucket "pixelfed"}"):
|
||||||
raise Exception("image does not come from garage")
|
raise Exception("image does not come from garage")
|
||||||
'';
|
'';
|
||||||
}
|
}
|
||||||
|
|
|
@ -20,7 +20,7 @@ in
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
mapAttrs' (bucket: _: {
|
mapAttrs' (bucket: _: {
|
||||||
name = config.fediversity.internal.garage.web.domainForBucket bucket;
|
name = config.fediversity.garage.web.domainForBucket bucket;
|
||||||
inherit value;
|
inherit value;
|
||||||
}) (filterAttrs (_: { website, ... }: website) config.fediversity.garage.ensureBuckets);
|
}) (filterAttrs (_: { website, ... }: website) config.fediversity.garage.ensureBuckets);
|
||||||
|
|
||||||
|
@ -28,13 +28,13 @@ in
|
||||||
virtualisation.forwardPorts = [
|
virtualisation.forwardPorts = [
|
||||||
{
|
{
|
||||||
from = "host";
|
from = "host";
|
||||||
host.port = config.fediversity.internal.garage.rpc.port;
|
host.port = config.fediversity.garage.rpc.port;
|
||||||
guest.port = config.fediversity.internal.garage.rpc.port;
|
guest.port = config.fediversity.garage.rpc.port;
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
from = "host";
|
from = "host";
|
||||||
host.port = config.fediversity.internal.garage.web.internalPort;
|
host.port = config.fediversity.garage.web.internalPort;
|
||||||
guest.port = config.fediversity.internal.garage.web.internalPort;
|
guest.port = config.fediversity.garage.web.internalPort;
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue