{ config, service_configs, username, pkgs, ... }: { services.caddy = { enable = true; email = "titaniumtown@proton.me"; virtualHosts = { ${service_configs.https.domain} = { extraConfig = '' root * ${service_configs.https.data_dir} file_server browse ''; serverAliases = [ "www.${service_configs.https.domain}" ]; }; "immich.${service_configs.https.domain}".extraConfig = '' reverse_proxy :${builtins.toString config.services.immich.port} ''; "jellyfin.${service_configs.https.domain}".extraConfig = '' reverse_proxy :${builtins.toString service_configs.ports.jellyfin} request_body { max_size 4096MB } ''; ${service_configs.gitea.domain}.extraConfig = '' reverse_proxy :${builtins.toString config.services.gitea.settings.server.HTTP_PORT} ''; "bitmagnet.${service_configs.https.domain}".extraConfig = '' # tls internal ${import ../secrets/caddy_auth.nix} reverse_proxy ${service_configs.https.wg_ip}:${builtins.toString service_configs.ports.bitmagnet} ''; "torrent.${service_configs.https.domain}".extraConfig = '' # tls internal ${import ../secrets/caddy_auth.nix} reverse_proxy ${service_configs.https.wg_ip}:${builtins.toString service_configs.ports.torrent} ''; "map.${service_configs.https.domain}".extraConfig = '' # tls internal root * ${service_configs.minecraft.parent_dir}/${service_configs.minecraft.server_name}/squaremap/web file_server browse ''; }; }; systemd.packages = with pkgs; [ nssTools ]; networking.firewall.allowedTCPPorts = [ service_configs.ports.https 80 ]; networking.firewall.allowedUDPPorts = [ service_configs.ports.https ]; users.users.${config.services.caddy.user}.extraGroups = [ "minecraft" ]; users.users.${username}.extraGroups = [ config.services.caddy.group ]; }