fix(ops/meta01): fix http listener port, restrict tcp

The config seems a bit underdocumented, but this is what gets it to
listen on 4722 for http.

While we have firewall rules in place, we don't want this to listen on
*:$randomPort, for tcp but just have it disabled.

This doesn't seem to be possible right now, due to a bug in viper, but
we can at least restrict it to listen to localhost only for TCP.

Change-Id: I94d379b8820fd32dc1d75082d3a7fb078f93e4ec
Reviewed-on: https://cl.snix.dev/c/snix/+/30523
Autosubmit: Florian Klink <flokli@flokli.de>
Tested-by: besadii
Reviewed-by: Ryan Lahfa <ryan@lahfa.xyz>
This commit is contained in:
Florian Klink 2025-05-15 19:52:54 +03:00 committed by clbot
parent c9a77e5b58
commit 6666d38584

View file

@ -83,7 +83,11 @@ in
services.irccat = {
enable = true;
config = {
generic.listen = "127.0.0.1:4722";
# FUTUREWORK: disable tcp listener entirely
# Maybe this is https://github.com/spf13/viper/issues/323#issuecomment-309570752 ?
tcp.listen = "127.0.0.1:4723";
http.listen = "127.0.0.1:4722";
http.listeners.generic = { };
irc = {
server = "irc.eu.hackint.org:6697";
tls = true;