Merge #112: Minor improvements
161ee02550
style: remove extra space (Ștefan D. Mihăilă)4e6e05a4a8
Improve electrs ports descriptions (Ștefan D. Mihăilă)cd722cac1a
Fix identation (Ștefan D. Mihăilă)df784b341e
Expose electrs high-memory option in configuration.nix (Ștefan D. Mihăilă) Pull request description: ACKs for top commit: jonasnick: ACK161ee02550
Tree-SHA512: c730b6979f28f8a26a1a10d47aeb0eaf4a41343b058c271a2710c27c171bf521f64358be1fedafeefb30bb2cdafb37a8665c0292e8cd673eeb575f3afbc8919e
This commit is contained in:
commit
08067a68ab
@ -41,6 +41,8 @@
|
|||||||
# Electrum Server in Rust. Only enable this if hardware wallets are
|
# Electrum Server in Rust. Only enable this if hardware wallets are
|
||||||
# disabled.
|
# disabled.
|
||||||
# services.electrs.enable = true;
|
# services.electrs.enable = true;
|
||||||
|
# If you have ≥8GB memory, enable this option so electrs will sync faster.
|
||||||
|
# services.electrs.high-memory = true;
|
||||||
|
|
||||||
### LIQUIDD
|
### LIQUIDD
|
||||||
# Enable this module to use Liquid, a sidechain for an inter-exchange
|
# Enable this module to use Liquid, a sidechain for an inter-exchange
|
||||||
|
@ -41,19 +41,19 @@ in {
|
|||||||
port = mkOption {
|
port = mkOption {
|
||||||
type = types.ints.u16;
|
type = types.ints.u16;
|
||||||
default = 50001;
|
default = 50001;
|
||||||
description = "Override the default port on which to listen for connections.";
|
description = "RPC port.";
|
||||||
};
|
};
|
||||||
onionport = mkOption {
|
onionport = mkOption {
|
||||||
type = types.ints.u16;
|
type = types.ints.u16;
|
||||||
default = 50002;
|
default = 50002;
|
||||||
description = "Override the default port on which to listen for connections.";
|
description = "Port on which to listen for tor client connections.";
|
||||||
};
|
};
|
||||||
nginxport = mkOption {
|
nginxport = mkOption {
|
||||||
type = types.ints.u16;
|
type = types.ints.u16;
|
||||||
default = 50003;
|
default = 50003;
|
||||||
description = "Override the default port on which to listen for connections.";
|
description = "Port on which to listen for TLS client connections.";
|
||||||
};
|
};
|
||||||
enforceTor = nix-bitcoin-services.enforceTor;
|
enforceTor = nix-bitcoin-services.enforceTor;
|
||||||
};
|
};
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
config = mkIf cfg.enable {
|
||||||
|
@ -32,14 +32,14 @@ in
|
|||||||
# Allow any traffic
|
# Allow any traffic
|
||||||
allowAnyIP = { IPAddressAllow = "any"; };
|
allowAnyIP = { IPAddressAllow = "any"; };
|
||||||
|
|
||||||
enforceTor = mkOption {
|
enforceTor = mkOption {
|
||||||
type = types.bool;
|
type = types.bool;
|
||||||
default = false;
|
default = false;
|
||||||
description = ''
|
description = ''
|
||||||
"Whether to force Tor on a service by only allowing connections from and
|
"Whether to force Tor on a service by only allowing connections from and
|
||||||
to 127.0.0.1;";
|
to 127.0.0.1;";
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@ -161,7 +161,6 @@ in {
|
|||||||
services.electrs.enforceTor = true;
|
services.electrs.enforceTor = true;
|
||||||
services.electrs.onionport = 50002;
|
services.electrs.onionport = 50002;
|
||||||
services.electrs.nginxport = 50003;
|
services.electrs.nginxport = 50003;
|
||||||
services.electrs.high-memory = false;
|
|
||||||
services.tor.hiddenServices.electrs = {
|
services.tor.hiddenServices.electrs = {
|
||||||
map = [{
|
map = [{
|
||||||
port = config.services.electrs.onionport; toPort = config.services.electrs.nginxport;
|
port = config.services.electrs.onionport; toPort = config.services.electrs.nginxport;
|
||||||
|
Loading…
Reference in New Issue
Block a user