From 00a670cbf5f406cffaed4c77ebf08a5f41ddccca Mon Sep 17 00:00:00 2001 From: Rouven Seifert Date: Mon, 25 Mar 2024 19:09:28 +0100 Subject: [PATCH] nginx: remove useless enableACME options --- hosts/falkenstein/modules/mail/rspamd.nix | 2 -- hosts/falkenstein/modules/nginx/default.nix | 2 -- hosts/falkenstein/modules/trucksimulatorbot/default.nix | 2 -- hosts/nuc/modules/cache/default.nix | 2 -- hosts/nuc/modules/matrix/default.nix | 7 ------- hosts/nuc/modules/seafile/default.nix | 2 -- hosts/nuc/modules/vaultwarden/default.nix | 2 -- 7 files changed, 19 deletions(-) diff --git a/hosts/falkenstein/modules/mail/rspamd.nix b/hosts/falkenstein/modules/mail/rspamd.nix index d914cc0..1d119c0 100644 --- a/hosts/falkenstein/modules/mail/rspamd.nix +++ b/hosts/falkenstein/modules/mail/rspamd.nix @@ -39,8 +39,6 @@ }; }; nginx.virtualHosts."rspamd.${config.networking.domain}" = { - enableACME = true; - forceSSL = true; locations = { "/" = { proxyPass = "http://127.0.0.1:11334"; diff --git a/hosts/falkenstein/modules/nginx/default.nix b/hosts/falkenstein/modules/nginx/default.nix index 6e3e13f..25c6c8d 100644 --- a/hosts/falkenstein/modules/nginx/default.nix +++ b/hosts/falkenstein/modules/nginx/default.nix @@ -52,8 +52,6 @@ recommendedGzipSettings = true; recommendedOptimisation = true; virtualHosts."${config.networking.domain}" = { - enableACME = true; - forceSSL = true; root = "/srv/web/${config.networking.domain}"; locations = { "/.well-known/matrix/client".extraConfig = mkWellKnown clientConfig; diff --git a/hosts/falkenstein/modules/trucksimulatorbot/default.nix b/hosts/falkenstein/modules/trucksimulatorbot/default.nix index 26bf38a..1811391 100644 --- a/hosts/falkenstein/modules/trucksimulatorbot/default.nix +++ b/hosts/falkenstein/modules/trucksimulatorbot/default.nix @@ -25,8 +25,6 @@ in }; services.nginx.virtualHosts = { "${domain}" = { - enableACME = true; - forceSSL = true; locations."/invite".return = "301 https://discord.com/api/oauth2/authorize?client_id=831052837353816066&permissions=262144&scope=bot%20applications.commands"; locations."/" = { proxyPass = "http://127.0.0.1:${toString config.services.trucksimulatorbot.listenPort}"; diff --git a/hosts/nuc/modules/cache/default.nix b/hosts/nuc/modules/cache/default.nix index 049d0b2..7d50632 100644 --- a/hosts/nuc/modules/cache/default.nix +++ b/hosts/nuc/modules/cache/default.nix @@ -11,8 +11,6 @@ in secretKeyFile = config.age.secrets.cache.path; }; services.nginx.virtualHosts."${domain}" = { - enableACME = true; - forceSSL = true; locations."/" = { proxyPass = "http://127.0.0.1:${toString config.services.nix-serve.port}"; }; diff --git a/hosts/nuc/modules/matrix/default.nix b/hosts/nuc/modules/matrix/default.nix index 895fc8b..3f7c639 100644 --- a/hosts/nuc/modules/matrix/default.nix +++ b/hosts/nuc/modules/matrix/default.nix @@ -67,10 +67,6 @@ in virtualHosts = { # synapse "${domain}" = { - enableACME = true; - forceSSL = true; - - # locations."/".extraConfig = "return 404;"; # # proxy to synapse @@ -83,9 +79,6 @@ in # element "${domainClient}" = { - enableACME = true; - forceSSL = true; - root = pkgs.element-web.override { conf = { default_server_config = { diff --git a/hosts/nuc/modules/seafile/default.nix b/hosts/nuc/modules/seafile/default.nix index d2608c8..fb8dca0 100644 --- a/hosts/nuc/modules/seafile/default.nix +++ b/hosts/nuc/modules/seafile/default.nix @@ -12,8 +12,6 @@ in seafileSettings.fileserver.port = 8083; }; services.nginx.virtualHosts."${domain}" = { - enableACME = true; - forceSSL = true; locations."/" = { proxyPass = "http://unix:/run/seahub/gunicorn.sock"; }; diff --git a/hosts/nuc/modules/vaultwarden/default.nix b/hosts/nuc/modules/vaultwarden/default.nix index 0f88ae0..fe0ac59 100644 --- a/hosts/nuc/modules/vaultwarden/default.nix +++ b/hosts/nuc/modules/vaultwarden/default.nix @@ -30,8 +30,6 @@ in ensureDatabases = [ "vaultwarden" ]; }; services.nginx.virtualHosts."${domain}" = { - enableACME = true; - forceSSL = true; locations."/" = { proxyPass = "http://127.0.0.1:${toString config.services.vaultwarden.config.rocketPort}"; };