mirror of
https://git.sr.ht/~rouven/nixos-config
synced 2024-11-15 05:13:10 +01:00
nginx: remove useless enableACME options
This commit is contained in:
parent
4fcf655dc4
commit
00a670cbf5
|
@ -39,8 +39,6 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
nginx.virtualHosts."rspamd.${config.networking.domain}" = {
|
nginx.virtualHosts."rspamd.${config.networking.domain}" = {
|
||||||
enableACME = true;
|
|
||||||
forceSSL = true;
|
|
||||||
locations = {
|
locations = {
|
||||||
"/" = {
|
"/" = {
|
||||||
proxyPass = "http://127.0.0.1:11334";
|
proxyPass = "http://127.0.0.1:11334";
|
||||||
|
|
|
@ -52,8 +52,6 @@
|
||||||
recommendedGzipSettings = true;
|
recommendedGzipSettings = true;
|
||||||
recommendedOptimisation = true;
|
recommendedOptimisation = true;
|
||||||
virtualHosts."${config.networking.domain}" = {
|
virtualHosts."${config.networking.domain}" = {
|
||||||
enableACME = true;
|
|
||||||
forceSSL = true;
|
|
||||||
root = "/srv/web/${config.networking.domain}";
|
root = "/srv/web/${config.networking.domain}";
|
||||||
locations = {
|
locations = {
|
||||||
"/.well-known/matrix/client".extraConfig = mkWellKnown clientConfig;
|
"/.well-known/matrix/client".extraConfig = mkWellKnown clientConfig;
|
||||||
|
|
|
@ -25,8 +25,6 @@ in
|
||||||
};
|
};
|
||||||
services.nginx.virtualHosts = {
|
services.nginx.virtualHosts = {
|
||||||
"${domain}" = {
|
"${domain}" = {
|
||||||
enableACME = true;
|
|
||||||
forceSSL = true;
|
|
||||||
locations."/invite".return = "301 https://discord.com/api/oauth2/authorize?client_id=831052837353816066&permissions=262144&scope=bot%20applications.commands";
|
locations."/invite".return = "301 https://discord.com/api/oauth2/authorize?client_id=831052837353816066&permissions=262144&scope=bot%20applications.commands";
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://127.0.0.1:${toString config.services.trucksimulatorbot.listenPort}";
|
proxyPass = "http://127.0.0.1:${toString config.services.trucksimulatorbot.listenPort}";
|
||||||
|
|
2
hosts/nuc/modules/cache/default.nix
vendored
2
hosts/nuc/modules/cache/default.nix
vendored
|
@ -11,8 +11,6 @@ in
|
||||||
secretKeyFile = config.age.secrets.cache.path;
|
secretKeyFile = config.age.secrets.cache.path;
|
||||||
};
|
};
|
||||||
services.nginx.virtualHosts."${domain}" = {
|
services.nginx.virtualHosts."${domain}" = {
|
||||||
enableACME = true;
|
|
||||||
forceSSL = true;
|
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://127.0.0.1:${toString config.services.nix-serve.port}";
|
proxyPass = "http://127.0.0.1:${toString config.services.nix-serve.port}";
|
||||||
};
|
};
|
||||||
|
|
|
@ -67,10 +67,6 @@ in
|
||||||
virtualHosts = {
|
virtualHosts = {
|
||||||
# synapse
|
# synapse
|
||||||
"${domain}" = {
|
"${domain}" = {
|
||||||
enableACME = true;
|
|
||||||
forceSSL = true;
|
|
||||||
|
|
||||||
|
|
||||||
# locations."/".extraConfig = "return 404;";
|
# locations."/".extraConfig = "return 404;";
|
||||||
|
|
||||||
# # proxy to synapse
|
# # proxy to synapse
|
||||||
|
@ -83,9 +79,6 @@ in
|
||||||
|
|
||||||
# element
|
# element
|
||||||
"${domainClient}" = {
|
"${domainClient}" = {
|
||||||
enableACME = true;
|
|
||||||
forceSSL = true;
|
|
||||||
|
|
||||||
root = pkgs.element-web.override {
|
root = pkgs.element-web.override {
|
||||||
conf = {
|
conf = {
|
||||||
default_server_config = {
|
default_server_config = {
|
||||||
|
|
|
@ -12,8 +12,6 @@ in
|
||||||
seafileSettings.fileserver.port = 8083;
|
seafileSettings.fileserver.port = 8083;
|
||||||
};
|
};
|
||||||
services.nginx.virtualHosts."${domain}" = {
|
services.nginx.virtualHosts."${domain}" = {
|
||||||
enableACME = true;
|
|
||||||
forceSSL = true;
|
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://unix:/run/seahub/gunicorn.sock";
|
proxyPass = "http://unix:/run/seahub/gunicorn.sock";
|
||||||
};
|
};
|
||||||
|
|
|
@ -30,8 +30,6 @@ in
|
||||||
ensureDatabases = [ "vaultwarden" ];
|
ensureDatabases = [ "vaultwarden" ];
|
||||||
};
|
};
|
||||||
services.nginx.virtualHosts."${domain}" = {
|
services.nginx.virtualHosts."${domain}" = {
|
||||||
enableACME = true;
|
|
||||||
forceSSL = true;
|
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://127.0.0.1:${toString config.services.vaultwarden.config.rocketPort}";
|
proxyPass = "http://127.0.0.1:${toString config.services.vaultwarden.config.rocketPort}";
|
||||||
};
|
};
|
||||||
|
|
Loading…
Reference in a new issue