nginx: remove useless enableACME options

This commit is contained in:
Rouven Seifert 2024-03-25 19:09:28 +01:00
parent 4fcf655dc4
commit 00a670cbf5
Signed by: rouven.seifert
GPG key ID: B95E8FE6B11C4D09
7 changed files with 0 additions and 19 deletions

View file

@ -39,8 +39,6 @@
}; };
}; };
nginx.virtualHosts."rspamd.${config.networking.domain}" = { nginx.virtualHosts."rspamd.${config.networking.domain}" = {
enableACME = true;
forceSSL = true;
locations = { locations = {
"/" = { "/" = {
proxyPass = "http://127.0.0.1:11334"; proxyPass = "http://127.0.0.1:11334";

View file

@ -52,8 +52,6 @@
recommendedGzipSettings = true; recommendedGzipSettings = true;
recommendedOptimisation = true; recommendedOptimisation = true;
virtualHosts."${config.networking.domain}" = { virtualHosts."${config.networking.domain}" = {
enableACME = true;
forceSSL = true;
root = "/srv/web/${config.networking.domain}"; root = "/srv/web/${config.networking.domain}";
locations = { locations = {
"/.well-known/matrix/client".extraConfig = mkWellKnown clientConfig; "/.well-known/matrix/client".extraConfig = mkWellKnown clientConfig;

View file

@ -25,8 +25,6 @@ in
}; };
services.nginx.virtualHosts = { services.nginx.virtualHosts = {
"${domain}" = { "${domain}" = {
enableACME = true;
forceSSL = true;
locations."/invite".return = "301 https://discord.com/api/oauth2/authorize?client_id=831052837353816066&permissions=262144&scope=bot%20applications.commands"; locations."/invite".return = "301 https://discord.com/api/oauth2/authorize?client_id=831052837353816066&permissions=262144&scope=bot%20applications.commands";
locations."/" = { locations."/" = {
proxyPass = "http://127.0.0.1:${toString config.services.trucksimulatorbot.listenPort}"; proxyPass = "http://127.0.0.1:${toString config.services.trucksimulatorbot.listenPort}";

View file

@ -11,8 +11,6 @@ in
secretKeyFile = config.age.secrets.cache.path; secretKeyFile = config.age.secrets.cache.path;
}; };
services.nginx.virtualHosts."${domain}" = { services.nginx.virtualHosts."${domain}" = {
enableACME = true;
forceSSL = true;
locations."/" = { locations."/" = {
proxyPass = "http://127.0.0.1:${toString config.services.nix-serve.port}"; proxyPass = "http://127.0.0.1:${toString config.services.nix-serve.port}";
}; };

View file

@ -67,10 +67,6 @@ in
virtualHosts = { virtualHosts = {
# synapse # synapse
"${domain}" = { "${domain}" = {
enableACME = true;
forceSSL = true;
# locations."/".extraConfig = "return 404;"; # locations."/".extraConfig = "return 404;";
# # proxy to synapse # # proxy to synapse
@ -83,9 +79,6 @@ in
# element # element
"${domainClient}" = { "${domainClient}" = {
enableACME = true;
forceSSL = true;
root = pkgs.element-web.override { root = pkgs.element-web.override {
conf = { conf = {
default_server_config = { default_server_config = {

View file

@ -12,8 +12,6 @@ in
seafileSettings.fileserver.port = 8083; seafileSettings.fileserver.port = 8083;
}; };
services.nginx.virtualHosts."${domain}" = { services.nginx.virtualHosts."${domain}" = {
enableACME = true;
forceSSL = true;
locations."/" = { locations."/" = {
proxyPass = "http://unix:/run/seahub/gunicorn.sock"; proxyPass = "http://unix:/run/seahub/gunicorn.sock";
}; };

View file

@ -30,8 +30,6 @@ in
ensureDatabases = [ "vaultwarden" ]; ensureDatabases = [ "vaultwarden" ];
}; };
services.nginx.virtualHosts."${domain}" = { services.nginx.virtualHosts."${domain}" = {
enableACME = true;
forceSSL = true;
locations."/" = { locations."/" = {
proxyPass = "http://127.0.0.1:${toString config.services.vaultwarden.config.rocketPort}"; proxyPass = "http://127.0.0.1:${toString config.services.vaultwarden.config.rocketPort}";
}; };