Infini-DL360: use wildcard certificate
This commit is contained in:
parent
2203788b2d
commit
8ab1fe878b
13 changed files with 34 additions and 21 deletions
|
@ -31,7 +31,7 @@ in
|
|||
networking.firewall.allowedTCPPorts = [ 8448 ];
|
||||
|
||||
services.nginx.virtualHosts = {
|
||||
${domain} = common.nginx.ssl // {
|
||||
${domain} = common.nginx.ssl-inx // {
|
||||
locations."^~ /_matrix" = {
|
||||
proxyPass = host;
|
||||
recommendedProxySettings = false;
|
||||
|
|
|
@ -102,7 +102,7 @@ in
|
|||
};
|
||||
};
|
||||
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl // {
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl-inx // {
|
||||
locations."/" = {
|
||||
proxyPass = "http://${cfg.settings.server.DOMAIN}:${toString cfg.settings.server.HTTP_PORT}";
|
||||
extraConfig = ''
|
||||
|
|
|
@ -4,7 +4,7 @@ let
|
|||
domain = "freshrss.inx.moe";
|
||||
in
|
||||
{
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl;
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl-inx;
|
||||
|
||||
services.freshrss = {
|
||||
enable = true;
|
||||
|
|
|
@ -28,7 +28,7 @@ in
|
|||
};
|
||||
};
|
||||
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl // {
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl-inx // {
|
||||
locations."/" = {
|
||||
proxyPass = "http://${cfg.settings.host}:${toString cfg.settings.port}";
|
||||
};
|
||||
|
|
|
@ -9,7 +9,7 @@ let
|
|||
domain = common.subdomain "hydra";
|
||||
in
|
||||
{
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl // {
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl-inx // {
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost:${toString config.services.hydra.port}";
|
||||
};
|
||||
|
|
|
@ -9,7 +9,7 @@ let
|
|||
cfg = config.services.immich;
|
||||
in
|
||||
{
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl // {
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl-inx // {
|
||||
extraConfig = ''
|
||||
client_max_body_size 5000M;
|
||||
|
||||
|
|
|
@ -13,7 +13,7 @@ let
|
|||
'';
|
||||
in
|
||||
{
|
||||
services.nginx.virtualHosts."jellyfin.inx.moe" = common.nginx.ssl // {
|
||||
services.nginx.virtualHosts."jellyfin.inx.moe" = common.nginx.ssl-inx // {
|
||||
extraConfig = ''
|
||||
client_max_body_size 20M;
|
||||
'';
|
||||
|
|
|
@ -27,7 +27,7 @@ in
|
|||
};
|
||||
};
|
||||
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl // {
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl-inx // {
|
||||
locations."/".proxyPass = "http://localhost:5232";
|
||||
};
|
||||
}
|
||||
|
|
|
@ -43,7 +43,7 @@ in
|
|||
|
||||
users.users.nginx.extraGroups = [ "searx" ];
|
||||
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl // {
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl-inx // {
|
||||
locations."/" = {
|
||||
extraConfig = ''
|
||||
include ${config.services.nginx.package}/conf/uwsgi_params;
|
||||
|
|
|
@ -6,7 +6,7 @@
|
|||
}:
|
||||
|
||||
{
|
||||
services.nginx.virtualHosts."thelounge.inx.moe" = common.nginx.ssl // {
|
||||
services.nginx.virtualHosts."thelounge.inx.moe" = common.nginx.ssl-inx // {
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost:${toString config.services.thelounge.port}";
|
||||
};
|
||||
|
|
|
@ -12,7 +12,7 @@ in
|
|||
{
|
||||
persist.directories = [ config.services.vaultwarden.dataDir ];
|
||||
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl // {
|
||||
services.nginx.virtualHosts.${domain} = common.nginx.ssl-inx // {
|
||||
locations."/" = {
|
||||
proxyPass = "http://127.0.0.1:${toString config.services.vaultwarden.config.ROCKET_PORT}";
|
||||
};
|
||||
|
|
|
@ -6,7 +6,12 @@
|
|||
...
|
||||
}:
|
||||
let
|
||||
inherit (common.nginx) ssl ssl-optional;
|
||||
inherit (common.nginx)
|
||||
ssl
|
||||
ssl-optional
|
||||
ssl-inx
|
||||
ssl-inx-optional
|
||||
;
|
||||
|
||||
tryFiles = "$uri $uri.html $uri/ =404";
|
||||
websiteConfig = ''
|
||||
|
@ -56,12 +61,12 @@ in
|
|||
websites
|
||||
// redirects
|
||||
// {
|
||||
"j.inx.moe" = ssl-optional // {
|
||||
"j.inx.moe" = ssl-inx-optional // {
|
||||
locations."/" = {
|
||||
return = "302 $jump_link";
|
||||
};
|
||||
};
|
||||
"blahaj.inx.moe" = ssl-optional // {
|
||||
"blahaj.inx.moe" = ssl-inx-optional // {
|
||||
locations."/" = {
|
||||
tryFiles = "/Blahaj.png =404";
|
||||
root = ./static;
|
||||
|
@ -79,7 +84,7 @@ in
|
|||
return = "301 https://www.ikea.com/us/en/p/blahaj-soft-toy-shark-90373590/";
|
||||
};
|
||||
};
|
||||
"files.inx.moe" = ssl // {
|
||||
"files.inx.moe" = ssl-inx // {
|
||||
locations."/" = {
|
||||
root = "/srv/web/files.inx.moe";
|
||||
extraConfig = ''
|
||||
|
@ -90,7 +95,7 @@ in
|
|||
root = "/srv/web/files.inx.moe";
|
||||
};
|
||||
};
|
||||
"old.inx.moe" = ssl-optional // {
|
||||
"old.inx.moe" = ssl-inx-optional // {
|
||||
locations."/" = {
|
||||
root = "/srv/web/inx.moe";
|
||||
inherit tryFiles;
|
||||
|
|
|
@ -6,17 +6,25 @@
|
|||
domain = "inx.moe";
|
||||
subdomain = subdomain: "${subdomain}.${domain}";
|
||||
|
||||
nginx = rec {
|
||||
ssl-cert = {
|
||||
nginx = {
|
||||
ssl-optional = {
|
||||
enableACME = true;
|
||||
acmeRoot = null;
|
||||
};
|
||||
ssl-optional = ssl-cert // {
|
||||
addSSL = true;
|
||||
};
|
||||
ssl = ssl-cert // {
|
||||
ssl = {
|
||||
enableACME = true;
|
||||
acmeRoot = null;
|
||||
forceSSL = true;
|
||||
};
|
||||
ssl-inx = {
|
||||
useACMEHost = domain;
|
||||
forceSSL = true;
|
||||
};
|
||||
ssl-inx-optional = {
|
||||
useACMEHost = domain;
|
||||
addSSL = true;
|
||||
};
|
||||
};
|
||||
|
||||
rsyncnet = rec {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue