fixing acme

This commit is contained in:
baduhai 2022-12-20 13:57:38 -03:00
parent e19f0c688e
commit c073ae375a
5 changed files with 16 additions and 16 deletions

View file

@ -1,6 +1,8 @@
{ config, pkgs, libs, ... }: { config, pkgs, libs, ... }:
{ {
users.users.nginx.extraGroups = [ "acme" ];
services = { services = {
nginx = { nginx = {
enable = true; enable = true;
@ -9,17 +11,7 @@
recommendedProxySettings = true; recommendedProxySettings = true;
recommendedTlsSettings = true; recommendedTlsSettings = true;
virtualHosts = { virtualHosts = {
"baduhai.me" = { useACMEHoost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:8000/"; }; "baduhai.me" = { useACMEHost = "baduhai.me"; forceSSL = true; kTLS = true; locations."/".proxyPass = "http://127.0.0.1:8000/"; };
# "detect.baduhai.me" = { default = true; enableACME = true; addSSL = true; locations."/".proxyPass = "http://127.0.0.1:8001/"; };
# "cinny.baduhai.me" = { default = true; enableACME = true; addSSL = true; locations."/".proxyPass = "http://127.0.0.1:8002/"; };
# "jellyfin.baduhai.me" = { default = true; enableACME = true; addSSL = true; locations."/".proxyPass = "http://127.0.0.1:8003/"; };
# "librespeed.baduhai.me" = { default = true; enableACME = true; addSSL = true; locations."/".proxyPass = "http://127.0.0.1:8004/"; };
# "paperless.baduhai.me" = { default = true; enableACME = true; addSSL = true; locations."/".proxyPass = "http://127.0.0.1:8005/"; };
# "pyload.baduhai.me" = { default = true; enableACME = true; addSSL = true; locations."/".proxyPass = "http://127.0.0.1:8006/"; };
# "shiori.baduhai.me" = { default = true; enableACME = true; addSSL = true; locations."/".proxyPass = "http://127.0.0.1:8007/"; };
# "sync.baduhai.me" = { default = true; enableACME = true; addSSL = true; locations."/".proxyPass = "http://127.0.0.1:8008/"; };
# "whoogle.baduhai.me" = { default = true; enableACME = true; addSSL = true; locations."/".proxyPass = "http://127.0.0.1:8009/"; };
# "adguard.baduhai.me" = { default = true; enableACME = true; addSSL = true; locations."/".proxyPass = "http://100.77.225.37:3000/"; };
}; };
}; };
}; };

View file

@ -1,18 +1,18 @@
{ config, pkgs, libs, ... }: { config, pkgs, libs, ... }:
{ {
age.secrets.cloudflare-dns-api-key.file = ../../../secrets/cloudflare-dns-api-key.age; age.secrets.cloudflare-creds.file = ../../../secrets/cloudflare-creds.age;
security.acme = { security.acme = {
acceptTerms = true; acceptTerms = true;
defaults = { defaults = {
email = "baduhai@proton.me"; email = "baduhai@proton.me";
dnsResolver = "1.1.1.1:53"; dnsResolver = "100.100.100.100:53";
dnsProvider = "cloudflare"; dnsProvider = "cloudflare";
credentialsFile = config.age.secrets.cloudflare-dns-api-key.path; credentialsFile = config.age.secrets.cloudflare-creds.path;
}; };
certs."baduhai.me" = { certs."baduhai.me" = {
extraDomainNames = "*.baduhai.me"; extraDomainNames = [ "*.baduhai.me" ];
}; };
}; };
} }

View file

@ -0,0 +1,8 @@
age-encryption.org/v1
-> ssh-ed25519 J6tVTA og1niFee66jNL4Kfi3QKV2kd/5v0/jStyJK/Qv1JoSo
WB5rwJTWzaMTIWkzuugyncLpUoxVtYWUKMS1r8uGs6g
-> NO;Ye`G-grease C rGGC SH>6Ts ;oa~sU
6f6ROG3cBPQrlQ
--- T8+r+Alz+tmTRG9T9n8jmqFcoWh0YsdeKzUtprjOsbY
;Õ±Jè<14>Åö‘:@ TÅI8ʧÕE„5Yäó÷n ÑÖw`Pco
Á-0͘×<C397>ZY“z<E28093>WôMÜ,FÒÔ'ˆrqœ«uÖ¤<C396>3<EFBFBD>Dl?*júV´¨­±E÷kU^à…ÆÓ"áJ;o<Íߋؽ²v ì

Binary file not shown.

View file

@ -6,5 +6,5 @@ let
servers = [ alexandria ]; servers = [ alexandria ];
in in
{ {
"cloudflare-dns-api-key.age".publicKeys = [ alexandria ]; "cloudflare-creds.age".publicKeys = [ alexandria ];
} }