create nginx virtual host for home.beta.rz.ens.wtf
This commit is contained in:
parent
7dd205ad90
commit
0dfcfe243e
4 changed files with 29 additions and 11 deletions
|
@ -16,7 +16,7 @@ with my.ipv6; # contains { standard, acme }
|
|||
SOA = {
|
||||
nameServer = "ns1.${my.subZone}.";
|
||||
adminEmail = my.email;
|
||||
serial = 2021111200; # Y M D Version
|
||||
serial = 2021111300; # Y M D Version
|
||||
};
|
||||
|
||||
NS = [
|
||||
|
@ -35,6 +35,7 @@ with my.ipv6; # contains { standard, acme }
|
|||
auth.AAAA = standard;
|
||||
push.AAAA = standard;
|
||||
ns1.AAAA = standard;
|
||||
beta.AAAA = public-cof-ips;
|
||||
|
||||
builders.subdomains = lib.mapAttrs (n: AAAA: { inherit AAAA; }) remoteBuilders;
|
||||
|
||||
|
|
|
@ -11,6 +11,7 @@
|
|||
./nextcloud.nix
|
||||
./minecraft.nix
|
||||
./factorio.nix
|
||||
./nginx.nix
|
||||
# TODO monitoring
|
||||
];
|
||||
|
||||
|
|
|
@ -19,16 +19,6 @@
|
|||
};
|
||||
|
||||
services.nginx = {
|
||||
enable = true;
|
||||
|
||||
recommendedGzipSettings = true;
|
||||
recommendedOptimisation = true;
|
||||
recommendedProxySettings = true;
|
||||
recommendedTlsSettings = true;
|
||||
|
||||
# # Only allow PFS-enabled ciphers with AES256
|
||||
# sslCiphers = "AES256+EECDH:AES256+EDH:!aNULL";
|
||||
|
||||
virtualHosts = {
|
||||
"nuage.beta.rz.ens.wtf" = {
|
||||
forceSSL = true;
|
||||
|
|
26
machines/public-cof/nginx.nix
Normal file
26
machines/public-cof/nginx.nix
Normal file
|
@ -0,0 +1,26 @@
|
|||
{ ... }:
|
||||
{
|
||||
services.nginx = {
|
||||
enable = true;
|
||||
|
||||
recommendedGzipSettings = true;
|
||||
recommendedOptimisation = true;
|
||||
recommendedProxySettings = true;
|
||||
recommendedTlsSettings = true;
|
||||
|
||||
# # Only allow PFS-enabled ciphers with AES256
|
||||
# sslCiphers = "AES256+EECDH:AES256+EDH:!aNULL";
|
||||
|
||||
virtualHosts = {
|
||||
"home.beta.rz.ens.wtf" = {
|
||||
serverAliases = [ "beta.rz.ens.wtf" ];
|
||||
forceSSL = true;
|
||||
enableACME = true;
|
||||
root = "/var/public-cof/home";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [ 80 443 ];
|
||||
networking.firewall.allowedUDPPorts = [ 80 443 ];
|
||||
}
|
Loading…
Reference in a new issue