summaryrefslogtreecommitdiff
path: root/services/murmur.nix
diff options
context:
space:
mode:
Diffstat (limited to 'services/murmur.nix')
-rw-r--r--services/murmur.nix30
1 files changed, 15 insertions, 15 deletions
diff --git a/services/murmur.nix b/services/murmur.nix
index e3d5d60..f40774f 100644
--- a/services/murmur.nix
+++ b/services/murmur.nix
@@ -1,4 +1,4 @@
-{ fqdn } :{ pkgs, config, self, ... }:
+{ fqdn }: { pkgs, config, self, ... }:
let
certs = config.security.acme.certs;
certDirectory = "${certs.${fqdn}.directory}";
@@ -36,7 +36,7 @@ in
bandwidth = 64000000;
clientCertRequired = true;
hostName = "10.0.1.30";
-# registerHostname = "${fqdn}";
+ # registerHostname = "${fqdn}";
#registerName = "crashoverburn.com";
sslCert = "${certDirectory}/fullchain.pem";
sslKey = "${certDirectory}/key.pem";
@@ -53,21 +53,21 @@ in
security.acme.certs.${fqdn} = {
group = "murmur-cert";
postRun = "systemctl restart murmur.service";
+ webroot = "/var/lib/acme/acme-challenge/";
};
users.groups.murmur-cert.members = [ "murmur" "nginx" ];
-
- services.nginx = {
- enable = true;
- virtualHosts.${fqdn} = {
- listenAddresses = [
- "10.0.1.30"
- ];
- #useACMEHost = "crashoverburn.com";
- enableACME = true;
- forceSSL = true;
- locations."/".return = "301 https://crashoverburn.com";
- };
- };
+# services.nginx = {
+# enable = true;
+# virtualHosts.${fqdn} = {
+# listenAddresses = [
+# "10.0.1.30"
+# ];
+# useACMEHost = "crashoverburn.com";
+# #enableACME = true;
+# forceSSL = true;
+# locations."/".return = "301 https://crashoverburn.com/mumble";
+# };
+# };
}