forgejo cert todo

This commit is contained in:
Till 2025-12-15 17:53:02 +01:00
parent d3cb19d6f1
commit 842e05de0d
4 changed files with 23 additions and 17 deletions

View file

@ -77,10 +77,15 @@
./system/hardware/arielle.nix ./system/hardware/arielle.nix
./system ./system
./system/web-server ./system/web-server
#infrastructure
./system/web-server/mail
./system/web-server/radicale.nix ./system/web-server/radicale.nix
./system/web-server/outline.nix ./system/web-server/outline.nix
./system/web-server/jenkins.nix ./system/web-server/forgejo.nix
./system/web-server/mail # ./system/web-server/jenkins.nix
# web hosting
./system/web-server/oopsidentify.nix ./system/web-server/oopsidentify.nix
./system/web-server/fundkorb-button.nix ./system/web-server/fundkorb-button.nix
./system/web-server/ksh-map.nix ./system/web-server/ksh-map.nix

View file

@ -10,11 +10,10 @@ in
{ {
security.acme.certs."${config.networking.domain}".extraDomainNames = [ security.acme.certs."${config.networking.domain}".extraDomainNames = [
"outline.${config.networking.domain}" "git.ktiu.net"
]; ];
services.nginx = { services.nginx.virtualHosts."${srv.DOMAIN}" = {
virtualHosts.${cfg.settings.server.DOMAIN} = {
forceSSL = true; forceSSL = true;
useACMEHost = config.networking.domain; useACMEHost = config.networking.domain;
locations."/".proxyPass = "http://localhost:${toString srv.HTTP_PORT}"; locations."/".proxyPass = "http://localhost:${toString srv.HTTP_PORT}";
@ -22,7 +21,6 @@ in
client_max_body_size 512M; client_max_body_size 512M;
''; '';
}; };
};
services.forgejo = { services.forgejo = {
@ -37,11 +35,11 @@ in
DOMAIN = "git.${config.networking.domain}"; DOMAIN = "git.${config.networking.domain}";
# You need to specify this to remove the port from URLs in the web UI. # You need to specify this to remove the port from URLs in the web UI.
ROOT_URL = "https://${srv.DOMAIN}/"; ROOT_URL = "https://${srv.DOMAIN}/";
HTTP_PORT = 3000; HTTP_PORT = 3080;
}; };
# You can temporarily allow registration to create an admin user. # You can temporarily allow registration to create an admin user.
# service.DISABLE_REGISTRATION = true; service.DISABLE_REGISTRATION = true;
# Add support for actions, based on act: https://github.com/nektos/act # Add support for actions, based on act: https://github.com/nektos/act
actions = { actions = {

View file

@ -4,7 +4,6 @@
services.nginx.virtualHosts."karte.kein-schlussstrich-hessen.org" = { services.nginx.virtualHosts."karte.kein-schlussstrich-hessen.org" = {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
onlySSL = true;
root = "/var/www/ksh-map/dist"; root = "/var/www/ksh-map/dist";
}; };
} }

View file

@ -51,8 +51,12 @@ in {
"[::1]/128" "[::1]/128"
]; ];
sslKey = config.security.acme.certs."${config.networking.fqdn}-postfix".directory + "/key.pem"; settings.main.smtpd_tls_chain_files = [
sslCert = config.security.acme.certs."${config.networking.fqdn}-postfix".directory + "/cert.pem"; "${config.security.acme.certs."${config.networking.fqdn}-postfix".directory + "/key.pem"}"
"${config.security.acme.certs."${config.networking.fqdn}-postfix".directory + "/cert.pem"}"
];
# sslKey = config.security.acme.certs."${config.networking.fqdn}-postfix".directory + "/key.pem";
# sslCert = config.security.acme.certs."${config.networking.fqdn}-postfix".directory + "/cert.pem";
enableSubmission = true; enableSubmission = true;
submissionOptions = { submissionOptions = {