diff options
| author | Gregor Kleen <gkleen@yggdrasil.li> | 2023-01-30 16:19:57 +0100 |
|---|---|---|
| committer | Gregor Kleen <gkleen@yggdrasil.li> | 2023-01-30 16:19:57 +0100 |
| commit | 1e82933a01dcc3810d635567dbef0de286c1e8f2 (patch) | |
| tree | 9fd302fa171c5fb6dbfeddfffdc1e30629bca1db /hosts/surtr/email | |
| parent | 68645f75136d6e82bfb7e27b50c531d1b416c4d5 (diff) | |
| download | nixos-1e82933a01dcc3810d635567dbef0de286c1e8f2.tar nixos-1e82933a01dcc3810d635567dbef0de286c1e8f2.tar.gz nixos-1e82933a01dcc3810d635567dbef0de286c1e8f2.tar.bz2 nixos-1e82933a01dcc3810d635567dbef0de286c1e8f2.tar.xz nixos-1e82933a01dcc3810d635567dbef0de286c1e8f2.zip | |
Revert "..."
This reverts commit 68645f75136d6e82bfb7e27b50c531d1b416c4d5.
Diffstat (limited to 'hosts/surtr/email')
| -rw-r--r-- | hosts/surtr/email/default.nix | 4 |
1 files changed, 0 insertions, 4 deletions
diff --git a/hosts/surtr/email/default.nix b/hosts/surtr/email/default.nix index 01c22ce5..0e2a78eb 100644 --- a/hosts/surtr/email/default.nix +++ b/hosts/surtr/email/default.nix | |||
| @@ -716,8 +716,6 @@ in { | |||
| 716 | 716 | ||
| 717 | virtualHosts = listToAttrs (map (domain: nameValuePair "spm.${domain}" { | 717 | virtualHosts = listToAttrs (map (domain: nameValuePair "spm.${domain}" { |
| 718 | forceSSL = true; | 718 | forceSSL = true; |
| 719 | kTLS = true; | ||
| 720 | http3 = true; | ||
| 721 | sslCertificate = "/run/credentials/nginx.service/spm.${domain}.pem"; | 719 | sslCertificate = "/run/credentials/nginx.service/spm.${domain}.pem"; |
| 722 | sslCertificateKey = "/run/credentials/nginx.service/spm.${domain}.key.pem"; | 720 | sslCertificateKey = "/run/credentials/nginx.service/spm.${domain}.key.pem"; |
| 723 | extraConfig = '' | 721 | extraConfig = '' |
| @@ -736,8 +734,6 @@ in { | |||
| 736 | }; | 734 | }; |
| 737 | }) spmDomains) // listToAttrs (map (domain: nameValuePair "mta-sts.${domain}" { | 735 | }) spmDomains) // listToAttrs (map (domain: nameValuePair "mta-sts.${domain}" { |
| 738 | forceSSL = true; | 736 | forceSSL = true; |
| 739 | kTLS = true; | ||
| 740 | http3 = true; | ||
| 741 | sslCertificate = "/run/credentials/nginx.service/mta-sts.${domain}.pem"; | 737 | sslCertificate = "/run/credentials/nginx.service/mta-sts.${domain}.pem"; |
| 742 | sslCertificateKey = "/run/credentials/nginx.service/mta-sts.${domain}.key.pem"; | 738 | sslCertificateKey = "/run/credentials/nginx.service/mta-sts.${domain}.key.pem"; |
| 743 | sslTrustedCertificate = "/run/credentials/nginx.service/mta-sts.${domain}.chain.pem"; | 739 | sslTrustedCertificate = "/run/credentials/nginx.service/mta-sts.${domain}.chain.pem"; |
