diff options
| author | Gregor Kleen <gkleen@yggdrasil.li> | 2022-02-27 17:15:34 +0100 |
|---|---|---|
| committer | Gregor Kleen <gkleen@yggdrasil.li> | 2022-02-27 17:15:34 +0100 |
| commit | ac7290dc3ca3db1047ce3857df0032d506db9f1e (patch) | |
| tree | 2c160e8e630a0bd38973f364cf80c5e4e1cd82a5 /hosts/surtr/matrix | |
| parent | 02636f76e947148ef5edbe516d78a937d54119b7 (diff) | |
| download | nixos-ac7290dc3ca3db1047ce3857df0032d506db9f1e.tar nixos-ac7290dc3ca3db1047ce3857df0032d506db9f1e.tar.gz nixos-ac7290dc3ca3db1047ce3857df0032d506db9f1e.tar.bz2 nixos-ac7290dc3ca3db1047ce3857df0032d506db9f1e.tar.xz nixos-ac7290dc3ca3db1047ce3857df0032d506db9f1e.zip | |
surtr: matrix: remove synapse-admin
Diffstat (limited to 'hosts/surtr/matrix')
| -rw-r--r-- | hosts/surtr/matrix/default.nix | 24 |
1 files changed, 0 insertions, 24 deletions
diff --git a/hosts/surtr/matrix/default.nix b/hosts/surtr/matrix/default.nix index 24a78853..842c6c56 100644 --- a/hosts/surtr/matrix/default.nix +++ b/hosts/surtr/matrix/default.nix | |||
| @@ -141,18 +141,6 @@ with lib; | |||
| 141 | }; | 141 | }; |
| 142 | }; | 142 | }; |
| 143 | }; | 143 | }; |
| 144 | |||
| 145 | virtualHosts."admin.synapse.li" = { | ||
| 146 | forceSSL = true; | ||
| 147 | sslCertificate = "/run/credentials/nginx.service/admin.synapse.li.pem"; | ||
| 148 | sslCertificateKey = "/run/credentials/nginx.service/admin.synapse.li.key.pem"; | ||
| 149 | sslTrustedCertificate = "/run/credentials/nginx.service/admin.synapse.li.chain.pem"; | ||
| 150 | extraConfig = '' | ||
| 151 | add_header Strict-Transport-Security "max-age=63072000" always; | ||
| 152 | ''; | ||
| 153 | |||
| 154 | root = pkgs.synapse-admin; | ||
| 155 | }; | ||
| 156 | }; | 144 | }; |
| 157 | 145 | ||
| 158 | security.acme.domains = { | 146 | security.acme.domains = { |
| @@ -164,14 +152,6 @@ with lib; | |||
| 164 | ''; | 152 | ''; |
| 165 | }; | 153 | }; |
| 166 | }; | 154 | }; |
| 167 | "admin.synapse.li" = { | ||
| 168 | zone = "synapse.li"; | ||
| 169 | certCfg = { | ||
| 170 | postRun = '' | ||
| 171 | ${pkgs.systemd}/bin/systemctl try-restart nginx.service | ||
| 172 | ''; | ||
| 173 | }; | ||
| 174 | }; | ||
| 175 | "turn.synapse.li" = { | 155 | "turn.synapse.li" = { |
| 176 | zone = "synapse.li"; | 156 | zone = "synapse.li"; |
| 177 | certCfg = { | 157 | certCfg = { |
| @@ -201,10 +181,6 @@ with lib; | |||
| 201 | "element.synapse.li.key.pem:${config.security.acme.certs."element.synapse.li".directory}/key.pem" | 181 | "element.synapse.li.key.pem:${config.security.acme.certs."element.synapse.li".directory}/key.pem" |
| 202 | "element.synapse.li.pem:${config.security.acme.certs."element.synapse.li".directory}/fullchain.pem" | 182 | "element.synapse.li.pem:${config.security.acme.certs."element.synapse.li".directory}/fullchain.pem" |
| 203 | "element.synapse.li.chain.pem:${config.security.acme.certs."element.synapse.li".directory}/chain.pem" | 183 | "element.synapse.li.chain.pem:${config.security.acme.certs."element.synapse.li".directory}/chain.pem" |
| 204 | |||
| 205 | "admin.synapse.li.key.pem:${config.security.acme.certs."admin.synapse.li".directory}/key.pem" | ||
| 206 | "admin.synapse.li.pem:${config.security.acme.certs."admin.synapse.li".directory}/fullchain.pem" | ||
| 207 | "admin.synapse.li.chain.pem:${config.security.acme.certs."admin.synapse.li".directory}/chain.pem" | ||
| 208 | ]; | 184 | ]; |
| 209 | }; | 185 | }; |
| 210 | }; | 186 | }; |
