disable dubble tls

This commit is contained in:
admin 2024-03-27 15:30:23 +01:00
parent cd4ebfb807
commit 4eb4b439d0
2 changed files with 19 additions and 9 deletions

View file

@ -2,6 +2,7 @@
let
domain = "sondell.org";
matrixAdress = "m.${domain}";
hostName = "matrix";
fqdn = "${hostName}.${domain}";
baseUrl = "https://${fqdn}";
@ -64,23 +65,23 @@ services.postgresql = {
locations."/_synapse/client".proxyPass = "http://[::1]:8008";
};
# ${domain} = {
# # enableACME = true;
# # forceSSL = true;
# locations."/" = {
# proxyPass = "http://localhost:8008";
# };
${matrixAdress} = {
# enableACME = true;
# forceSSL = true;
locations."/" = {
proxyPass = "http://localhost:8008";
};
# # This section is not needed if the server_name of matrix-synapse is equal to
# # the domain (i.e. example.org from @foo:example.org) and the federation port
# # is 8448.
# # Further reference can be found in the docs about delegation under
# # https://element-hq.github.io/synapse/latest/delegate.html
# locations."= /.well-known/matrix/server".extraConfig = mkWellKnown serverConfig;
locations."= /.well-known/matrix/server".extraConfig = mkWellKnown serverConfig;
# # This is usually needed for homeserver discovery (from e.g. other Matrix clients).
# # Further reference can be found in the upstream docs at
# # https://spec.matrix.org/latest/client-server-api/#getwell-knownmatrixclient
# locations."= /.well-known/matrix/client".extraConfig = mkWellKnown clientConfig;
# };
locations."= /.well-known/matrix/client".extraConfig = mkWellKnown clientConfig;
};
};
}

View file

@ -39,6 +39,15 @@ in
https = true;
autoUpdateApps.enable = true;
extraAppsEnable = true;
extraOptions = {
redis = {
host = "/run/redis/redis.sock";
port = 0;
dbindex = 0;
password = "secret";
timeout = 1.5;
};
};
extraApps = with config.services.nextcloud.package.packages.apps; {
# List of apps we want to install and are already packaged in
# https://github.com/NixOS/nixpkgs/blob/master/pkgs/servers/nextcloud/packages/nextcloud-apps.json