forked from hacc/haccfiles
Compare commits
1 commit
main
...
ssl_mumble
Author | SHA1 | Date | |
---|---|---|---|
9e89ff6aa9 |
1 changed files with 21 additions and 2 deletions
|
@ -15,9 +15,28 @@
|
|||
networking.firewall.allowedTCPPorts = [ config.services.murmur.port ];
|
||||
networking.firewall.allowedUDPPorts = [ config.services.murmur.port ];
|
||||
|
||||
# the mumble cert has its own group so that both nginx and murmur can read it
|
||||
# create ssl certs for all used domains
|
||||
services.nginx.virtualHosts = let
|
||||
vhost = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
};
|
||||
in {
|
||||
"mumble.hacc.space" = vhost;
|
||||
"mumble.infra4future.de" = vhost;
|
||||
};
|
||||
|
||||
# create group to share the certs
|
||||
users.groups.mumblecert = {};
|
||||
security.acme.certs."mumble.hacc.space".group = "mumblecert";
|
||||
users.users.nginx.extraGroups = [ "mumblecert" ];
|
||||
users.users.murmur.extraGroups = [ "mumblecert" ];
|
||||
|
||||
# merge the certs into one and reload murmur on update
|
||||
security.acme.certs."mumble.hacc.space" = {
|
||||
group = "mumblecert";
|
||||
extraDomainNames = [ "pad.infra4future.de" ];
|
||||
reloadServices = [ "murmur" ];
|
||||
};
|
||||
|
||||
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue