remove quic

This commit is contained in:
Lukas Wurzinger 2024-08-21 00:02:15 +02:00
parent a850cfda47
commit 9dbb4039c2
6 changed files with 6 additions and 14 deletions

View file

@ -63,11 +63,11 @@
}, },
"hardware": { "hardware": {
"locked": { "locked": {
"lastModified": 1723310128, "lastModified": 1724067415,
"narHash": "sha256-IiH8jG6PpR4h9TxSGMYh+2/gQiJW9MwehFvheSb5rPc=", "narHash": "sha256-WJBAEFXAtA41RMpK8mvw0cQ62CJkNMBtzcEeNIJV7b0=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "c54cf53e022b0b3c1d3b8207aa0f9b194c24f0cf", "rev": "b09c46430ffcf18d575acf5c339b38ac4e1db5d2",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -127,11 +127,11 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1723637854, "lastModified": 1723991338,
"narHash": "sha256-med8+5DSWa2UnOqtdICndjDAEjxr5D7zaIiK4pn0Q7c=", "narHash": "sha256-Grh5PF0+gootJfOJFenTTxDTYPidA3V28dqJ/WV7iis=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "c3aa7b8938b17aebd2deecf7be0636000d62a2b9", "rev": "8a3354191c0d7144db9756a74755672387b702ba",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -28,7 +28,6 @@ in {
services.nginx.virtualHosts.${virtualHostName} = { services.nginx.virtualHosts.${virtualHostName} = {
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
quic = true;
locations."/".proxyPass = "http://${config.services.microbin.settings.MICROBIN_BIND}:${builtins.toString config.services.microbin.settings.MICROBIN_PORT}"; locations."/".proxyPass = "http://${config.services.microbin.settings.MICROBIN_BIND}:${builtins.toString config.services.microbin.settings.MICROBIN_PORT}";
}; };

View file

@ -19,7 +19,6 @@ in {
services.nginx.virtualHosts.${virtualHostName} = { services.nginx.virtualHosts.${virtualHostName} = {
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
quic = true;
locations."/".proxyPass = "http://${config.services.miniflux.config.LISTEN_ADDR}"; locations."/".proxyPass = "http://${config.services.miniflux.config.LISTEN_ADDR}";
}; };

View file

@ -1,11 +1,9 @@
{ {
config, config,
pkgs,
... ...
}: { }: {
services.nginx = { services.nginx = {
enable = true; enable = true;
package = pkgs.nginxQuic;
recommendedBrotliSettings = true; recommendedBrotliSettings = true;
recommendedGzipSettings = true; recommendedGzipSettings = true;
@ -31,7 +29,6 @@
${domain} = { ${domain} = {
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
quic = true;
root = "/var/www/${domain}"; root = "/var/www/${domain}";
}; };
@ -39,7 +36,6 @@
"log.${domain}" = { "log.${domain}" = {
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
quic = true;
root = "/var/www/log.${domain}"; root = "/var/www/log.${domain}";
}; };

View file

@ -12,7 +12,6 @@ in {
services.nginx.virtualHosts.${virtualHostName} = { services.nginx.virtualHosts.${virtualHostName} = {
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
quic = true;
locations."/".proxyPass = "http://${config.services.syncthing.guiAddress}"; locations."/".proxyPass = "http://${config.services.syncthing.guiAddress}";
}; };

View file

@ -32,7 +32,6 @@ in {
services.nginx.virtualHosts.${virtualHostName} = { services.nginx.virtualHosts.${virtualHostName} = {
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
quic = true;
locations."/" = { locations."/" = {
proxyPass = "http://${config.services.vaultwarden.config.ROCKET_ADDRESS}:${builtins.toString config.services.vaultwarden.config.ROCKET_PORT}"; proxyPass = "http://${config.services.vaultwarden.config.ROCKET_ADDRESS}:${builtins.toString config.services.vaultwarden.config.ROCKET_PORT}";