try to get adguard login working
This commit is contained in:
@@ -27,7 +27,7 @@ in {
|
|||||||
networking.firewall.allowedUDPPorts = [ 53 ];
|
networking.firewall.allowedUDPPorts = [ 53 ];
|
||||||
|
|
||||||
security.acme.certs."${cfg.fqdn}".server =
|
security.acme.certs."${cfg.fqdn}".server =
|
||||||
"https://127.0.0.1:8443/acme/acme/directory";
|
"https://127.0.0.1:8443/acme/kop-acme/directory";
|
||||||
# nginx reverse proxy
|
# nginx reverse proxy
|
||||||
services.nginx.virtualHosts.${cfg.fqdn} = {
|
services.nginx.virtualHosts.${cfg.fqdn} = {
|
||||||
forceSSL = cfg.useHttps;
|
forceSSL = cfg.useHttps;
|
||||||
@@ -47,7 +47,7 @@ in {
|
|||||||
services.adguardhome = {
|
services.adguardhome = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
schema_version = 20;
|
schema_version = 28;
|
||||||
users = [{
|
users = [{
|
||||||
name = "admin";
|
name = "admin";
|
||||||
password =
|
password =
|
||||||
@@ -59,6 +59,7 @@ in {
|
|||||||
protection_enabled = true;
|
protection_enabled = true;
|
||||||
filtering_enabled = true;
|
filtering_enabled = true;
|
||||||
upstream_dns = [
|
upstream_dns = [
|
||||||
|
"https://dns10.quad9.net/dns-query"
|
||||||
"https://doh.tiar.app/dns-query"
|
"https://doh.tiar.app/dns-query"
|
||||||
"tls://getdnsapi.net"
|
"tls://getdnsapi.net"
|
||||||
"https://dns.adguard-dns.com/dns-query"
|
"https://dns.adguard-dns.com/dns-query"
|
||||||
@@ -156,7 +157,6 @@ in {
|
|||||||
}
|
}
|
||||||
];
|
];
|
||||||
dhcp = { enabled = false; };
|
dhcp = { enabled = false; };
|
||||||
dhcpv6 = { enabled = false; };
|
|
||||||
tls = { enabled = false; };
|
tls = { enabled = false; };
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -55,7 +55,7 @@ in
|
|||||||
after = [ "step-ca.service" ];
|
after = [ "step-ca.service" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
security.acme.certs."${fqdn}".server = "https://127.0.0.1:8443/acme/acme/directory";
|
security.acme.certs."${fqdn}".server = "https://127.0.0.1:8443/acme/kop-acme/directory";
|
||||||
# nginx reverse proxy
|
# nginx reverse proxy
|
||||||
services.nginx.virtualHosts.${fqdn} = {
|
services.nginx.virtualHosts.${fqdn} = {
|
||||||
forceSSL = useHttps;
|
forceSSL = useHttps;
|
||||||
|
|||||||
@@ -49,7 +49,7 @@ in
|
|||||||
nginx.enable = false;
|
nginx.enable = false;
|
||||||
};
|
};
|
||||||
|
|
||||||
security.acme.certs."${fqdn}".server = "https://127.0.0.1:8443/acme/acme/directory";
|
security.acme.certs."${fqdn}".server = "https://127.0.0.1:8443/acme/kop-acme/directory";
|
||||||
services.nginx.virtualHosts."${fqdn}" = {
|
services.nginx.virtualHosts."${fqdn}" = {
|
||||||
forceSSL = useHttps;
|
forceSSL = useHttps;
|
||||||
enableACME = useHttps;
|
enableACME = useHttps;
|
||||||
|
|||||||
@@ -94,7 +94,7 @@ in lib.mkIf cfg.enable {
|
|||||||
# '';
|
# '';
|
||||||
# };
|
# };
|
||||||
security.acme.certs."${fqdn}" = lib.mkIf useStepCa {
|
security.acme.certs."${fqdn}" = lib.mkIf useStepCa {
|
||||||
server = "https://127.0.0.1:8443/acme/acme/directory";
|
server = "https://127.0.0.1:8443/acme/kop-acme/directory";
|
||||||
};
|
};
|
||||||
services.nginx.virtualHosts."${fqdn}" = {
|
services.nginx.virtualHosts."${fqdn}" = {
|
||||||
forceSSL = useHttps;
|
forceSSL = useHttps;
|
||||||
|
|||||||
@@ -6,7 +6,7 @@ let
|
|||||||
in
|
in
|
||||||
{
|
{
|
||||||
imports = [ ./postgres.nix ];
|
imports = [ ./postgres.nix ];
|
||||||
security.acme.certs."${fqdn}".server = "https://127.0.0.1:8443/acme/acme/directory";
|
security.acme.certs."${fqdn}".server = "https://127.0.0.1:8443/acme/kop-acme/directory";
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
||||||
|
|||||||
@@ -72,7 +72,7 @@ in
|
|||||||
provisioners = [
|
provisioners = [
|
||||||
{
|
{
|
||||||
type = "ACME";
|
type = "ACME";
|
||||||
name = "acme";
|
name = "kop-acme";
|
||||||
forceCN = true;
|
forceCN = true;
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
|
|||||||
Reference in New Issue
Block a user