whitespaces and increase nextcloud upload limit

This commit is contained in:
Kopatz
2023-10-28 13:47:18 +02:00
parent ebd645ed6c
commit b2c537ebbd
3 changed files with 28 additions and 22 deletions

View File

@@ -11,7 +11,7 @@
owner = "nginx";
group = "nginx";
};
# Enable Nginx
# Enable Nginx
services.nginx = {
enable = true;
@@ -30,9 +30,9 @@
serverAliases = [ "192.168.2.1" ];
## Force HTTP redirect to HTTPS
forceSSL = true;
#sslTrustedCertificate = "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt";
sslCertificate = config.age.secrets.nextcloud-cert.path ;
sslCertificateKey = config.age.secrets.nextcloud-key.path ;
#sslTrustedCertificate = "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt";
sslCertificate = config.age.secrets.nextcloud-cert.path;
sslCertificateKey = config.age.secrets.nextcloud-key.path;
## LetsEncrypt
#enableACME = true;
};

View File

@@ -5,7 +5,7 @@
firewall = {
enable = true;
allowedTCPPorts = [ 22 53 80 443 ];
allowedUDPPorts = [ 53 ];
allowedUDPPorts = [ 53 5000 ];
};
nameservers = [
"127.0.0.1"

View File

@@ -21,7 +21,7 @@
allowedIPs = [
"192.168.2.2/32"
];
persistentKeepalive = 25;
persistentKeepalive = 25;
endpoint = "192.168.0.6:51820";
publicKey = "dUBPIEnAiHIZCMjqV0ya8qotN3UnMhlEVyGNQcR3gVI=";
}
@@ -29,60 +29,66 @@
allowedIPs = [
"192.168.2.3/32"
];
persistentKeepalive = 25;
persistentKeepalive = 25;
endpoint = "kopatz.ddns.net:51820";
publicKey = "Eg5ZS3zN05mJ/gct6wJlwVAHTlXpkhxFfUd7yscANV0=";
}
{
{
allowedIPs = [
"192.168.2.4/32"
];
persistentKeepalive = 25;
persistentKeepalive = 25;
endpoint = "kopatz.ddns.net:51820";
publicKey = "8Eigfs+k2k2WPaMn+SqDmlSHdMv+I+xcBr/2qhtpGzI=";
}
{
{
allowedIPs = [
"192.168.2.20/32"
];
persistentKeepalive = 25;
persistentKeepalive = 25;
endpoint = "kopatz.ddns.net:51820";
publicKey = "25u1RSfjsx3wb1DMeTm0pvUfUkG7zTjGaN+m0w6ZjCw=";
}
{
{
allowedIPs = [
"192.168.2.21/32"
];
persistentKeepalive = 25;
persistentKeepalive = 25;
endpoint = "kopatz.ddns.net:51820";
publicKey = "S+8F+yxSQvjjoU44LRYqRv1YulqmOKumUtYo/YIh7X8=";
}
{
{
allowedIPs = [
"192.168.2.22/32"
];
persistentKeepalive = 25;
persistentKeepalive = 25;
endpoint = "kopatz.ddns.net:51820";
publicKey = "/dIW7K49vB9HOghFeXvcY7wu2utQltuv6RfgCbxZwlk=";
publicKey = "/dIW7K49vB9HOgheXvcY7wu2utQltuv6RfgCbxZwlk=";
}
{
{
allowedIPs = [
"192.168.2.23/32"
];
persistentKeepalive = 25;
persistentKeepalive = 25;
endpoint = "kopatz.ddns.net:51820";
publicKey = "89rjQXNcyCRUCihqfqcOnctWmhiNR8snpRFF6dyHAmk=";
}
{
{
allowedIPs = [
"192.168.2.24/32"
];
persistentKeepalive = 25;
persistentKeepalive = 25;
endpoint = "kopatz.ddns.net:51820";
publicKey = "adaWtboVz3UhpNBKFirs7slbU2+Y3GaV5yS2EoafwVU=";
}
{
allowedIPs = [
"192.168.2.5/32"
];
persistentKeepalive = 25;
endpoint = "kopatz.ddns.net:51820";
publicKey = "g5uTlA1IciXgtSbECjhVis0dajRAc53Oa7Hz6dUI+0Q=";
}
];
privateKeyFile = config.age.secrets.wireguard-private.path;
};