extraDomainNames = [
"dilion.immae.dev"
"caldance.cs.immae.dev"
- "zulip.carpentier.earth"
- "zulip.tof.carpentier.earth"
- "zulip.dine.carpentier.earth"
- "zulip.quentin.carpentier.earth"
- "zulip.agnes.carpentier.earth"
- "ofn.nc.immae.dev"
-
- "bookstack.cc.immae.dev"
+ "mobilizon.lesateliersduchangement.org"
];
};
systemd.services.nginx.serviceConfig.ProtectHome = "read-only";
auth_basic_user_file ${pkgs.writeText "htpasswd" config.myEnv.websites.caldance.integration.password};
'';
};
- "bookstack.cc.immae.dev" = {
- acmeRoot = config.myServices.certificates.webroot;
- useACMEHost = name;
- forceSSL = true;
- locations."/".proxyPass = "http://localhost:4003";
- };
- "ofn.nc.immae.dev" = {
- acmeRoot = config.myServices.certificates.webroot;
- useACMEHost = name;
- forceSSL = true;
- locations."/".proxyPass = "http://localhost:3000";
- };
- "zulip.carpentier.earth" = {
- acmeRoot = config.myServices.certificates.webroot;
- useACMEHost = name;
- forceSSL = true;
- locations."/".proxyPass = "http://localhost:4002";
- };
- "zulip.tof.carpentier.earth" = {
- acmeRoot = config.myServices.certificates.webroot;
- useACMEHost = name;
- forceSSL = true;
- locations."/".proxyPass = "http://localhost:4002";
- };
- "zulip.dine.carpentier.earth" = {
- acmeRoot = config.myServices.certificates.webroot;
- useACMEHost = name;
- forceSSL = true;
- locations."/".proxyPass = "http://localhost:4002";
- };
- "zulip.quentin.carpentier.earth" = {
- acmeRoot = config.myServices.certificates.webroot;
- useACMEHost = name;
- forceSSL = true;
- locations."/".proxyPass = "http://localhost:4002";
- };
- "zulip.agnes.carpentier.earth" = {
+ "mobilizon.lesateliersduchangement.org" = {
acmeRoot = config.myServices.certificates.webroot;
useACMEHost = name;
forceSSL = true;
- locations."/".proxyPass = "http://localhost:4002";
+ locations."/".proxyPass = "http://localhost:19003";
};
};
};