ctucx.git: nixfiles

ctucx' nixfiles

commit 4911c7e8fac2e0af3b58f9849fdd7056fcc836b5
parent 6e91fcb00aee6296395fdb92e3596fa12fd987b9
Author: Katja (ctucx) <git@ctu.cx>
Date: Fri, 7 Mar 2025 12:43:42 +0100

replace `${config.networking.hostName}.ctu.cx` with `${config.networking.fqdn}`
6 files changed, 8 insertions(+), 8 deletions(-)
diff --git a/configurations/nixos/configure/smarthome/influxdb2.nix b/configurations/nixos/configure/smarthome/influxdb2.nix
@@ -25,11 +25,11 @@
 
   services.nginx = {
     enable = true;
-    virtualHosts."influx.home.ctu.cx" = {
+    virtualHosts."influx.${config.networking.domain}" = {
       useACMEHost = "${config.networking.fqdn}";
       forceSSL    = true;
       kTLS        = true;
-      locations."/".proxyPass   = "http://${toString config.services.influxdb2.settings.http-bind-address}/";
+      locations."/".proxyPass = "http://${toString config.services.influxdb2.settings.http-bind-address}/";
     };
   };
 
diff --git a/configurations/nixos/configure/smarthome/mqtt-webui/default.nix b/configurations/nixos/configure/smarthome/mqtt-webui/default.nix
@@ -9,7 +9,7 @@ in {
 
   services.nginx = {
     enable = true;
-    virtualHosts."smart.home.ctu.cx" = {
+    virtualHosts."smart.${config.networking.domain}" = {
       useACMEHost = "${config.networking.fqdn}";
       forceSSL    = true;
       kTLS        = true;
diff --git a/configurations/nixos/default.nix b/configurations/nixos/default.nix
@@ -115,7 +115,7 @@ in {
         RFC2136_TSIG_SECRET_FILE = config.age.secrets.acmeTSIGKey.path;
       };
     };
-    certs."${config.networking.hostName}.${config.networking.domain}" = {
+    certs."${config.networking.fqdn}" = {
       group = "nginx";
       extraDomainNames = (
         config.services.nginx.virtualHosts
diff --git a/configurations/nixos/services/restic-server.nix b/configurations/nixos/services/restic-server.nix
@@ -7,7 +7,7 @@
     owner = "nginx";
   };
 
-  dns.zones."ctu.cx".subdomains."restic.${config.networking.hostName}".CNAME = [ "${config.networking.hostName}.ctu.cx." ];
+  dns.zones."ctu.cx".subdomains."restic.${config.networking.hostName}".CNAME = [ "${config.networking.fqdn}." ];
 
   systemd.services.restic-rest-server.onFailure = [ "email-notify@%i.service" ];
 

@@ -22,7 +22,7 @@
 
     nginx = {
       enable = true;
-      virtualHosts."restic.${config.networking.hostName}.ctu.cx" = {
+      virtualHosts."restic.${config.networking.fqdn}" = {
         useACMEHost = "${config.networking.fqdn}";
         forceSSL    = lib.mkDefault true;
         kTLS        = lib.mkDefault true;
diff --git a/configurations/nixos/services/syncthing-nginx.nix b/configurations/nixos/services/syncthing-nginx.nix
@@ -18,7 +18,7 @@
 
     nginx = {
       enable = true;
-      virtualHosts."syncthing.${config.networking.hostName}.ctu.cx" = {
+      virtualHosts."syncthing.${config.networking.fqdn}" = {
         useACMEHost = "${config.networking.fqdn}";
         forceSSL    = true;
         kTLS        = true;
diff --git a/machines/wanderduene/rclone-restic-server.nix b/machines/wanderduene/rclone-restic-server.nix
@@ -54,7 +54,7 @@
 
   services.nginx = {
     enable = true;
-    virtualHosts."restic.${config.networking.hostName}.ctu.cx" = {
+    virtualHosts."restic.${config.networking.fqdn}" = {
       useACMEHost = "${config.networking.fqdn}";
       forceSSL    = true;
       kTLS        = true;