From 5d3cd0b266f0205c2d543ad2781d0a8b151153df Mon Sep 17 00:00:00 2001 From: blake Date: Tue, 7 Oct 2025 21:20:30 -0500 Subject: [PATCH] 52 current 2025-10-07 21:09:55 25.05.20251001.5b5be50 6.12.49 * --- modules/homelab/services/default.nix.template | 1 + modules/homelab/services/vaultwarden/default.nix | 3 ++- 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/modules/homelab/services/default.nix.template b/modules/homelab/services/default.nix.template index b8c6592..90f6707 100644 --- a/modules/homelab/services/default.nix.template +++ b/modules/homelab/services/default.nix.template @@ -67,6 +67,7 @@ in locations."/" = { proxyPass = "http://127.0.0.1:${toString cfg.port}"; }; + }; # external reverse proxy entry services.nginx.virtualHosts.".blakedheld.xyz" = { enableACME = false; diff --git a/modules/homelab/services/vaultwarden/default.nix b/modules/homelab/services/vaultwarden/default.nix index 9314ee8..c52b4da 100644 --- a/modules/homelab/services/vaultwarden/default.nix +++ b/modules/homelab/services/vaultwarden/default.nix @@ -52,7 +52,7 @@ in # networking.firewall.allowedTCPPorts = [ cfg.port ]; # internal reverse proxy entry - services.nginx.virtualHosts."vaultwarden.snowbelle.lan" = { + services.nginx.virtualHosts."pass.snowbelle.lan" = { enableACME = false; forceSSL = true; sslCertificate = config.sops.secrets."ssl_blakedheld_crt".path; @@ -60,6 +60,7 @@ in locations."/" = { proxyPass = "http://127.0.0.1:${toString cfg.port}"; }; + }; # external reverse proxy entry services.nginx.virtualHosts."vaultwarden.blakedheld.xyz" = { enableACME = false;