From 1cc3f63895db499c17dac640e9a44d7eda86d97e Mon Sep 17 00:00:00 2001 From: blake Date: Thu, 9 Oct 2025 11:43:47 -0500 Subject: [PATCH] 149 current 2025-10-09 03:59:16 25.05.20251006.20c4598 6.12.50 * --- .../services/arr/sonarr/default_temp.nix | 90 ------------------- 1 file changed, 90 deletions(-) delete mode 100644 modules/homelab/services/arr/sonarr/default_temp.nix diff --git a/modules/homelab/services/arr/sonarr/default_temp.nix b/modules/homelab/services/arr/sonarr/default_temp.nix deleted file mode 100644 index 51fe1c1..0000000 --- a/modules/homelab/services/arr/sonarr/default_temp.nix +++ /dev/null @@ -1,90 +0,0 @@ -{ pkgs, config, lib, ... }: - -let - service = "sonarr"; - cfg = config.modules.services.${service}; - sec = config.sops.secrets; - homelab = config.homelab; -in -{ - options.modules.services.${service} = { - enable = lib.mkEnableOption "enables ${service}"; - - # set port options - port = lib.mkOption { - type = lib.types.int; - default = 7107; - description = "set port for ${service} (default: ${toString default_port}"; - }; - url = lib.mkOption { - type = lib.types.str; - default = "${service}.${homelab.basedomain}"; - description = "set domain for ${service} reverse proxy entry"; - }; - data_dir = lib.mkOption { - type = lib.types.str; - default = "/var/lib/${service}"; - description = "set data directory for ${service}"; - }; - ids = lib.mkOption { - type = lib.types.int; - default = ${port}; - description = "set uid and pid of ${service} user (matches port by default)"; - }; - backup = lib.mkOption { - type = lib.types.bool; - default = true; - description = "enable backups for ${service}"; - }; - }; - - config = lib.mkIf cfg.enable { - - # declare ${service} group - users.groups.${service} = { gid = cfg.ids; }; - - # declare ${service} user - users.users.${service} = { - description = "${service} server user"; - uid = cfg.ids; - isSystemUser = true; - home = cfg.data_dir; - createHome = true; - group = "${service}"; - extraGroups = [ "media" ]; - }; - - # enable the ${service} service - services.${service} = { - enable = true; - openFirewall = true; - user = "${service}"; - group = "${service}"; - dataDir = cfg.data_dir; - settings = { - server.port = cfg.port; - }; - }; - - # override umask to make permissions work out - systemd.services.${service}.serviceConfig = { - UMask = lib.mkForce "0007"; - }; - -# # open firewall -# networking.firewall.allowedTCPPorts = [ cfg.port ]; - - # internal reverse proxy entry - services.nginx.virtualHosts."${url}" = { - forceSSL = true; - sslCertificate = sec."ssl_blakedheld_crt".path; - sslCertificateKey = sec."ssl_blakedheld_key".path; - locations."/" = { - proxyPass = "http://127.0.0.1:${toString cfg.port}"; - }; - }; - - # add to backups - modules.system.backups.paths = lib.mkIf cfg.backup [ cfg.data_dir ]; - }; -}