49 current 2025-10-07 20:40:25 25.05.20251001.5b5be50 6.12.49 *

This commit is contained in:
2025-10-07 20:44:14 -05:00
parent eff96cb051
commit 345d32f5fd
3 changed files with 14 additions and 3 deletions

View File

@@ -1,6 +1,6 @@
# flake for blakes nixos config # flake for blakes nixos config
# define new devices in outputs # define new devices in outputs
# generation: 48 current 2025-10-07 20:39:26 25.05.20251001.5b5be50 6.12.49 * # generation: 49 current 2025-10-07 20:40:25 25.05.20251001.5b5be50 6.12.49 *
{ {
description = "blakes nix config"; description = "blakes nix config";
inputs = { inputs = {

View File

@@ -60,7 +60,7 @@ in
# reverse proxy entryo # reverse proxy entryo
services.nginx.virtualHosts."sonarr.snowbelle.lan" = { services.nginx.virtualHosts."sonarr.snowbelle.lan" = {
enableACME = false; enableACME = false;
forceSSL = true; forceSSL = false;
sslCertificate = config.sops.secrets."ssl_blakedheld_crt".path; sslCertificate = config.sops.secrets."ssl_blakedheld_crt".path;
sslCertificateKey = config.sops.secrets."ssl_blakedheld_key".path; sslCertificateKey = config.sops.secrets."ssl_blakedheld_key".path;
locations."/" = { locations."/" = {

View File

@@ -54,7 +54,18 @@ in
# open firewall # open firewall
# networking.firewall.allowedTCPPorts = [ cfg.port ]; # networking.firewall.allowedTCPPorts = [ cfg.port ];
# reverse proxy entryo # internal reverse proxy entry
services.nginx.virtualHosts."jellyfin.snowbelle.lan" = {
enableACME = false;
forceSSL = false;
sslCertificate = config.sops.secrets."ssl_blakedheld_crt".path;
sslCertificateKey = config.sops.secrets."ssl_blakedheld_key".path;
locations."/" = {
proxyPass = "http://127.0.0.1:${toString cfg.port}";
};
};
# external reverse proxy entry
services.nginx.virtualHosts."media.blakedheld.xyz" = { services.nginx.virtualHosts."media.blakedheld.xyz" = {
enableACME = false; enableACME = false;
forceSSL = true; forceSSL = true;