diff --git a/flake.nix b/flake.nix index 970013c..871e681 100644 --- a/flake.nix +++ b/flake.nix @@ -1,6 +1,6 @@ # flake for blakes nixos config # define new devices in outputs -# generation: 19 current 2025-10-07 00:48:59 25.05.20251001.5b5be50 6.12.49 * +# generation: 20 current 2025-10-07 00:49:35 25.05.20251001.5b5be50 6.12.49 * { description = "blakes nix config"; inputs = { diff --git a/modules/homelab/services/arr/sonarr/default.nix b/modules/homelab/services/arr/sonarr/default.nix index d38eea8..30455ee 100644 --- a/modules/homelab/services/arr/sonarr/default.nix +++ b/modules/homelab/services/arr/sonarr/default.nix @@ -11,7 +11,7 @@ in port = lib.mkOption { type = lib.types.int; default = 7105; - description = "define port for sonarr"; + description = "set port for sonarr"; }; }; @@ -57,7 +57,7 @@ in sslCertificate = config.sops.secrets."ssl_blakedheld_crt".path; sslCertificateKey = config.sops.secrets."ssl_blakedheld_key".path; locations."/" = { - proxyPass = "http://127.0.0.1:7105"; + proxyPass = "http://127.0.0.1:${toString port}"; }; }; }; diff --git a/modules/homelab/services/default.nix.template b/modules/homelab/services/default.nix.template index 36e7d24..c38b645 100644 --- a/modules/homelab/services/default.nix.template +++ b/modules/homelab/services/default.nix.template @@ -7,11 +7,12 @@ in { options.modules.services. = { enable = lib.mkEnableOption "enables "; -# extra options -# mode = lib.mkOption { -# type = lib.types.enum [ "server" "client" ]; -# default = "client"; -# description = "whether syncthing should run as a client (user) or server (system-wide)."; + +# set port options +# port = lib.mkOption { +# type = lib.types.int; +# default = ; +# description = "set port for (default: "; # }; }; @@ -29,7 +30,7 @@ in home = "/var/lib/"; createHome = true; group = ""; - extraGroups = [ "media" "video" "render" ]; + extraGroups = [ "media" ]; }; # enable the service @@ -39,22 +40,26 @@ in user = ""; # Default: group = ""; # Default: dataDir = "/var/lib/"; # Config + metadata storage + dataDir = "/var/lib/"; # Config + metadata storage +# settings = { +# server.port = cfg.port; +# }; }; # override umask to make permissions work out systemd.services..serviceConfig = { UMask = lib.mkForce "0007"; }; # open firewall - #networking.firewall.allowedTCPPorts = [ 8096 ]; + #networking.firewall.allowedTCPPorts = [ ]; # reverse proxy entryo - services.nginx.virtualHosts."media.blakedheld.xyz" = { + services.nginx.virtualHosts.".snowbelle.lan" = { enableACME = false; forceSSL = true; sslCertificate = config.sops.secrets."ssl_blakedheld_crt".path; sslCertificateKey = config.sops.secrets."ssl_blakedheld_key".path; locations."/" = { - proxyPass = "http://127.0.0.1:8096"; + proxyPass = "http://127.0.0.1:"; }; }; };