diff --git a/modules/homelab/services/arr/radarr/default.nix b/modules/homelab/services/arr/radarr/default.nix index 6389c52..eee7224 100644 --- a/modules/homelab/services/arr/radarr/default.nix +++ b/modules/homelab/services/arr/radarr/default.nix @@ -85,22 +85,6 @@ in proxyPass = "http://127.0.0.1:${toString cfg.port}"; }; }; -# # external reverse proxy entry -# services.nginx.virtualHosts."${service}.blakedheld.xyz" = { -# forceSSL = true; -# sslCertificate = sec."ssl_blakedheld_crt".path; -# sslCertificateKey = sec."ssl_blakedheld_key".path; -# locations."/" = { -# proxyPass = "http://127.0.0.1:${toString cfg.port}"; -# }; -# }; - - sops.secrets = { - "${service}_" = { - owner = "${service}"; - group = "${service}"; - }; - }; # add to backups modules.system.backups.paths = lib.mkIf cfg.backup [ cfg.data_dir ]; diff --git a/modules/homelab/services/default_temp.nix b/modules/homelab/services/default_temp.nix index 32a6c55..b816f17 100644 --- a/modules/homelab/services/default_temp.nix +++ b/modules/homelab/services/default_temp.nix @@ -94,13 +94,13 @@ in # proxyPass = "http://127.0.0.1:${toString cfg.port}"; # }; # }; - - sops.secrets = { - "${service}_" = { - owner = "${service}"; - group = "${service}"; - }; - }; +# +# sops.secrets = { +# "${service}_" = { +# owner = "${service}"; +# group = "${service}"; +# }; +# }; # add to backups modules.system.backups.paths = lib.mkIf cfg.backup [ cfg.data_dir ];