diff --git a/modules/homelab/services/arr/bazarr/default.nix.template b/modules/homelab/services/arr/bazarr/default.nix.template deleted file mode 100644 index 36e7d24..0000000 --- a/modules/homelab/services/arr/bazarr/default.nix.template +++ /dev/null @@ -1,61 +0,0 @@ -{ pkgs, config, lib, ... }: - -let - cfg = config.modules.services.; - ids = ; -in -{ - options.modules.services. = { - enable = lib.mkEnableOption "enables "; -# extra options -# mode = lib.mkOption { -# type = lib.types.enum [ "server" "client" ]; -# default = "client"; -# description = "whether syncthing should run as a client (user) or server (system-wide)."; -# }; - - }; - - config = lib.mkIf cfg.enable { - - # declare group - users.groups. = { gid = ids; }; - - # declare user - users.users. = { - description = " media server user"; - uid = ids; - isSystemUser = true; - home = "/var/lib/"; - createHome = true; - group = ""; - extraGroups = [ "media" "video" "render" ]; - }; - - # enable the service - services. = { - enable = true; - openFirewall = true; # Opens 8096/8920 automatically - user = ""; # Default: - group = ""; # Default: - dataDir = "/var/lib/"; # Config + metadata storage - }; - - # override umask to make permissions work out - systemd.services..serviceConfig = { UMask = lib.mkForce "0007"; }; - - # open firewall - #networking.firewall.allowedTCPPorts = [ 8096 ]; - - # reverse proxy entryo - services.nginx.virtualHosts."media.blakedheld.xyz" = { - enableACME = false; - forceSSL = true; - sslCertificate = config.sops.secrets."ssl_blakedheld_crt".path; - sslCertificateKey = config.sops.secrets."ssl_blakedheld_key".path; - locations."/" = { - proxyPass = "http://127.0.0.1:8096"; - }; - }; - }; -} diff --git a/modules/homelab/services/arr/flaresolverr/default.nix.template b/modules/homelab/services/arr/flaresolverr/default.nix.template deleted file mode 100644 index 36e7d24..0000000 --- a/modules/homelab/services/arr/flaresolverr/default.nix.template +++ /dev/null @@ -1,61 +0,0 @@ -{ pkgs, config, lib, ... }: - -let - cfg = config.modules.services.; - ids = ; -in -{ - options.modules.services. = { - enable = lib.mkEnableOption "enables "; -# extra options -# mode = lib.mkOption { -# type = lib.types.enum [ "server" "client" ]; -# default = "client"; -# description = "whether syncthing should run as a client (user) or server (system-wide)."; -# }; - - }; - - config = lib.mkIf cfg.enable { - - # declare group - users.groups. = { gid = ids; }; - - # declare user - users.users. = { - description = " media server user"; - uid = ids; - isSystemUser = true; - home = "/var/lib/"; - createHome = true; - group = ""; - extraGroups = [ "media" "video" "render" ]; - }; - - # enable the service - services. = { - enable = true; - openFirewall = true; # Opens 8096/8920 automatically - user = ""; # Default: - group = ""; # Default: - dataDir = "/var/lib/"; # Config + metadata storage - }; - - # override umask to make permissions work out - systemd.services..serviceConfig = { UMask = lib.mkForce "0007"; }; - - # open firewall - #networking.firewall.allowedTCPPorts = [ 8096 ]; - - # reverse proxy entryo - services.nginx.virtualHosts."media.blakedheld.xyz" = { - enableACME = false; - forceSSL = true; - sslCertificate = config.sops.secrets."ssl_blakedheld_crt".path; - sslCertificateKey = config.sops.secrets."ssl_blakedheld_key".path; - locations."/" = { - proxyPass = "http://127.0.0.1:8096"; - }; - }; - }; -} diff --git a/modules/homelab/services/arr/radarr/default.nix.template b/modules/homelab/services/arr/radarr/default.nix.template deleted file mode 100644 index 36e7d24..0000000 --- a/modules/homelab/services/arr/radarr/default.nix.template +++ /dev/null @@ -1,61 +0,0 @@ -{ pkgs, config, lib, ... }: - -let - cfg = config.modules.services.; - ids = ; -in -{ - options.modules.services. = { - enable = lib.mkEnableOption "enables "; -# extra options -# mode = lib.mkOption { -# type = lib.types.enum [ "server" "client" ]; -# default = "client"; -# description = "whether syncthing should run as a client (user) or server (system-wide)."; -# }; - - }; - - config = lib.mkIf cfg.enable { - - # declare group - users.groups. = { gid = ids; }; - - # declare user - users.users. = { - description = " media server user"; - uid = ids; - isSystemUser = true; - home = "/var/lib/"; - createHome = true; - group = ""; - extraGroups = [ "media" "video" "render" ]; - }; - - # enable the service - services. = { - enable = true; - openFirewall = true; # Opens 8096/8920 automatically - user = ""; # Default: - group = ""; # Default: - dataDir = "/var/lib/"; # Config + metadata storage - }; - - # override umask to make permissions work out - systemd.services..serviceConfig = { UMask = lib.mkForce "0007"; }; - - # open firewall - #networking.firewall.allowedTCPPorts = [ 8096 ]; - - # reverse proxy entryo - services.nginx.virtualHosts."media.blakedheld.xyz" = { - enableACME = false; - forceSSL = true; - sslCertificate = config.sops.secrets."ssl_blakedheld_crt".path; - sslCertificateKey = config.sops.secrets."ssl_blakedheld_key".path; - locations."/" = { - proxyPass = "http://127.0.0.1:8096"; - }; - }; - }; -} diff --git a/modules/homelab/services/arr/sonarr/default.nix b/modules/homelab/services/arr/sonarr/default.nix index 8add4db..da7768f 100644 --- a/modules/homelab/services/arr/sonarr/default.nix +++ b/modules/homelab/services/arr/sonarr/default.nix @@ -60,7 +60,7 @@ in # reverse proxy entryo services.nginx.virtualHosts."sonarr.snowbelle.lan" = { enableACME = false; - forceSSL = false; + forceSSL = true; sslCertificate = config.sops.secrets."ssl_blakedheld_crt".path; sslCertificateKey = config.sops.secrets."ssl_blakedheld_key".path; locations."/" = { diff --git a/users/blake/dotfiles/zsh/.zshrc b/users/blake/dotfiles/zsh/.zshrc index c326c87..68f2aec 100644 --- a/users/blake/dotfiles/zsh/.zshrc +++ b/users/blake/dotfiles/zsh/.zshrc @@ -87,7 +87,7 @@ alias dotfiles='/usr/bin/git --git-dir=$HOME/.dotfiles --work-tree=$HOME' alias dtf='/usr/bin/git --git-dir=$HOME/.dotfiles --work-tree=$HOME' # systemd -alias status='sudo systemctl status' +alias stat='sudo systemctl status' alias restart='sudo systemctl restart' alias start='sudo systemctl start' alias stop='sudo systemctl stop'