diff --git a/modules/homelab/services/arr/flaresolverr/default.nix b/modules/homelab/services/arr/flaresolverr/default.nix index 35fc4ea..12fa26b 100644 --- a/modules/homelab/services/arr/flaresolverr/default.nix +++ b/modules/homelab/services/arr/flaresolverr/default.nix @@ -44,7 +44,7 @@ in services.flaresolverr = { enable = true; openFirewall = true; - port = cfg.port + port = cfg.port; }; # override umask to make permissions work out diff --git a/modules/homelab/services/default.nix.template b/modules/homelab/services/default.nix.template index 1cbe84d..2d5c019 100644 --- a/modules/homelab/services/default.nix.template +++ b/modules/homelab/services/default.nix.template @@ -53,7 +53,11 @@ in }; # override umask to make permissions work out - systemd.services..serviceConfig = { UMask = lib.mkForce "0007"; }; + systemd.services..serviceConfig = { + UMask = lib.mkForce "0007"; +# User = ""; +# Group = ""; + }; # # open firewall # networking.firewall.allowedTCPPorts = [ cfg.port ]; @@ -68,16 +72,16 @@ in proxyPass = "http://127.0.0.1:${toString cfg.port}"; }; }; - # external reverse proxy entry - services.nginx.virtualHosts.".blakedheld.xyz" = { - enableACME = false; - forceSSL = true; - sslCertificate = config.sops.secrets."ssl_blakedheld_crt".path; - sslCertificateKey = config.sops.secrets."ssl_blakedheld_key".path; - locations."/" = { - proxyPass = "http://127.0.0.1:${toString cfg.port}"; - }; - }; +# # external reverse proxy entry +# services.nginx.virtualHosts.".blakedheld.xyz" = { +# enableACME = false; +# forceSSL = true; +# sslCertificate = config.sops.secrets."ssl_blakedheld_crt".path; +# sslCertificateKey = config.sops.secrets."ssl_blakedheld_key".path; +# locations."/" = { +# proxyPass = "http://127.0.0.1:${toString cfg.port}"; +# }; +# }; sops.secrets = { "_" = {