{ pkgs, config, lib, ... }: let cfg = config.modules.services.; ids = ; in { options.modules.services. = { enable = lib.mkEnableOption "enables "; # set port options # port = lib.mkOption { # type = lib.types.int; # default = ; # description = "set port for (default: "; # }; }; config = lib.mkIf cfg.enable { # declare group users.groups. = { gid = ids; }; # declare user users.users. = { description = " media server user"; uid = ids; isSystemUser = true; home = "/var/lib/"; createHome = true; group = ""; extraGroups = [ "media" ]; }; # enable the service services. = { enable = true; openFirewall = true; # Opens 8096/8920 automatically user = ""; # Default: group = ""; # Default: dataDir = "/var/lib/"; # Config + metadata storage dataDir = "/var/lib/"; # Config + metadata storage # settings = { # server.port = cfg.port; # }; }; # override umask to make permissions work out systemd.services..serviceConfig = { UMask = lib.mkForce "0007"; }; # open firewall #networking.firewall.allowedTCPPorts = [ ]; # reverse proxy entryo services.nginx.virtualHosts.".snowbelle.lan" = { enableACME = false; forceSSL = true; sslCertificate = config.sops.secrets."ssl_blakedheld_crt".path; sslCertificateKey = config.sops.secrets."ssl_blakedheld_key".path; locations."/" = { proxyPass = "http://127.0.0.1:"; }; }; }; }