From 974662b4e296bce5606ada85cdc431294aea16b8 Mon Sep 17 00:00:00 2001 From: Nick Date: Sun, 8 Jun 2025 22:42:51 -0500 Subject: [PATCH] feat: test --- modules/nixos/services/jellyfin/default.nix | 112 ++++++++++---------- 1 file changed, 56 insertions(+), 56 deletions(-) diff --git a/modules/nixos/services/jellyfin/default.nix b/modules/nixos/services/jellyfin/default.nix index 787c4a9..b56c3f0 100755 --- a/modules/nixos/services/jellyfin/default.nix +++ b/modules/nixos/services/jellyfin/default.nix @@ -8,65 +8,65 @@ let host = "${service.subdomain}.${web.domains.url0}"; in { - services = { - # jellyfin = { - # enable = true; - # openFirewall = true; - # user = user0; - # }; - # jellyseerr = { - # openFirewall = true; - # enable = true; - # }; - caddy = { - virtualHosts = { - "${host}" = { - extraConfig = '' - redir /.well-known/carddav /remote.php/dav/ 301 - redir /.well-known/caldav /remote.php/dav/ 301 + # services = { + # jellyfin = { + # enable = true; + # openFirewall = true; + # user = user0; + # }; + # jellyseerr = { + # openFirewall = true; + # enable = true; + # }; + # caddy = { + # virtualHosts = { + # "${host}" = { + # extraConfig = '' + # redir /.well-known/carddav /remote.php/dav/ 301 + # redir /.well-known/caldav /remote.php/dav/ 301 - reverse_proxy ${localhost}:${toString service.ports.port1} + # reverse_proxy ${localhost}:${toString service.ports.port1} - tls ${service.ssl.cert} ${service.ssl.key} - ''; - }; - }; - }; - }; + # tls ${service.ssl.cert} ${service.ssl.key} + # ''; + # }; + # }; + # }; + # }; - fileSystems = - let - settings = { - fsType = "none"; - options = [ - "bind" - ]; - depends = [ - ceres.storage0.mount - ]; - }; - in - { - "/var/lib/${service.name}" = { - device = service.paths.path0; - } // settings; - "/var/cache/${service.name}" = { - device = "${service.paths.path1}"; - } // settings; - }; + # fileSystems = + # let + # settings = { + # fsType = "none"; + # options = [ + # "bind" + # ]; + # depends = [ + # ceres.storage0.mount + # ]; + # }; + # in + # { + # "/var/lib/${service.name}" = { + # device = service.paths.path0; + # } // settings; + # "/var/cache/${service.name}" = { + # device = "${service.paths.path1}"; + # } // settings; + # }; - systemd.tmpfiles.rules = [ - "Z ${service.paths.path0} 0755 ${user0} ${service.name} -" - "Z ${service.paths.path1} 0755 ${user0} ${service.name} -" - ]; + # systemd.tmpfiles.rules = [ + # "Z ${service.paths.path0} 0755 ${user0} ${service.name} -" + # "Z ${service.paths.path1} 0755 ${user0} ${service.name} -" + # ]; - networking = { - firewall = { - allowedTCPPorts = [ - service.ports.port0 - service.ports.port1 - service.ports.port2 - ]; - }; - }; + # networking = { + # firewall = { + # allowedTCPPorts = [ + # service.ports.port0 + # service.ports.port1 + # service.ports.port2 + # ]; + # }; + # }; }