diff --git a/modules/nixos/services/default.nix b/modules/nixos/services/default.nix index e03eca1..4267af3 100644 --- a/modules/nixos/services/default.nix +++ b/modules/nixos/services/default.nix @@ -31,7 +31,6 @@ ./podgrab ./postgresql ./postgresql-backup - ./pyload ./quassel ./rss-bridge ./sabnzbd diff --git a/modules/nixos/services/pyload/default.nix b/modules/nixos/services/pyload/default.nix deleted file mode 100644 index 7257d0f..0000000 --- a/modules/nixos/services/pyload/default.nix +++ /dev/null @@ -1,72 +0,0 @@ -{ config, lib, ... }: -let - cfg = config.my.services.pyload; -in -{ - options.my.services.pyload = with lib; { - enable = mkEnableOption "pyload download manager"; - - credentialsFile = mkOption { - type = types.path; - example = "/run/secrets/pyload-credentials.env"; - description = "pyload credentials"; - }; - - downloadDirectory = mkOption { - type = types.str; - default = "/data/downloads/pyload"; - example = "/var/lib/pyload/download"; - description = "Download directory"; - }; - - port = mkOption { - type = types.port; - default = 9093; - example = 8080; - description = "Internal port for webui"; - }; - }; - - config = lib.mkIf cfg.enable { - services.pyload = { - enable = true; - - # Listening on `localhost` leads to 502 with the reverse proxy... - listenAddress = "127.0.0.1"; - - inherit (cfg) - credentialsFile - downloadDirectory - port - ; - - # Use media group when downloading files - group = "media"; - }; - - # Set-up media group - users.groups.media = { }; - - my.services.nginx.virtualHosts = { - pyload = { - inherit (cfg) port; - }; - }; - - services.fail2ban.jails = { - pyload = '' - enabled = true - filter = pyload - port = http,https - ''; - }; - - environment.etc = { - "fail2ban/filter.d/pyload.conf".text = '' - [Definition] - failregex = ^.*Login failed for user '.*' \[CLIENT: \]$ - journalmatch = _SYSTEMD_UNIT=pyload.service - ''; - }; - }; -}