diff --git a/modules/nixos/services/default.nix b/modules/nixos/services/default.nix
index e03eca1..4267af3 100644
--- a/modules/nixos/services/default.nix
+++ b/modules/nixos/services/default.nix
@@ -31,7 +31,6 @@
./podgrab
./postgresql
./postgresql-backup
- ./pyload
./quassel
./rss-bridge
./sabnzbd
diff --git a/modules/nixos/services/pyload/default.nix b/modules/nixos/services/pyload/default.nix
deleted file mode 100644
index 7257d0f..0000000
--- a/modules/nixos/services/pyload/default.nix
+++ /dev/null
@@ -1,72 +0,0 @@
-{ config, lib, ... }:
-let
- cfg = config.my.services.pyload;
-in
-{
- options.my.services.pyload = with lib; {
- enable = mkEnableOption "pyload download manager";
-
- credentialsFile = mkOption {
- type = types.path;
- example = "/run/secrets/pyload-credentials.env";
- description = "pyload credentials";
- };
-
- downloadDirectory = mkOption {
- type = types.str;
- default = "/data/downloads/pyload";
- example = "/var/lib/pyload/download";
- description = "Download directory";
- };
-
- port = mkOption {
- type = types.port;
- default = 9093;
- example = 8080;
- description = "Internal port for webui";
- };
- };
-
- config = lib.mkIf cfg.enable {
- services.pyload = {
- enable = true;
-
- # Listening on `localhost` leads to 502 with the reverse proxy...
- listenAddress = "127.0.0.1";
-
- inherit (cfg)
- credentialsFile
- downloadDirectory
- port
- ;
-
- # Use media group when downloading files
- group = "media";
- };
-
- # Set-up media group
- users.groups.media = { };
-
- my.services.nginx.virtualHosts = {
- pyload = {
- inherit (cfg) port;
- };
- };
-
- services.fail2ban.jails = {
- pyload = ''
- enabled = true
- filter = pyload
- port = http,https
- '';
- };
-
- environment.etc = {
- "fail2ban/filter.d/pyload.conf".text = ''
- [Definition]
- failregex = ^.*Login failed for user '.*' \[CLIENT: \]$
- journalmatch = _SYSTEMD_UNIT=pyload.service
- '';
- };
- };
-}