diff --git a/modules/nixos/features/bazarr.nix b/modules/nixos/features/bazarr.nix index 541235c..b1cd4a9 100644 --- a/modules/nixos/features/bazarr.nix +++ b/modules/nixos/features/bazarr.nix @@ -11,6 +11,13 @@ in listenPort = port; }; + borgmatic.settings.sqlite_databases = [ + { + name = "bazarr"; + path = "/srv/bazarr/db/bazarr.db"; + } + ]; + caddy.virtualHosts."bazarr.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/jellyfin.nix b/modules/nixos/features/jellyfin.nix index 9fab896..b6cbcc4 100644 --- a/modules/nixos/features/jellyfin.nix +++ b/modules/nixos/features/jellyfin.nix @@ -10,6 +10,13 @@ in group = "srv"; }; + borgmatic.settings.sqlite_databases = [ + { + name = "jellyfin"; + path = "/srv/jellyfin/data/jellyfin.db"; + } + ]; + caddy.virtualHosts."jellyfin.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/karakeep.nix b/modules/nixos/features/karakeep.nix index cebc5f8..06717c4 100644 --- a/modules/nixos/features/karakeep.nix +++ b/modules/nixos/features/karakeep.nix @@ -12,6 +12,13 @@ in }; }; + borgmatic.settings.sqlite_databases = [ + { + name = "karakeep"; + path = "/var/lib/karakeep/db.db"; + } + ] + caddy.virtualHosts."karakeep.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/kavita.nix b/modules/nixos/features/kavita.nix index bbb2322..d1fe035 100644 --- a/modules/nixos/features/kavita.nix +++ b/modules/nixos/features/kavita.nix @@ -15,6 +15,13 @@ in tokenKeyFile = config.age.secrets.kavita.path; }; + borgmatic.settings.sqlite_databases = [ + { + name = "kavita"; + path = "/srv/kavita/config/kavita.db"; + } + ]; + caddy.virtualHosts."kavita.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/lidarr.nix b/modules/nixos/features/lidarr.nix index 78aa609..5c297d7 100644 --- a/modules/nixos/features/lidarr.nix +++ b/modules/nixos/features/lidarr.nix @@ -13,6 +13,13 @@ in group = "srv"; }; + borgmatic.settings.sqlite_databases = [ + { + name = "lidarr"; + path = "/srv/lidarr/lidarr.db"; + } + ]; + caddy.virtualHosts."lidarr.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/prowlarr.nix b/modules/nixos/features/prowlarr.nix index 23e090f..d5f24e7 100644 --- a/modules/nixos/features/prowlarr.nix +++ b/modules/nixos/features/prowlarr.nix @@ -12,6 +12,13 @@ in }; }; + borgmatic.settings.sqlite_databases = [ + { + name = "prowlarr"; + path = "/srv/prowlarr/prowlarr.db"; + } + ]; + caddy.virtualHosts."prowlarr.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/qui.nix b/modules/nixos/features/qui.nix index 8c34edf..bcb5c96 100644 --- a/modules/nixos/features/qui.nix +++ b/modules/nixos/features/qui.nix @@ -23,6 +23,13 @@ in }; }; + services.borgmatic.settings.sqlite_databases = [ + { + name = "qui"; + path = "/srv/qui/qui.db"; + } + ]; + services.caddy.virtualHosts."qui.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/radarr.nix b/modules/nixos/features/radarr.nix index 30063eb..2c5c019 100644 --- a/modules/nixos/features/radarr.nix +++ b/modules/nixos/features/radarr.nix @@ -13,6 +13,13 @@ in group = "srv"; }; + borgmatic.settings.sqlite_databases = [ + { + name = "radarr"; + path = "/srv/radarr/radarr.db"; + } + ]; + caddy.virtualHosts."radarr.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/readarr.nix b/modules/nixos/features/readarr.nix index 42a884b..f616480 100644 --- a/modules/nixos/features/readarr.nix +++ b/modules/nixos/features/readarr.nix @@ -13,6 +13,13 @@ in group = "srv"; }; + borgmatic.settings.sqlite_databases = [ + { + name = "readarr"; + path = "/srv/readarr/readarr.db"; + } + ]; + caddy.virtualHosts."readarr.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/sonarr.nix b/modules/nixos/features/sonarr.nix index 691b4b8..4be089e 100644 --- a/modules/nixos/features/sonarr.nix +++ b/modules/nixos/features/sonarr.nix @@ -13,6 +13,13 @@ in group = "srv"; }; + borgmatic.settings.sqlite_databases = [ + { + name = "sonarr"; + path = "/srv/sonarr/sonarr.db"; + } + ]; + caddy.virtualHosts."sonarr.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/vaultwarden.nix b/modules/nixos/features/vaultwarden.nix index be8cb7a..76d8acc 100644 --- a/modules/nixos/features/vaultwarden.nix +++ b/modules/nixos/features/vaultwarden.nix @@ -23,6 +23,13 @@ in }; }; + borgmatic.settings.sqlite_databases = [ + { + name = "vaultwarden"; + path = "/srv/vaultwarden/db.sqlite3"; + } + ]; + caddy.virtualHosts."vaultwarden.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem {