From cab4e8fd57682139819a66d4597bcce769aa8060 Mon Sep 17 00:00:00 2001 From: Will Holdsworth Date: Sun, 1 Mar 2026 13:16:31 +1100 Subject: [PATCH] fix(borgmatic): revert #2197490b --- modules/nixos/features/bazarr.nix | 7 ------- modules/nixos/features/jellyfin.nix | 7 ------- modules/nixos/features/karakeep.nix | 7 ------- modules/nixos/features/kavita.nix | 7 ------- modules/nixos/features/lidarr.nix | 7 ------- modules/nixos/features/prowlarr.nix | 7 ------- modules/nixos/features/qui.nix | 7 ------- modules/nixos/features/radarr.nix | 7 ------- modules/nixos/features/readarr.nix | 7 ------- modules/nixos/features/sonarr.nix | 7 ------- modules/nixos/features/vaultwarden.nix | 7 ------- 11 files changed, 77 deletions(-) diff --git a/modules/nixos/features/bazarr.nix b/modules/nixos/features/bazarr.nix index b1cd4a9..541235c 100644 --- a/modules/nixos/features/bazarr.nix +++ b/modules/nixos/features/bazarr.nix @@ -11,13 +11,6 @@ in listenPort = port; }; - borgmatic.settings.sqlite_databases = [ - { - name = "bazarr"; - path = "/srv/bazarr/db/bazarr.db"; - } - ]; - caddy.virtualHosts."bazarr.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/jellyfin.nix b/modules/nixos/features/jellyfin.nix index b6cbcc4..9fab896 100644 --- a/modules/nixos/features/jellyfin.nix +++ b/modules/nixos/features/jellyfin.nix @@ -10,13 +10,6 @@ in group = "srv"; }; - borgmatic.settings.sqlite_databases = [ - { - name = "jellyfin"; - path = "/srv/jellyfin/data/jellyfin.db"; - } - ]; - caddy.virtualHosts."jellyfin.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/karakeep.nix b/modules/nixos/features/karakeep.nix index 0eb9bba..cebc5f8 100644 --- a/modules/nixos/features/karakeep.nix +++ b/modules/nixos/features/karakeep.nix @@ -12,13 +12,6 @@ in }; }; - borgmatic.settings.sqlite_databases = [ - { - name = "karakeep"; - path = "/var/lib/karakeep/db.db"; - } - ]; - caddy.virtualHosts."karakeep.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/kavita.nix b/modules/nixos/features/kavita.nix index d1fe035..bbb2322 100644 --- a/modules/nixos/features/kavita.nix +++ b/modules/nixos/features/kavita.nix @@ -15,13 +15,6 @@ in tokenKeyFile = config.age.secrets.kavita.path; }; - borgmatic.settings.sqlite_databases = [ - { - name = "kavita"; - path = "/srv/kavita/config/kavita.db"; - } - ]; - caddy.virtualHosts."kavita.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/lidarr.nix b/modules/nixos/features/lidarr.nix index 5c297d7..78aa609 100644 --- a/modules/nixos/features/lidarr.nix +++ b/modules/nixos/features/lidarr.nix @@ -13,13 +13,6 @@ in group = "srv"; }; - borgmatic.settings.sqlite_databases = [ - { - name = "lidarr"; - path = "/srv/lidarr/lidarr.db"; - } - ]; - caddy.virtualHosts."lidarr.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/prowlarr.nix b/modules/nixos/features/prowlarr.nix index d5f24e7..23e090f 100644 --- a/modules/nixos/features/prowlarr.nix +++ b/modules/nixos/features/prowlarr.nix @@ -12,13 +12,6 @@ in }; }; - borgmatic.settings.sqlite_databases = [ - { - name = "prowlarr"; - path = "/srv/prowlarr/prowlarr.db"; - } - ]; - caddy.virtualHosts."prowlarr.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/qui.nix b/modules/nixos/features/qui.nix index bcb5c96..8c34edf 100644 --- a/modules/nixos/features/qui.nix +++ b/modules/nixos/features/qui.nix @@ -23,13 +23,6 @@ in }; }; - services.borgmatic.settings.sqlite_databases = [ - { - name = "qui"; - path = "/srv/qui/qui.db"; - } - ]; - services.caddy.virtualHosts."qui.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/radarr.nix b/modules/nixos/features/radarr.nix index 2c5c019..30063eb 100644 --- a/modules/nixos/features/radarr.nix +++ b/modules/nixos/features/radarr.nix @@ -13,13 +13,6 @@ in group = "srv"; }; - borgmatic.settings.sqlite_databases = [ - { - name = "radarr"; - path = "/srv/radarr/radarr.db"; - } - ]; - caddy.virtualHosts."radarr.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/readarr.nix b/modules/nixos/features/readarr.nix index f616480..42a884b 100644 --- a/modules/nixos/features/readarr.nix +++ b/modules/nixos/features/readarr.nix @@ -13,13 +13,6 @@ in group = "srv"; }; - borgmatic.settings.sqlite_databases = [ - { - name = "readarr"; - path = "/srv/readarr/readarr.db"; - } - ]; - caddy.virtualHosts."readarr.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/sonarr.nix b/modules/nixos/features/sonarr.nix index 4be089e..691b4b8 100644 --- a/modules/nixos/features/sonarr.nix +++ b/modules/nixos/features/sonarr.nix @@ -13,13 +13,6 @@ in group = "srv"; }; - borgmatic.settings.sqlite_databases = [ - { - name = "sonarr"; - path = "/srv/sonarr/sonarr.db"; - } - ]; - caddy.virtualHosts."sonarr.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem { diff --git a/modules/nixos/features/vaultwarden.nix b/modules/nixos/features/vaultwarden.nix index 76d8acc..be8cb7a 100644 --- a/modules/nixos/features/vaultwarden.nix +++ b/modules/nixos/features/vaultwarden.nix @@ -23,13 +23,6 @@ in }; }; - borgmatic.settings.sqlite_databases = [ - { - name = "vaultwarden"; - path = "/srv/vaultwarden/db.sqlite3"; - } - ]; - caddy.virtualHosts."vaultwarden.fi33.buzz".extraConfig = '' reverse_proxy localhost:${toString port} tls ${certloc}/cert.pem ${certloc}/key.pem {