diff --git a/hosts/fwminex/configuration.nix b/hosts/fwminex/configuration.nix
index e05ef94..5afdcea 100644
--- a/hosts/fwminex/configuration.nix
+++ b/hosts/fwminex/configuration.nix
@@ -27,10 +27,10 @@ in
     syncthing-key.file = ../../secrets/fwminex/syncthing/key.pem.age;
     syncthing-cert.file = ../../secrets/fwminex/syncthing/cert.pem.age;
     frigate.file = ../../secrets/frigate.age;
-    #r1-htpasswd = {
-    #  file = ../../secrets/r1-htpasswd.age;
-    #  owner = "nginx";
-    #};
+    r1-htpasswd = {
+      file = ../../secrets/r1-htpasswd.age;
+      owner = "nginx";
+    };
 
     ssh8022-server = {
       file = ../../secrets/ssh8022.age;
@@ -361,22 +361,22 @@ in
       };
     };
 
-    #nginx = {
-    #  defaultHTTPListenPort = 8081;
-    #  defaultSSLListenPort = 8443;
-    #  recommendedTlsSettings = true;
-    #  virtualHosts."r1.jakstys.lt" = {
-    #    extraConfig = ''
-    #      error_page 497 301 =307 https://$host:$server_port$request_uri;
-    #      auth_basic secured;
-    #      auth_basic_user_file ${config.age.secrets.r1-htpasswd.path};
-    #    '';
+    nginx = {
+      defaultHTTPListenPort = 8081;
+      defaultSSLListenPort = 8443;
+      recommendedTlsSettings = true;
+      virtualHosts."r1.jakstys.lt" = {
+        extraConfig = ''
+          error_page 497 301 =307 https://$host:$server_port$request_uri;
+          auth_basic secured;
+          auth_basic_user_file ${config.age.secrets.r1-htpasswd.path};
+        '';
 
-    #    addSSL = true;
-    #    sslCertificate = "/run/credentials/nginx.service/r1.jakstys.lt-cert.pem";
-    #    sslCertificateKey = "/run/credentials/nginx.service/r1.jakstys.lt-key.pem";
-    #  };
-    #};
+        addSSL = true;
+        sslCertificate = "/run/credentials/nginx.service/r1.jakstys.lt-cert.pem";
+        sslCertificateKey = "/run/credentials/nginx.service/r1.jakstys.lt-key.pem";
+      };
+    };
 
     nsd = {
       enable = true;
@@ -499,7 +499,7 @@ in
       };
 
       frigate = {
-        enable = false;
+        enable = true;
         secretsEnv = config.age.secrets.frigate.path;
       };