add some of the config from the server to the repo
This commit is contained in:
parent
9a935f8431
commit
e63d103cc8
7 changed files with 70 additions and 59 deletions
|
@ -1,4 +1,12 @@
|
||||||
{ config, pkgs, lib, sensitive, ... }:
|
{ config, pkgs, lib, sensitive, ... }:
|
||||||
|
|
||||||
|
with lib;
|
||||||
|
|
||||||
|
let
|
||||||
|
user = "media";
|
||||||
|
group = "media";
|
||||||
|
directory = "/var/media";
|
||||||
|
in
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
../common/qbittorrent.nix
|
../common/qbittorrent.nix
|
||||||
|
@ -14,43 +22,60 @@
|
||||||
|
|
||||||
users = {
|
users = {
|
||||||
groups = {
|
groups = {
|
||||||
"jellyfin" = {};
|
${group} = {};
|
||||||
};
|
};
|
||||||
users = {
|
users = {
|
||||||
"sonarr".extraGroups = [ "jellyfin" ];
|
${user} = {
|
||||||
"radarr".extraGroups = [ "jellyfin" ];
|
isSystemUser = true;
|
||||||
|
group = group;
|
||||||
|
}
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
system.activationScripts.var = mkForce ''
|
||||||
|
install -d -m 0755 -o ${user} -g ${group} ${directory}/series
|
||||||
|
install -d -m 0755 -o ${user} -g ${group} ${directory}/movies
|
||||||
|
install -d -m 0755 -o ${user} -g ${group} ${directory}/qbittorrent
|
||||||
|
install -d -m 0755 -o ${user} -g ${group} ${directory}/sabnzbd
|
||||||
|
install -d -m 0755 -o ${user} -g ${group} ${directory}/reiverr/config
|
||||||
|
install -d -m 0755 -o ${user} -g ${group} ${directory}/downloads/incomplete
|
||||||
|
install -d -m 0755 -o ${user} -g ${group} ${directory}/downloads/done
|
||||||
|
'';
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
jellyfin = {
|
jellyfin = {
|
||||||
enable = true;
|
enable = true;
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
group = "jellyfin";
|
user = user;
|
||||||
|
group = group;
|
||||||
};
|
};
|
||||||
|
|
||||||
radarr = {
|
radarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
group = "jellyfin";
|
user = user;
|
||||||
|
group = group;
|
||||||
};
|
};
|
||||||
|
|
||||||
sonarr = {
|
sonarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
group = "jellyfin";
|
user = user;
|
||||||
|
group = group;
|
||||||
};
|
};
|
||||||
|
|
||||||
bazarr = {
|
bazarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
group = "jellyfin";
|
user = user;
|
||||||
|
group = group;
|
||||||
};
|
};
|
||||||
|
|
||||||
lidarr = {
|
lidarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
group = "jellyfin";
|
user = user;
|
||||||
|
group = group;
|
||||||
};
|
};
|
||||||
|
|
||||||
jellyseerr = {
|
jellyseerr = {
|
||||||
|
@ -66,46 +91,41 @@
|
||||||
qbittorrent = {
|
qbittorrent = {
|
||||||
enable = true;
|
enable = true;
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
dataDir = "/var/media/qbittorrent";
|
dataDir = "${directory}/qbittorrent";
|
||||||
port = 58080;
|
port = 5000;
|
||||||
|
|
||||||
user = "qbittorrent";
|
user = user;
|
||||||
group = "jellyfin";
|
group = group;
|
||||||
};
|
};
|
||||||
|
|
||||||
sabnzbd = {
|
sabnzbd = {
|
||||||
enable = true;
|
enable = true;
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
configFile = "/var/media/sabnzbd/config.ini";
|
configFile = "${directory}/sabnzbd/config.ini";
|
||||||
|
port = 5001;
|
||||||
|
|
||||||
user = "sabnzbd";
|
user = user;
|
||||||
group = "jellyfin";
|
group = group;
|
||||||
};
|
};
|
||||||
|
|
||||||
# authelia = {
|
|
||||||
# enable = true;
|
|
||||||
# };
|
|
||||||
|
|
||||||
caddy = {
|
caddy = {
|
||||||
enable = true;
|
enable = true;
|
||||||
virtualHosts = {
|
virtualHosts = {
|
||||||
# "movies.kruining.eu".extraConfig = ''
|
"media.kruining.eu".extraConfig = ''
|
||||||
# reverse_proxy http://127.0.0.1:8989
|
#basicauth {
|
||||||
# '';
|
# chris $2a$12$JrsmxrEJj2wLMdcFmEHbWeMJF9gWH/fnE/1Zv67cKvBtq4E4xsSEe
|
||||||
# "series.kruining.eu".extraConfig = ''
|
#}
|
||||||
# reverse_proxy http://127.0.0.1:7878
|
|
||||||
# '';
|
|
||||||
"http://media.kruining.eu".extraConfig = ''
|
|
||||||
basicauth {
|
|
||||||
chris $2a$12$JrsmxrEJj2wLMdcFmEHbWeMJF9gWH/fnE/1Zv67cKvBtq4E4xsSEe
|
|
||||||
}
|
|
||||||
reverse_proxy http://127.0.0.1:9494
|
reverse_proxy http://127.0.0.1:9494
|
||||||
|
tls internal
|
||||||
'';
|
'';
|
||||||
"https://media.kruining.eu".extraConfig = ''
|
"cloud.kruining.eu".extraConfig = ''
|
||||||
basicauth {
|
basicauth {
|
||||||
chris $2a$12$JrsmxrEJj2wLMdcFmEHbWeMJF9gWH/fnE/1Zv67cKvBtq4E4xsSEe
|
chris $2a$12$JrsmxrEJj2wLMdcFmEHbWeMJF9gWH/fnE/1Zv67cKvBtq4E4xsSEe
|
||||||
}
|
}
|
||||||
reverse_proxy http://127.0.0.1:9494
|
php_fastcgi unix//run/phpfpm/nextcloud.sock {
|
||||||
|
env front_controller_active true
|
||||||
|
}
|
||||||
|
tls internal
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -130,31 +150,16 @@
|
||||||
ports = [ "127.0.0.1:8191:8191" ];
|
ports = [ "127.0.0.1:8191:8191" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
homarr = {
|
|
||||||
image = "ghcr.io/ajnart/homarr:latest";
|
|
||||||
autoStart = true;
|
|
||||||
ports = [ "127.0.0.1:7575:7575" ];
|
|
||||||
};
|
|
||||||
|
|
||||||
reiverr = {
|
reiverr = {
|
||||||
image = "ghcr.io/aleksilassila/reiverr:v2.0.0-alpha.5";
|
image = "ghcr.io/aleksilassila/reiverr:v2.0.0-alpha.6";
|
||||||
autoStart = true;
|
autoStart = true;
|
||||||
ports = [ "127.0.0.1:9494:9494" ];
|
ports = [ "127.0.0.1:9494:9494" ];
|
||||||
volumes = [ "/var/media/reiverr/config:/config" ];
|
volumes = [ "${directory}/reiverr/config:/config" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# Config file for nabnzbd
|
|
||||||
# environment.etc."nabnzbd.ini" = {
|
|
||||||
# mode = "0775"
|
|
||||||
# text = ''
|
|
||||||
# host = 127.0.0.1
|
|
||||||
# port = 9595
|
|
||||||
# '';
|
|
||||||
# };
|
|
||||||
|
|
||||||
# Open firewall for caddy
|
# Open firewall for caddy
|
||||||
networking.firewall.allowedTCPPorts = [ 80 443 ];
|
networking.firewall.allowedTCPPorts = [ 80 443 ];
|
||||||
|
|
||||||
|
|
|
@ -12,6 +12,7 @@
|
||||||
zed-editor
|
zed-editor
|
||||||
corepack_22
|
corepack_22
|
||||||
bun
|
bun
|
||||||
|
nano
|
||||||
];
|
];
|
||||||
|
|
||||||
users.defaultUserShell = pkgs.zsh;
|
users.defaultUserShell = pkgs.zsh;
|
||||||
|
@ -34,5 +35,19 @@
|
||||||
|
|
||||||
programs.zsh.enable = true;
|
programs.zsh.enable = true;
|
||||||
programs.starship.enable = true;
|
programs.starship.enable = true;
|
||||||
}
|
|
||||||
|
|
||||||
|
programs.nano = {
|
||||||
|
enable = true;
|
||||||
|
syntaxHighlight = true;
|
||||||
|
nanorc = ''
|
||||||
|
set autoindent
|
||||||
|
set jumpyscrolling
|
||||||
|
set linenumbers
|
||||||
|
set mouse
|
||||||
|
set saveonexit
|
||||||
|
set smarthome
|
||||||
|
set tabstospaces
|
||||||
|
set tabsize 2
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
|
@ -2,7 +2,6 @@
|
||||||
let
|
let
|
||||||
overrides = (builtins.fromTOML (builtins.readFile ./rust-toolchain.toml));
|
overrides = (builtins.fromTOML (builtins.readFile ./rust-toolchain.toml));
|
||||||
libPath = with pkgs; lib.makeLibraryPath [];
|
libPath = with pkgs; lib.makeLibraryPath [];
|
||||||
|
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
pkgs.mkShell rec {
|
pkgs.mkShell rec {
|
||||||
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACC3ZNPLQnZnaEFOhHgOfWZz6blXsxQZSZl1T4ZFJn3gWwAAAJDtFyAB7Rcg
|
|
||||||
AQAAAAtzc2gtZWQyNTUxOQAAACC3ZNPLQnZnaEFOhHgOfWZz6blXsxQZSZl1T4ZFJn3gWw
|
|
||||||
AAAEDi4rTcY08810d2512b6IN9/O5618CfabqoG22OyF/HIbdk08tCdmdoQU6EeA59ZnPp
|
|
||||||
uVezFBlJmXVPhkUmfeBbAAAADXJvb3RAY2hyaXMtcGM=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILdk08tCdmdoQU6EeA59ZnPpuVezFBlJmXVPhkUmfeBb root@chris-pc
|
|
Loading…
Add table
Add a link
Reference in a new issue