Compare commits

...

2 Commits

Author SHA1 Message Date
Adrian Gunnar Lauterer c936b67172 added podgrab rout 2024-05-01 16:17:45 +02:00
Adrian Gunnar Lauterer 3b987a4817 medaserver profile 2024-05-01 16:08:44 +02:00
5 changed files with 53 additions and 10 deletions

View File

@ -40,7 +40,16 @@
proxyPass = "http://100.84.215.84:8096";
};
};
virtualHosts."podgrab.lauterer.it" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
proxyPass = "http://100.84.215.84:4242";
};
basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
};

View File

@ -16,6 +16,7 @@
../../profiles/base.nix
../../profiles/sops.nix
../../profiles/ai.nix
../../profiles/mediaserver.nix
../../services/smb.nix
../../services/torrent.nix
@ -62,9 +63,6 @@
tailscale
nfs-utils
cifs-utils
jellyfin
jellyfin-web
jellyfin-mpv-shim
jftui
sonixd
unpackerr
@ -87,12 +85,6 @@
##productivity
#services.tandoor-recipes.enable = true;
##media
users.groups.media.members = ["jellyfin"]; #have media directory owned by media group
services.jellyfin.group = "media";
services.jellyfin.enable = true;
# services.komga.enable = true;
#services.polaris.enable = true;

15
profiles/mediaserver.nix Normal file
View File

@ -0,0 +1,15 @@
{ config, pkgs, lib, ... }:
{
imports =
[
./base.nix
../services/podgrab.nix
../services/jellyfin.nix
];
environment.systemPackages = with pkgs.unstable; [
];
}

18
services/jellyfin.nix Normal file
View File

@ -0,0 +1,18 @@
{ config, pkgs, lib, ... }:
{
environment.systemPackages = with pkgs; [
nfs-utils
cifs-utils
jellyfin
jellyfin-web
jellyfin-mpv-shim
jftui
sonixd
unpackerr
];
users.groups.media.members = ["jellyfin"]; #have media directory owned by media group
services.jellyfin.group = "media";
services.jellyfin.enable = true;
services.jellyfin.openFirewall = true;
}

9
services/podgrab.nix Normal file
View File

@ -0,0 +1,9 @@
{ config, pkgs, lib, ... }:
{
environment.systemPackages = [
pkgs.podgrab
];
services.podgrab.enable = true;
services.podgrab.port = 4242;
networking.firewall.allowedTCPPorts = [ config.services.podgrab.port ];
}