Compare commits

..

No commits in common. "c936b6717247e107eb1309322828498defeed287" and "86fea7e3f6f5c952ece8b413d6e15a03f9f5ad22" have entirely different histories.

5 changed files with 10 additions and 53 deletions

View File

@ -41,15 +41,6 @@
}; };
}; };
virtualHosts."podgrab.lauterer.it" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
proxyPass = "http://100.84.215.84:4242";
};
basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
};

View File

@ -16,7 +16,6 @@
../../profiles/base.nix ../../profiles/base.nix
../../profiles/sops.nix ../../profiles/sops.nix
../../profiles/ai.nix ../../profiles/ai.nix
../../profiles/mediaserver.nix
../../services/smb.nix ../../services/smb.nix
../../services/torrent.nix ../../services/torrent.nix
@ -63,6 +62,9 @@
tailscale tailscale
nfs-utils nfs-utils
cifs-utils cifs-utils
jellyfin
jellyfin-web
jellyfin-mpv-shim
jftui jftui
sonixd sonixd
unpackerr unpackerr
@ -85,6 +87,12 @@
##productivity ##productivity
#services.tandoor-recipes.enable = true; #services.tandoor-recipes.enable = true;
##media
users.groups.media.members = ["jellyfin"]; #have media directory owned by media group
services.jellyfin.group = "media";
services.jellyfin.enable = true;
# services.komga.enable = true; # services.komga.enable = true;
#services.polaris.enable = true; #services.polaris.enable = true;

View File

@ -1,15 +0,0 @@
{ config, pkgs, lib, ... }:
{
imports =
[
./base.nix
../services/podgrab.nix
../services/jellyfin.nix
];
environment.systemPackages = with pkgs.unstable; [
];
}

View File

@ -1,18 +0,0 @@
{ config, pkgs, lib, ... }:
{
environment.systemPackages = with pkgs; [
nfs-utils
cifs-utils
jellyfin
jellyfin-web
jellyfin-mpv-shim
jftui
sonixd
unpackerr
];
users.groups.media.members = ["jellyfin"]; #have media directory owned by media group
services.jellyfin.group = "media";
services.jellyfin.enable = true;
services.jellyfin.openFirewall = true;
}

View File

@ -1,9 +0,0 @@
{ config, pkgs, lib, ... }:
{
environment.systemPackages = [
pkgs.podgrab
];
services.podgrab.enable = true;
services.podgrab.port = 4242;
networking.firewall.allowedTCPPorts = [ config.services.podgrab.port ];
}