Potentially broken commit to sync across machines

This commit is contained in:
Kat Inskip 2024-01-11 14:51:49 -08:00
parent ee0d52cd8c
commit 3e32cad35f
Signed by: kat
GPG key ID: 465E64DECEA8CF0F
15 changed files with 238 additions and 14 deletions

8
nixos/acme.nix Normal file
View file

@ -0,0 +1,8 @@
_: {
security.acme = {
acceptTerms = true;
defaults = {
email = "acme@gensokyo.zone";
};
};
}

13
nixos/bazarr.nix Normal file
View file

@ -0,0 +1,13 @@
{config, ...}: {
services = {
bazarr = {
enable = true;
listenPort = 6767;
};
nginx.virtualHosts."bazarr.gensokyo.zone" = {
enableACME = true;
locations."/".proxyPass = "http://localhost:${toString config.services.bazarr.listenPort}";
};
};
}

View file

@ -1,4 +1,8 @@
{ config, lib, ... }: let
{
config,
lib,
...
}: let
inherit (lib) mkDefault;
cfg = config.services.deluge;
in {
@ -24,7 +28,7 @@ in {
max_active_seeding = 1;
allow_remote = true;
daemon_port = 58846;
listen_ports = [ 6881 6889 ];
listen_ports = [6881 6889];
random_port = false;
};
authFile = config.sops.secrets.deluge-auth.path;

12
nixos/jackett.nix Normal file
View file

@ -0,0 +1,12 @@
_: {
services = {
jackett = {
enable = true;
};
nginx.virtualHosts."jackett.gensokyo.zone" = {
enableACME = true;
locations."/".proxyPass = "http://localhost:9117/";
};
};
# Port 9117
}

12
nixos/ombi.nix Normal file
View file

@ -0,0 +1,12 @@
{config, ...}: {
services = {
ombi = {
enable = true;
port = 5000;
};
nginx.virtualHosts."ombi.gensokyo.zone" = {
enableACME = true;
locations."/".proxyPass = "http://localhost:${toString config.services.ombi.port}";
};
};
}

29
nixos/plex.nix Normal file
View file

@ -0,0 +1,29 @@
_: {
services = {
plex = {
enable = true;
};
nginx.virtualHosts."plex.gensokyo.zone" = {
enableACME = true;
locations."/".proxyPass = "http://localhost:32400";
};
};
# Plex Media Server:
#
# TCP:
# * 32400 - direct HTTP access - we don't want to open this considering we're reverse proxying
# * 8324 - Roku via Plex Companion
# * 32469 - Plex DLNA Server
# UDP:
# * 1900 - DLNA
# * 5353 - Bonjour / Avahi
# * 32410, 32412, 32413, 32414 - GDM Network Discovery
# Tautulli and Ombi will also be reverse proxied, presumably
networking.firewall = {
allowedTCPPorts = [8324 32469];
allowedUDPPorts = [1900 5353 32410 32412 32413 32414];
};
}

View file

@ -1,11 +1,17 @@
{ config, pkgs, ... }: {
{
config,
pkgs,
...
}: {
services.postgresql = {
enable = true;
package = pkgs.postgresql_14;
ensureDatabases = [ "hass" ];
ensureUsers = [{
name = "hass";
ensureDBOwnership = true;
}];
ensureDatabases = ["hass"];
ensureUsers = [
{
name = "hass";
ensureDBOwnership = true;
}
];
};
}

13
nixos/radarr.nix Normal file
View file

@ -0,0 +1,13 @@
_: {
services = {
radarr = {
enable = true;
};
nginx.virtualHosts."radarr.gensokyo.zone" = {
enableACME = true;
locations."/".proxyPass = "http://localhost:7878";
};
};
# Port 7878
}

14
nixos/sonarr.nix Normal file
View file

@ -0,0 +1,14 @@
_: {
services = {
sonarr = {
enable = true;
};
nginx.virtualHosts."sonarr.gensokyo.zone" = {
enableACME = true;
locations."/".proxyPass = "http://localhost:8989";
};
};
# Port 8989
}

13
nixos/tautuli.nix Normal file
View file

@ -0,0 +1,13 @@
{config, ...}: {
services = {
tautulli = {
enable = true;
port = 8181;
};
nginx.virtualHosts."tautuli.gensokyo.zone" = {
enableACME = true;
locations."/".proxyPass = "http://localhost:${toString config.services.tautulli.port}";
};
};
}