mirror of
https://github.com/harryssecret/homelab-nix.git
synced 2025-08-08 06:30:18 +02:00
disabled features i didnt needed
This commit is contained in:
parent
12596749b5
commit
8cfb304e5c
10 changed files with 184 additions and 185 deletions
|
@ -3,9 +3,9 @@
|
|||
{
|
||||
imports = [
|
||||
./crafty-controller.nix
|
||||
./flaresolverr.nix
|
||||
# ./flaresolverr.nix
|
||||
./freshrss.nix
|
||||
./sonarr.nix
|
||||
# ./sonarr.nix
|
||||
#./pihole-exporter.nix
|
||||
];
|
||||
}
|
||||
|
|
|
@ -1,17 +1,19 @@
|
|||
{pkgs, config, ...} :
|
||||
{ pkgs, config, ... }:
|
||||
{
|
||||
services.mysql = {
|
||||
enable = true;
|
||||
enable = false;
|
||||
package = pkgs.mariadb;
|
||||
ensureDatabases = [ "photoprism" ];
|
||||
ensureUsers = [
|
||||
{
|
||||
name = "photoprism";
|
||||
ensurePermissions = {
|
||||
"photoprism.*" = "ALL PRIVILEGES";
|
||||
};
|
||||
}
|
||||
];
|
||||
/*
|
||||
ensureDatabases = [ "photoprism" ];
|
||||
ensureUsers = [
|
||||
{
|
||||
name = "photoprism";
|
||||
ensurePermissions = {
|
||||
"photoprism.*" = "ALL PRIVILEGES";
|
||||
};
|
||||
}
|
||||
];
|
||||
*/
|
||||
};
|
||||
|
||||
services.postgresql = {
|
||||
|
|
|
@ -13,18 +13,8 @@
|
|||
];
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
jellyfin
|
||||
jellyfin-web
|
||||
jellyfin-ffmpeg
|
||||
transmission
|
||||
sonarr
|
||||
radarr
|
||||
prowlarr
|
||||
readarr
|
||||
jellyseerr
|
||||
homepage-dashboard
|
||||
slskd
|
||||
bazarr
|
||||
ethtool
|
||||
networkd-dispatcher
|
||||
transcrypt
|
||||
|
|
|
@ -1,5 +1,6 @@
|
|||
{
|
||||
config,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
|
||||
|
@ -7,52 +8,60 @@ let
|
|||
cfg = config.arrSuite;
|
||||
in
|
||||
{
|
||||
services.sonarr = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
};
|
||||
|
||||
services.radarr = {
|
||||
enable = true;
|
||||
group = "multimedia";
|
||||
openFirewall = true;
|
||||
};
|
||||
|
||||
services.prowlarr = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
};
|
||||
|
||||
services.jellyseerr = {
|
||||
openFirewall = true;
|
||||
enable = true;
|
||||
};
|
||||
|
||||
services.bazarr = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
};
|
||||
environment.systemPackages = with pkgs; [
|
||||
sonarr
|
||||
radarr
|
||||
prowlarr
|
||||
jellyseerr
|
||||
bazarr
|
||||
];
|
||||
/*
|
||||
#TODO: create duplicated instances of Sonarr.
|
||||
systemd.services."sonarrAnime" = {
|
||||
enable = true;
|
||||
description = "Duplicated Sonarr instance, for animes";
|
||||
after = [
|
||||
"syslog.target"
|
||||
"network.target"
|
||||
];
|
||||
services.sonarr = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
};
|
||||
|
||||
path = [ pkgs.sonarr ];
|
||||
serviceConfig = {
|
||||
Type = "simple";
|
||||
User = "sonarr";
|
||||
ExecStart = "${pkgs.sonarr}/bin/Sonarr -nobrowser -data=/var/lib/sonarrAnime";
|
||||
TimeoutStopSec = "20";
|
||||
KillMode = "process";
|
||||
Restart = "on-failure";
|
||||
services.radarr = {
|
||||
enable = true;
|
||||
group = "multimedia";
|
||||
openFirewall = true;
|
||||
};
|
||||
|
||||
services.prowlarr = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
};
|
||||
|
||||
services.jellyseerr = {
|
||||
openFirewall = true;
|
||||
enable = true;
|
||||
};
|
||||
|
||||
services.bazarr = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
};
|
||||
/*
|
||||
#TODO: create duplicated instances of Sonarr.
|
||||
systemd.services."sonarrAnime" = {
|
||||
enable = true;
|
||||
description = "Duplicated Sonarr instance, for animes";
|
||||
after = [
|
||||
"syslog.target"
|
||||
"network.target"
|
||||
];
|
||||
|
||||
path = [ pkgs.sonarr ];
|
||||
serviceConfig = {
|
||||
Type = "simple";
|
||||
User = "sonarr";
|
||||
ExecStart = "${pkgs.sonarr}/bin/Sonarr -nobrowser -data=/var/lib/sonarrAnime";
|
||||
TimeoutStopSec = "20";
|
||||
KillMode = "process";
|
||||
Restart = "on-failure";
|
||||
};
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
*/
|
||||
|
||||
services.caddy.virtualHosts = {
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
imports = [
|
||||
./arr-suite.nix
|
||||
# ./arr-suite.nix
|
||||
./calibre-web.nix
|
||||
./slskd.nix
|
||||
./sabnzbd.nix
|
||||
# ./sabnzbd.nix
|
||||
./transmission.nix
|
||||
./jellyfin.nix
|
||||
];
|
||||
|
|
|
@ -4,6 +4,12 @@
|
|||
nixpkgs.config.packageOverrides = pkgs: {
|
||||
vaapiIntel = pkgs.vaapiIntel.override { enableHybridCodec = true; };
|
||||
};
|
||||
environment.systemPackages = with pkgs; [
|
||||
jellyfin
|
||||
jellyfin-web
|
||||
jellyfin-ffmpeg
|
||||
|
||||
];
|
||||
|
||||
hardware.graphics = {
|
||||
# hardware.opengl in 24.05
|
||||
|
|
|
@ -18,6 +18,10 @@ in
|
|||
};
|
||||
config = {
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
slskd
|
||||
];
|
||||
|
||||
sops.secrets.slskd = {
|
||||
sopsFile = "${secrets}/secrets/slskd.env";
|
||||
format = "dotenv";
|
||||
|
|
|
@ -10,7 +10,7 @@
|
|||
'';
|
||||
|
||||
systemd.services."archivebox-web" = {
|
||||
enable = true;
|
||||
enable = false;
|
||||
description = "Runs the archivebox web UI";
|
||||
preStart = ''
|
||||
mkdir -p /srv/archivebox
|
||||
|
|
|
@ -2,9 +2,9 @@
|
|||
{
|
||||
imports = [
|
||||
./akkoma.nix
|
||||
./archivebox.nix
|
||||
# ./archivebox.nix
|
||||
./homelab-dashboard.nix
|
||||
./nextcloud.nix
|
||||
# ./nextcloud.nix
|
||||
# ./photoprism.nix
|
||||
# TODO: configure irc server correctly
|
||||
# ./irc-server.nix
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue