Compare commits

..

No commits in common. "e7edad891f59a7f9e550ef38b73659b02914cdb9" and "b41198d7a512f2f854a0ebf5430955ae84d5cfdd" have entirely different histories.

13 changed files with 27 additions and 181 deletions

View file

@ -26,9 +26,7 @@ let
"transmission2.robi" = hosts.robi; "transmission2.robi" = hosts.robi;
"sonarr.robi" = hosts.robi; "sonarr.robi" = hosts.robi;
"radarr.robi" = hosts.robi; "radarr.robi" = hosts.robi;
"tdarr.robi" = hosts.robi; "tadarr.robi" = hosts.robi;
"prowlarr.robi" = hosts.robi;
"jellyseerr.robi" = hosts.robi;
# pepe # pepe
"grafana.pepe" = hosts.pepe; "grafana.pepe" = hosts.pepe;
"loki.pepe" = hosts.pepe; "loki.pepe" = hosts.pepe;

View file

@ -22,11 +22,11 @@
#./mail-fetcher.nix #./mail-fetcher.nix
#./borg.nix #./borg.nix
./taskwarrior-autotag.nix #./taskwarrior-pushover.nix
./media-share.nix ./media-share.nix
./media-audiobookshelf.nix ./media-audiobookshelf.nix
#./media-tdarr.nix ./media-tdarr.nix
./media-jellyfin.nix ./media-jellyfin.nix
./media-youtube.nix ./media-youtube.nix
./media-castget.nix ./media-castget.nix

View file

@ -15,16 +15,16 @@
series = "/media/series"; series = "/media/series";
samples = "/media/samples"; samples = "/media/samples";
}; };
#custom.samba-share.private = { custom.samba-share.private = {
# media = { media = {
# folder = "/media"; folder = "/media";
# users = "media"; users = "media";
# }; };
# temp = { temp = {
# folder = "/srv/tdarr/transcode_cache"; folder = "/srv/tdarr/transcode_cache";
# users = "media"; users = "media";
# }; };
#}; };
users.groups."media".gid = config.ids.gids.transmission; users.groups."media".gid = config.ids.gids.transmission;
users.users."media" = { users.users."media" = {

View file

@ -120,11 +120,11 @@ let
target = "/media/youtube/channels/Jules"; target = "/media/youtube/channels/Jules";
output = "%(channel)s S%(upload_date>%Y)sE%(upload_date>%m%d)s %(title)s.%(ext)s"; output = "%(channel)s S%(upload_date>%Y)sE%(upload_date>%m%d)s %(title)s.%(ext)s";
}; };
#UrknallWeltallLeben = { UrknallWeltallLeben = {
# url = "https://youtube.com/@UrknallWeltallLeben"; url = "https://youtube.com/@UrknallWeltallLeben";
# target = "/media/youtube/channels/Urknall Weltall Leben"; target = "/media/youtube/channels/Urknall Weltall Leben";
# output = "%(channel)s S%(upload_date>%Y)sE%(upload_date>%m%d)s %(title)s.%(ext)s"; output = "%(channel)s S%(upload_date>%Y)sE%(upload_date>%m%d)s %(title)s.%(ext)s";
#}; };
ColdMirrorProdukte = { ColdMirrorProdukte = {
url = "https://www.youtube.com/watch?list=PLDvBqWb1UAGckU8CEJ8kDsk3ii8bbHT-s"; url = "https://www.youtube.com/watch?list=PLDvBqWb1UAGckU8CEJ8kDsk3ii8bbHT-s";
target = "/media/youtube/channels/ColdMirror ProduktBeschreibungen"; target = "/media/youtube/channels/ColdMirror ProduktBeschreibungen";

View file

@ -23,27 +23,12 @@
src = "root@robi:/var/lib/bitwarden_rs/"; src = "root@robi:/var/lib/bitwarden_rs/";
dst = "/mirror/bitwarden_rs"; dst = "/mirror/bitwarden_rs";
}; };
#torrent = { torrent = {
# sshKeyPath = config.sops.secrets.rsync_private_key.path;
# src = "root@robi:/media/torrent/downloads/";
# dst = "/media/torrent";
# startAt = "00/5:00"; # every 5 hours
#};
radarr = {
sshKeyPath = config.sops.secrets.rsync_private_key.path; sshKeyPath = config.sops.secrets.rsync_private_key.path;
src = "root@robi:/media/arr/radarr"; src = "root@robi:/media/torrent/downloads/";
dst = "/media/arr/radarr"; dst = "/media/torrent";
delete = false; startAt = "00/5:00"; # every 5 hours
}; };
sonarr = {
sshKeyPath = config.sops.secrets.rsync_private_key.path;
src = "root@robi:/media/arr/sonarr";
dst = "/media/arr/sonarr";
delete = false;
};
}; };

View file

@ -1,28 +0,0 @@
{ config, lib, pkgs, ... }:
{
sops.secrets.autotagTaskwarriorCa = {
owner = "taskwarrior-autotag";
key = "taskwarriorCa";
};
sops.secrets.autotagTaskwarriorCertificate = {
owner = "taskwarrior-autotag";
key = "taskwarriorCertificate";
};
sops.secrets.autotagTaskwarriorKey = {
owner = "taskwarrior-autotag";
key = "taskwarriorKey";
};
services.taskwarrior-autotag = {
enable = true;
recurrence = "off";
onCalendar = "hourly";
server = "taskd.ingolf-wagner.de:53589";
caFile = config.sops.secrets.autotagTaskwarriorCa.path;
certificateFile = config.sops.secrets.autotagTaskwarriorCertificate.path;
keyFile = config.sops.secrets.autotagTaskwarriorKey.path;
credentials = "1337/palo/ad40dce8-4b38-4011-b032-60a91b6f22cd";
};
}

View file

@ -22,12 +22,11 @@
./nextcloud.nix ./nextcloud.nix
./packages.nix ./packages.nix
./taskserver.nix ./taskserver.nix
./tinc.nix
./vaultwarden.nix ./vaultwarden.nix
./nginx.nix ./nginx.nix
./nginx-wkd.nix ./nginx-wkd.nix
./wireguard.nix
./network-tinc.nix
./network-wireguard.nix
./media-share.nix ./media-share.nix
./media-jellyfin.nix ./media-jellyfin.nix
@ -35,7 +34,6 @@
./media-transmission.nix ./media-transmission.nix
./media-transmission2.nix ./media-transmission2.nix
./media-arr.nix ./media-arr.nix
./media-tdarr.nix
./social-jitsi.nix ./social-jitsi.nix

View file

@ -1,39 +1,17 @@
{ config, ... }: { config, ... }:
{ {
networking.firewall.interfaces.wg0.allowedTCPPorts = [ 7878 8989 ];
# download series
services.sonarr = { services.sonarr = {
enable = true; enable = true;
group = "media"; group = "media";
user = "media"; user = "media";
}; };
# download movies
services.radarr = { services.radarr = {
enable = true; enable = true;
group = "media"; group = "media";
user = "media"; user = "media";
}; };
# better indexer apis
services.prowlarr = {
enable = true;
#group = "media";
#user = "media";
};
services.jellyseerr = {
enable = true;
};
services.permown."/media/arr" = {
owner = "media";
group = "media";
directory-mode = "770";
file-mode = "770";
};
services.nginx.virtualHosts = { services.nginx.virtualHosts = {
"radarr.${config.networking.hostName}.private" = { "radarr.${config.networking.hostName}.private" = {
extraConfig = '' extraConfig = ''
@ -55,26 +33,6 @@
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };
"prowlarr.${config.networking.hostName}.private" = {
extraConfig = ''
allow ${config.tinc.private.subnet};
deny all;
'';
locations."/" = {
proxyPass = "http://localhost:9696";
proxyWebsockets = true;
};
};
"jellyseerr.${config.networking.hostName}.private" = {
extraConfig = ''
allow ${config.tinc.private.subnet};
deny all;
'';
locations."/" = {
proxyPass = "http://localhost:${toString config.services.jellyseerr.port}";
proxyWebsockets = true;
};
};
}; };
} }

View file

@ -1,51 +0,0 @@
{ config, lib, pkgs, ... }:
{
# https://docs.tdarr.io/docs/installation/docker/run-compose
virtualisation.oci-containers = {
containers.tdarr = {
volumes = [
"/media/arr/tdarr/server:/app/server"
"/media/arr/tdarr/configs:/app/configs"
"/media/arr/tdarr/logs:/app/logs"
"/media/arr/tdarr/transcode_cache:/temp"
"/media:/media"
];
environment = {
serverIP = "0.0.0.0";
serverPort = "8266";
webUIPort = "8265";
internalNode = "true";
inContainer = "true";
nodeName = "robi";
TZ = "Europe/Berlin";
PUID = toString config.users.users.media.uid;
PGID = toString config.users.groups.media.gid;
};
ports = [
"8265:8265" # WebUI
"8266:8266" # server port
];
image = "ghcr.io/haveagitgat/tdarr:latest"; # Warning: if the tag does not change, the image will not be updated
#extraOptions = [ "--network=bridge" ];
};
};
#networking.firewall.interfaces.wq0.allowedTCPPorts = [ 8266 ];
#networking.firewall.interfaces.wq0.allowedUDPPorts = [ 8266 ];
#networking.firewall.interfaces.enp0s31f6.allowedTCPPorts = [ 8266 ];
#networking.firewall.interfaces.enp0s31f6.allowedUDPPorts = [ 8266 ];
services.nginx.virtualHosts."tdarr.${config.networking.hostName}.private" = {
extraConfig = ''
allow ${config.tinc.private.subnet};
deny all;
'';
locations."/" = {
proxyPass = "http://localhost:8265";
proxyWebsockets = true;
};
};
}

View file

@ -8,18 +8,9 @@
}; };
# https://github.com/influxdata/telegraf/tree/master/plugins/inputs < all them plugins # https://github.com/influxdata/telegraf/tree/master/plugins/inputs < all them plugins
inputs = { inputs = {
cpu = { cpu = { };
percpu = true;
totalcpu = true;
};
disk = { };
diskio = { }; diskio = { };
kernel = { };
mem = { };
processes = { }; processes = { };
netstat = { };
net = { };
system = { };
systemd_units = { }; systemd_units = { };
nginx.urls = [ "http://localhost/nginx_status" ]; nginx.urls = [ "http://localhost/nginx_status" ];
}; };

View file

@ -1,6 +1,6 @@
{ pkgs, config, ... }: { pkgs, config, ... }:
{ {
# networking.firewall.trustedInterfaces = [ "wg0" ]; networking.firewall.trustedInterfaces = [ "wg0" ];
networking.firewall.allowedUDPPorts = [ 51820 ]; networking.firewall.allowedUDPPorts = [ 51820 ];
sops.secrets.wireguard_private = { }; sops.secrets.wireguard_private = { };
boot.kernel.sysctl."net.ipv4.ip_forward" = true; boot.kernel.sysctl."net.ipv4.ip_forward" = true;

View file

@ -19,7 +19,7 @@ let
rsync \ rsync \
--rsh=${escape ssh} \ --rsh=${escape ssh} \
--append -avz \ --append -avz \
${optionalString plan.delete "--delete"} \ --delete \
"$rsync_src/" \ "$rsync_src/" \
"$rsync_dst" "$rsync_dst"
''; '';
@ -45,11 +45,6 @@ in
default = "hourly"; default = "hourly";
type = with types; nullOr str; # TODO systemd.time(7)'s calendar event type = with types; nullOr str; # TODO systemd.time(7)'s calendar event
}; };
delete = mkOption {
type = types.bool;
default = true;
description = "delete old files (adds the --delete argument to rsync)";
};
timerConfig = mkOption { timerConfig = mkOption {
type = with types; attrsOf str; type = with types; attrsOf str;
default = optionalAttrs (config.startAt != null) { default = optionalAttrs (config.startAt != null) {