mirror of
https://github.com/JulienMalka/snowfield.git
synced 2025-06-08 10:09:04 +02:00
Added flaresolverr service and some other
This commit is contained in:
parent
5545b88992
commit
53554b019b
11 changed files with 333 additions and 1 deletions
32
modules/bruit/default.nix
Normal file
32
modules/bruit/default.nix
Normal file
|
@ -0,0 +1,32 @@
|
|||
{ lib, pkgs, config, ... }:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.luj.bruit;
|
||||
port = 3500;
|
||||
in
|
||||
{
|
||||
|
||||
options.luj.bruit = {
|
||||
|
||||
enable = mkEnableOption "activate bruit monitoring";
|
||||
|
||||
nginx.enable = mkEnableOption "activate nginx";
|
||||
nginx.subdomain = mkOption {
|
||||
type = types.str;
|
||||
};
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable (
|
||||
mkMerge [{
|
||||
services.grafana.enable = true;
|
||||
services.grafana.port = port;
|
||||
luj.influxdb.enable = true;
|
||||
luj.influxdb.nginx = {
|
||||
enable = true;
|
||||
subdomain = "influxdb";
|
||||
};
|
||||
}
|
||||
|
||||
(mkIf cfg.nginx.enable (mkSubdomain cfg.nginx.subdomain port))]);
|
||||
|
||||
}
|
26
modules/flaresolverr/default.nix
Normal file
26
modules/flaresolverr/default.nix
Normal file
|
@ -0,0 +1,26 @@
|
|||
{ lib, pkgs, config, ... }:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.luj.flaresolverr;
|
||||
in
|
||||
{
|
||||
|
||||
options.luj.flaresolverr = {
|
||||
enable = mkEnableOption "activate flaresolverr service";
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
systemd.services.flaresolverr = {
|
||||
description = "Flaresolverr";
|
||||
after = [ "network.target" ];
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
|
||||
serviceConfig = {
|
||||
Type = "simple";
|
||||
ExecStart = "${pkgs.flaresolverr}/bin/flaresolverr";
|
||||
Restart = "on-failure";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
}
|
26
modules/influxdb/default.nix
Normal file
26
modules/influxdb/default.nix
Normal file
|
@ -0,0 +1,26 @@
|
|||
{ lib, pkgs, config, ... }:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.luj.influxdb;
|
||||
port = 8086;
|
||||
in
|
||||
{
|
||||
|
||||
options.luj.influxdb = {
|
||||
|
||||
enable = mkEnableOption "activate influxdb service";
|
||||
|
||||
nginx.enable = mkEnableOption "activate nginx";
|
||||
nginx.subdomain = mkOption {
|
||||
type = types.str;
|
||||
};
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable (
|
||||
mkMerge [{
|
||||
services.influxdb2.enable = true;
|
||||
}
|
||||
|
||||
(mkIf cfg.nginx.enable (mkSubdomain cfg.nginx.subdomain port))]);
|
||||
|
||||
}
|
|
@ -33,11 +33,13 @@ in
|
|||
services.jackett = {
|
||||
enable = true;
|
||||
user = cfg.user;
|
||||
package = pkgs.unstable.jackett;
|
||||
group = cfg.group;
|
||||
};
|
||||
|
||||
}
|
||||
|
||||
(mkIf cfg.nginx.enable (mkSubdomain cfg.nginx.subdomain port) )]);
|
||||
(mkIf cfg.nginx.enable (mkSubdomain cfg.nginx.subdomain port))]);
|
||||
|
||||
|
||||
|
||||
|
|
46
modules/lidarr/default.nix
Normal file
46
modules/lidarr/default.nix
Normal file
|
@ -0,0 +1,46 @@
|
|||
{ lib, pkgs, config, ... }:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.luj.lidarr;
|
||||
port = 8686;
|
||||
in
|
||||
{
|
||||
|
||||
options.luj.lidarr = {
|
||||
|
||||
enable = mkEnableOption "activate lidarr service";
|
||||
|
||||
user = mkOption {
|
||||
type = types.str;
|
||||
default = "lidarr";
|
||||
description = "User account under which Lidarr runs.";
|
||||
};
|
||||
|
||||
group = mkOption {
|
||||
type = types.str;
|
||||
default = "lidarr";
|
||||
description = "Group under which Lidarr runs.";
|
||||
};
|
||||
|
||||
nginx.enable = mkEnableOption "activate nginx";
|
||||
nginx.subdomain = mkOption {
|
||||
type = types.str;
|
||||
};
|
||||
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable (
|
||||
mkMerge [{
|
||||
services.lidarr = {
|
||||
enable = true;
|
||||
user = cfg.user;
|
||||
group = cfg.group;
|
||||
};
|
||||
}
|
||||
|
||||
(mkIf cfg.nginx.enable (mkSubdomain cfg.nginx.subdomain port) )]);
|
||||
|
||||
|
||||
|
||||
|
||||
}
|
|
@ -37,6 +37,14 @@ in {
|
|||
nginx.subdomain = "films";
|
||||
};
|
||||
|
||||
luj.lidarr = {
|
||||
enable = true;
|
||||
user = "mediaserver";
|
||||
group = "mediaserver";
|
||||
nginx.enable = true;
|
||||
nginx.subdomain = "songs";
|
||||
};
|
||||
|
||||
luj.jellyfin = {
|
||||
enable = true;
|
||||
user = "mediaserver";
|
||||
|
@ -53,6 +61,16 @@ in {
|
|||
nginx.subdomain = "jackett";
|
||||
};
|
||||
|
||||
luj.flaresolverr.enable = true;
|
||||
|
||||
luj.navidrome = {
|
||||
enable = true;
|
||||
user = "mediaserver";
|
||||
group = "mediaserver";
|
||||
nginx.enable = true;
|
||||
nginx.subdomain = "music";
|
||||
};
|
||||
|
||||
luj.transmission = {
|
||||
enable = true;
|
||||
user = "mediaserver";
|
||||
|
|
104
modules/navidrome/default.nix
Normal file
104
modules/navidrome/default.nix
Normal file
|
@ -0,0 +1,104 @@
|
|||
{ lib, pkgs, config, ... }:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.luj.navidrome;
|
||||
port = 4533;
|
||||
settingsFormat = pkgs.formats.json {};
|
||||
in
|
||||
{
|
||||
|
||||
options.luj.navidrome = {
|
||||
|
||||
enable = mkEnableOption "activate navidrome service";
|
||||
|
||||
user = mkOption {
|
||||
type = types.str;
|
||||
default = "navidrome";
|
||||
description = "User account under which Navidrome runs.";
|
||||
};
|
||||
|
||||
group = mkOption {
|
||||
type = types.str;
|
||||
default = "navidrome";
|
||||
description = "Group under which Navidrome runs.";
|
||||
};
|
||||
|
||||
|
||||
settings = mkOption rec {
|
||||
type = settingsFormat.type;
|
||||
apply = recursiveUpdate default;
|
||||
default = {
|
||||
Address = "127.0.0.1";
|
||||
Port = 4533;
|
||||
MusicFolder = "/home/mediaserver/music";
|
||||
EnableGravatar = true;
|
||||
LastFM.Enabled = false;
|
||||
ListenBrainz.Enabled = false;
|
||||
};
|
||||
example = {
|
||||
MusicFolder = "/mnt/music";
|
||||
};
|
||||
description = ''
|
||||
Configuration for Navidrome, see <link xlink:href="https://www.navidrome.org/docs/usage/configuration-options/"/> for supported values.
|
||||
'';
|
||||
};
|
||||
|
||||
nginx.enable = mkEnableOption "activate nginx";
|
||||
nginx.subdomain = mkOption {
|
||||
type = types.str;
|
||||
};
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable (
|
||||
mkMerge [{
|
||||
|
||||
systemd.services.navidrome = {
|
||||
description = "Navidrome Media Server";
|
||||
after = [ "network.target" ];
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
serviceConfig = {
|
||||
User = cfg.user;
|
||||
Group = cfg.group;
|
||||
ExecStart = ''
|
||||
${pkgs.navidrome}/bin/navidrome --configfile ${settingsFormat.generate "navidrome.json" cfg.settings}
|
||||
'';
|
||||
DynamicUser = true;
|
||||
StateDirectory = "navidrome";
|
||||
WorkingDirectory = "/var/lib/navidrome";
|
||||
RuntimeDirectory = "navidrome";
|
||||
RootDirectory = "/run/navidrome";
|
||||
ReadWritePaths = "";
|
||||
BindReadOnlyPaths = [
|
||||
builtins.storeDir
|
||||
] ++ lib.optional (cfg.settings ? MusicFolder) cfg.settings.MusicFolder;
|
||||
CapabilityBoundingSet = "";
|
||||
RestrictAddressFamilies = [ "AF_UNIX" "AF_INET" "AF_INET6" ];
|
||||
RestrictNamespaces = true;
|
||||
PrivateDevices = true;
|
||||
PrivateUsers = true;
|
||||
ProtectClock = true;
|
||||
ProtectControlGroups = true;
|
||||
#ProtectHome = true;
|
||||
ProtectKernelLogs = true;
|
||||
ProtectKernelModules = true;
|
||||
ProtectKernelTunables = true;
|
||||
SystemCallArchitectures = "native";
|
||||
SystemCallFilter = [ "@system-service" "~@privileged" "~@resources" ];
|
||||
RestrictRealtime = true;
|
||||
LockPersonality = true;
|
||||
MemoryDenyWriteExecute = true;
|
||||
#UMask = "0066";
|
||||
ProtectHostname = true;
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
|
||||
}
|
||||
|
||||
(mkIf cfg.nginx.enable (mkSubdomain cfg.nginx.subdomain port))]);
|
||||
|
||||
|
||||
|
||||
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue