box: enable readarr and rtorrent

This commit is contained in:
Aaron Bieber 2023-07-31 15:45:35 -06:00
parent f3a8ae9cf4
commit 24064af4bd
No known key found for this signature in database
3 changed files with 29 additions and 5 deletions

8
flake.lock generated
View File

@ -437,11 +437,11 @@
"stable": "stable_2" "stable": "stable_2"
}, },
"locked": { "locked": {
"lastModified": 1690469873, "lastModified": 1690836207,
"narHash": "sha256-ohAEIlsdUeOiIxsmN8GU6M5Ui0p1kChkxWQ+dYQGNTk=", "narHash": "sha256-GirSUj6lEt70t6mZQAVI3UHyu9fkjwNSgUfXoGIUFU0=",
"ref": "main", "ref": "main",
"rev": "aa792f779df5b2227b6087c8a04cc88dec0f506a", "rev": "af2e01fe2f0933fa05ce7f4ac21107ed86b45596",
"revCount": 101, "revCount": 102,
"type": "git", "type": "git",
"url": "ssh://xin-secrets-ro/qbit/xin-secrets.git" "url": "ssh://xin-secrets-ro/qbit/xin-secrets.git"
}, },

View File

@ -88,6 +88,8 @@ in {
sops.secrets.bw_key = mkNginxSecret; sops.secrets.bw_key = mkNginxSecret;
sops.secrets.invidious_cert = mkNginxSecret; sops.secrets.invidious_cert = mkNginxSecret;
sops.secrets.invidious_key = mkNginxSecret; sops.secrets.invidious_key = mkNginxSecret;
sops.secrets.readarr_cert = mkNginxSecret;
sops.secrets.readarr_key = mkNginxSecret;
boot.supportedFilesystems = ["zfs"]; boot.supportedFilesystems = ["zfs"];
boot.loader.grub.copyKernels = true; boot.loader.grub.copyKernels = true;
@ -172,7 +174,7 @@ in {
users.groups.media = { users.groups.media = {
name = "media"; name = "media";
members = ["qbit" "sonarr" "radarr" "lidarr" "nzbget" "jellyfin" "headphones"]; members = ["qbit" "sonarr" "radarr" "lidarr" "nzbget" "jellyfin" "headphones" "rtorrent" "readarr"];
}; };
users.groups.photos = { users.groups.photos = {
@ -277,6 +279,14 @@ in {
tor.enable = true; tor.enable = true;
rtorrent = {
enable = true;
downloadDir = "/media/downloads/rtorrent";
};
readarr = {
enable = true;
dataDir = "/media/books";
};
sonarr.enable = true; sonarr.enable = true;
radarr.enable = true; radarr.enable = true;
lidarr.enable = true; lidarr.enable = true;
@ -769,6 +779,19 @@ in {
''; '';
}; };
}; };
"readarr.bold.daemon" = {
sslCertificateKey = "${config.sops.secrets.readarr_key.path}";
sslCertificate = "${config.sops.secrets.readarr_cert.path}";
forceSSL = true;
locations."/" = {
proxyPass = "http://localhost:8787";
proxyWebsockets = true;
extraConfig = ''
${httpAllow}
deny all;
'';
};
};
"graph.bold.daemon" = { "graph.bold.daemon" = {
sslCertificateKey = "${config.sops.secrets.graph_key.path}"; sslCertificateKey = "${config.sops.secrets.graph_key.path}";

View File

@ -115,6 +115,7 @@ in {
''"radarr.bold.daemon. IN A 100.120.151.126"'' ''"radarr.bold.daemon. IN A 100.120.151.126"''
''"reddit.bold.daemon. IN A 100.120.151.126"'' ''"reddit.bold.daemon. IN A 100.120.151.126"''
''"sonarr.bold.daemon. IN A 100.120.151.126"'' ''"sonarr.bold.daemon. IN A 100.120.151.126"''
''"readarr.bold.daemon. IN A 100.120.151.126"''
''"graph.bold.daemon. IN A 100.120.151.126"'' ''"graph.bold.daemon. IN A 100.120.151.126"''
''"invidious.bold.daemon. IN A 100.120.151.126"'' ''"invidious.bold.daemon. IN A 100.120.151.126"''
''"router.bold.daemon. IN A 10.6.0.1"'' ''"router.bold.daemon. IN A 10.6.0.1"''