box: enable readarr and rtorrent
This commit is contained in:
parent
f3a8ae9cf4
commit
24064af4bd
@ -437,11 +437,11 @@
|
|||||||
"stable": "stable_2"
|
"stable": "stable_2"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1690469873,
|
"lastModified": 1690836207,
|
||||||
"narHash": "sha256-ohAEIlsdUeOiIxsmN8GU6M5Ui0p1kChkxWQ+dYQGNTk=",
|
"narHash": "sha256-GirSUj6lEt70t6mZQAVI3UHyu9fkjwNSgUfXoGIUFU0=",
|
||||||
"ref": "main",
|
"ref": "main",
|
||||||
"rev": "aa792f779df5b2227b6087c8a04cc88dec0f506a",
|
"rev": "af2e01fe2f0933fa05ce7f4ac21107ed86b45596",
|
||||||
"revCount": 101,
|
"revCount": 102,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "ssh://xin-secrets-ro/qbit/xin-secrets.git"
|
"url": "ssh://xin-secrets-ro/qbit/xin-secrets.git"
|
||||||
},
|
},
|
||||||
|
@ -88,6 +88,8 @@ in {
|
|||||||
sops.secrets.bw_key = mkNginxSecret;
|
sops.secrets.bw_key = mkNginxSecret;
|
||||||
sops.secrets.invidious_cert = mkNginxSecret;
|
sops.secrets.invidious_cert = mkNginxSecret;
|
||||||
sops.secrets.invidious_key = mkNginxSecret;
|
sops.secrets.invidious_key = mkNginxSecret;
|
||||||
|
sops.secrets.readarr_cert = mkNginxSecret;
|
||||||
|
sops.secrets.readarr_key = mkNginxSecret;
|
||||||
|
|
||||||
boot.supportedFilesystems = ["zfs"];
|
boot.supportedFilesystems = ["zfs"];
|
||||||
boot.loader.grub.copyKernels = true;
|
boot.loader.grub.copyKernels = true;
|
||||||
@ -172,7 +174,7 @@ in {
|
|||||||
|
|
||||||
users.groups.media = {
|
users.groups.media = {
|
||||||
name = "media";
|
name = "media";
|
||||||
members = ["qbit" "sonarr" "radarr" "lidarr" "nzbget" "jellyfin" "headphones"];
|
members = ["qbit" "sonarr" "radarr" "lidarr" "nzbget" "jellyfin" "headphones" "rtorrent" "readarr"];
|
||||||
};
|
};
|
||||||
|
|
||||||
users.groups.photos = {
|
users.groups.photos = {
|
||||||
@ -277,6 +279,14 @@ in {
|
|||||||
|
|
||||||
tor.enable = true;
|
tor.enable = true;
|
||||||
|
|
||||||
|
rtorrent = {
|
||||||
|
enable = true;
|
||||||
|
downloadDir = "/media/downloads/rtorrent";
|
||||||
|
};
|
||||||
|
readarr = {
|
||||||
|
enable = true;
|
||||||
|
dataDir = "/media/books";
|
||||||
|
};
|
||||||
sonarr.enable = true;
|
sonarr.enable = true;
|
||||||
radarr.enable = true;
|
radarr.enable = true;
|
||||||
lidarr.enable = true;
|
lidarr.enable = true;
|
||||||
@ -769,6 +779,19 @@ in {
|
|||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
"readarr.bold.daemon" = {
|
||||||
|
sslCertificateKey = "${config.sops.secrets.readarr_key.path}";
|
||||||
|
sslCertificate = "${config.sops.secrets.readarr_cert.path}";
|
||||||
|
forceSSL = true;
|
||||||
|
locations."/" = {
|
||||||
|
proxyPass = "http://localhost:8787";
|
||||||
|
proxyWebsockets = true;
|
||||||
|
extraConfig = ''
|
||||||
|
${httpAllow}
|
||||||
|
deny all;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
"graph.bold.daemon" = {
|
"graph.bold.daemon" = {
|
||||||
sslCertificateKey = "${config.sops.secrets.graph_key.path}";
|
sslCertificateKey = "${config.sops.secrets.graph_key.path}";
|
||||||
|
@ -115,6 +115,7 @@ in {
|
|||||||
''"radarr.bold.daemon. IN A 100.120.151.126"''
|
''"radarr.bold.daemon. IN A 100.120.151.126"''
|
||||||
''"reddit.bold.daemon. IN A 100.120.151.126"''
|
''"reddit.bold.daemon. IN A 100.120.151.126"''
|
||||||
''"sonarr.bold.daemon. IN A 100.120.151.126"''
|
''"sonarr.bold.daemon. IN A 100.120.151.126"''
|
||||||
|
''"readarr.bold.daemon. IN A 100.120.151.126"''
|
||||||
''"graph.bold.daemon. IN A 100.120.151.126"''
|
''"graph.bold.daemon. IN A 100.120.151.126"''
|
||||||
''"invidious.bold.daemon. IN A 100.120.151.126"''
|
''"invidious.bold.daemon. IN A 100.120.151.126"''
|
||||||
''"router.bold.daemon. IN A 10.6.0.1"''
|
''"router.bold.daemon. IN A 10.6.0.1"''
|
||||||
|
Loading…
Reference in New Issue
Block a user