aaaa
This commit is contained in:
parent
7ad3ef2ba1
commit
36c07aaa2a
5 changed files with 13 additions and 7 deletions
|
@ -170,24 +170,19 @@
|
||||||
aerial = mkNixos [ ./nixos/hosts/aerial ]; # desktop
|
aerial = mkNixos [ ./nixos/hosts/aerial ]; # desktop
|
||||||
cider = mkNixos [ ./nixos/hosts/cider ]; # asahi m2 mba
|
cider = mkNixos [ ./nixos/hosts/cider ]; # asahi m2 mba
|
||||||
dis-sociat-ing = mkNixos [ ./nixos/hosts/dis-sociat-ing ]; # Iceshrimp+Withdrawl, dis.sociat.ing
|
dis-sociat-ing = mkNixos [ ./nixos/hosts/dis-sociat-ing ]; # Iceshrimp+Withdrawl, dis.sociat.ing
|
||||||
drone = mkNixos [ ./nixos/hosts/drone ]; # spectre x360
|
|
||||||
exit-node = mkNixos [ ./nixos/hosts/exit-node ]; # lab jump
|
exit-node = mkNixos [ ./nixos/hosts/exit-node ]; # lab jump
|
||||||
git = mkNixos [ ./nixos/hosts/git ]; # Forgejo Host
|
git = mkNixos [ ./nixos/hosts/git ]; # Forgejo Host
|
||||||
ingress-proxy = mkNixos [ ./nixos/hosts/ingress-proxy ]; # nginx edge proxy
|
ingress-proxy = mkNixos [ ./nixos/hosts/ingress-proxy ]; # nginx edge proxy
|
||||||
jitsi = mkNixos [ ./nixos/hosts/jitsi ]; # jitsi meet
|
|
||||||
monitoring = mkNixos [ ./nixos/hosts/monitoring ]; # Grafana, Prometheus, Jaeger, etc
|
monitoring = mkNixos [ ./nixos/hosts/monitoring ]; # Grafana, Prometheus, Jaeger, etc
|
||||||
mumble = mkNixos [ ./nixos/hosts/mumble ]; # mumble
|
|
||||||
nas0 = mkNixos [ ./nixos/hosts/nas0 ]; # SMB/NFS NAS
|
nas0 = mkNixos [ ./nixos/hosts/nas0 ]; # SMB/NFS NAS
|
||||||
nextcloud = mkNixos [ ./nixos/hosts/nextcloud ]; # nextcloud
|
nextcloud = mkNixos [ ./nixos/hosts/nextcloud ]; # nextcloud
|
||||||
pihole = mkNixos [ ./nixos/hosts/pihole ]; # PiHole!
|
pihole = mkNixos [ ./nixos/hosts/pihole ]; # PiHole!
|
||||||
plex = mkNixos [ ./nixos/hosts/plex ]; # plex
|
plex = mkNixos [ ./nixos/hosts/plex ]; # plex
|
||||||
porcelain-doll-repair = mkNixos [ ./nixos/hosts/porcelain-doll-repair ]; # Iceshrimp+Withdrawl, porcelain.doll.repair
|
porcelain-doll-repair = mkNixos [ ./nixos/hosts/porcelain-doll-repair ]; # Iceshrimp+Withdrawl, porcelain.doll.repair
|
||||||
ps2live = mkNixos [ ./nixos/hosts/ps2live ]; # PS2.LIVE stack + planetside stuff
|
ps2live = mkNixos [ ./nixos/hosts/ps2live ]; # PS2.LIVE stack + planetside stuff
|
||||||
retrobox = mkNixos [ ./nixos/hosts/retrobox ]; # lil rpi
|
|
||||||
sapphic-engineer = mkNixos [ ./nixos/hosts/sapphic-engineer ]; # Akkoma, sapphic.engineer
|
sapphic-engineer = mkNixos [ ./nixos/hosts/sapphic-engineer ]; # Akkoma, sapphic.engineer
|
||||||
seedbox = mkNixos [ ./nixos/hosts/seedbox ]; # fuck
|
seedbox = mkNixos [ ./nixos/hosts/seedbox ]; # fuck
|
||||||
static-sites = mkNixos [ ./nixos/hosts/static-sites ]; # nginx specifically for static sites
|
static-sites = mkNixos [ ./nixos/hosts/static-sites ]; # nginx specifically for static sites
|
||||||
thonkpad = mkNixos [ ./nixos/hosts/thonkpad ]; # t480
|
|
||||||
ts3 = mkNixos [ ./nixos/hosts/ts3 ]; # Teamspeak-san
|
ts3 = mkNixos [ ./nixos/hosts/ts3 ]; # Teamspeak-san
|
||||||
unicorn = mkNixos [ ./nixos/hosts/unicorn ]; # legion thingy
|
unicorn = mkNixos [ ./nixos/hosts/unicorn ]; # legion thingy
|
||||||
};
|
};
|
||||||
|
|
|
@ -34,6 +34,7 @@
|
||||||
jq
|
jq
|
||||||
plexamp
|
plexamp
|
||||||
plex-media-player
|
plex-media-player
|
||||||
|
obsidian
|
||||||
];
|
];
|
||||||
|
|
||||||
programs.vscode = {
|
programs.vscode = {
|
||||||
|
|
|
@ -19,6 +19,7 @@
|
||||||
jq
|
jq
|
||||||
plexamp
|
plexamp
|
||||||
plex-media-player
|
plex-media-player
|
||||||
|
obsidian
|
||||||
];
|
];
|
||||||
|
|
||||||
programs.vscode = {
|
programs.vscode = {
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{ config, ... }: {
|
{ config, pkgs, ... }: {
|
||||||
nixpkgs.config.permittedInsecurePackages = [
|
nixpkgs.config.permittedInsecurePackages = [
|
||||||
"aspnetcore-runtime-6.0.36"
|
"aspnetcore-runtime-6.0.36"
|
||||||
"aspnetcore-runtime-wrapped-6.0.36"
|
"aspnetcore-runtime-wrapped-6.0.36"
|
||||||
|
@ -21,16 +21,20 @@
|
||||||
services.lidarr.enable = true;
|
services.lidarr.enable = true;
|
||||||
services.lidarr.user = "data";
|
services.lidarr.user = "data";
|
||||||
services.lidarr.group = "data";
|
services.lidarr.group = "data";
|
||||||
|
services.lidarr.package = pkgs.master.lidarr;
|
||||||
|
|
||||||
services.sonarr.enable = true;
|
services.sonarr.enable = true;
|
||||||
services.sonarr.user = "data";
|
services.sonarr.user = "data";
|
||||||
services.sonarr.group = "data";
|
services.sonarr.group = "data";
|
||||||
|
services.sonarr.package = pkgs.master.sonarr;
|
||||||
|
|
||||||
services.radarr.enable = true;
|
services.radarr.enable = true;
|
||||||
services.radarr.user = "data";
|
services.radarr.user = "data";
|
||||||
services.radarr.group = "data";
|
services.radarr.group = "data";
|
||||||
|
services.radarr.package = pkgs.master.radarr;
|
||||||
|
|
||||||
services.prowlarr.enable = true;
|
services.prowlarr.enable = true;
|
||||||
|
services.prowlarr.package = pkgs.master.prowlarr;
|
||||||
|
|
||||||
systemd.units.radarr.upheldBy = ["mnt-nas0.mount"];
|
systemd.units.radarr.upheldBy = ["mnt-nas0.mount"];
|
||||||
systemd.units.lidarr.upheldBy = ["mnt-nas0.mount"];
|
systemd.units.lidarr.upheldBy = ["mnt-nas0.mount"];
|
||||||
|
|
|
@ -9,13 +9,18 @@ OPENVPN_CONFIG=mx.protonvpn.udp
|
||||||
OPENVPN_USERNAME=${config.sops.placeholder.protonvpn_username}+pmp
|
OPENVPN_USERNAME=${config.sops.placeholder.protonvpn_username}+pmp
|
||||||
OPENVPN_PASSWORD=${config.sops.placeholder.protonvpn_password}
|
OPENVPN_PASSWORD=${config.sops.placeholder.protonvpn_password}
|
||||||
LOCAL_NETWORK=100.64.0.0/10
|
LOCAL_NETWORK=100.64.0.0/10
|
||||||
|
WEBPROXY_ENABLED=true
|
||||||
|
WEBPROXY_PORT=8118
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
virtualisation.oci-containers.containers = {
|
virtualisation.oci-containers.containers = {
|
||||||
torrenty = {
|
torrenty = {
|
||||||
image = "docker.io/haugene/transmission-openvpn";
|
image = "docker.io/haugene/transmission-openvpn";
|
||||||
ports = [ "9091:9091" ];
|
ports = [
|
||||||
|
"9091:9091"
|
||||||
|
"8118:8118"
|
||||||
|
];
|
||||||
environmentFiles = [
|
environmentFiles = [
|
||||||
config.sops.templates."transmission.env".path
|
config.sops.templates."transmission.env".path
|
||||||
];
|
];
|
||||||
|
|
Loading…
Add table
Reference in a new issue