Add transmission
This commit is contained in:
parent
d1f430db0d
commit
be6c605f38
@ -306,6 +306,11 @@
|
|||||||
reverse_proxy lidarr:${builtins.toString config.containers.lidarr.config.services.lidarr.settings.server.port}
|
reverse_proxy lidarr:${builtins.toString config.containers.lidarr.config.services.lidarr.settings.server.port}
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
"https://transmission.dalinar.home.johannes-rothe.de" = {
|
||||||
|
extraConfig = ''
|
||||||
|
reverse_proxy lidarr:${builtins.toString config.containers.lidarr.config.services.transmission.settings.rpc-port}
|
||||||
|
'';
|
||||||
|
};
|
||||||
"https://jellyfin.dalinar.home.johannes-rothe.de" = {
|
"https://jellyfin.dalinar.home.johannes-rothe.de" = {
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
reverse_proxy localhost:8096
|
reverse_proxy localhost:8096
|
||||||
@ -357,25 +362,43 @@
|
|||||||
enableTun = true;
|
enableTun = true;
|
||||||
hostAddress = "192.168.100.4";
|
hostAddress = "192.168.100.4";
|
||||||
localAddress = "192.168.100.5";
|
localAddress = "192.168.100.5";
|
||||||
config = { ... }: {
|
config = { pkgs, ... }: {
|
||||||
system.stateVersion = "24.11";
|
system.stateVersion = "24.11";
|
||||||
networking.useHostResolvConf = lib.mkForce false;
|
networking.useHostResolvConf = lib.mkForce false;
|
||||||
# Required workaround for tailscale exit nodes, see https://nixos.wiki/wiki/Tailscale
|
# Required workaround for tailscale exit nodes, see https://nixos.wiki/wiki/Tailscale
|
||||||
networking.firewall.checkReversePath = "loose";
|
networking.firewall.checkReversePath = "loose";
|
||||||
networking.nftables.enable = true;
|
networking.nftables.enable = true;
|
||||||
services.resolved.enable = true;
|
services.resolved.enable = true;
|
||||||
|
|
||||||
# Tailscale is also used for local connectivity, since the exit node for
|
# Tailscale is also used for local connectivity, since the exit node for
|
||||||
# some reason prevents local access
|
# some reason prevents local access
|
||||||
services.tailscale.enable = true;
|
services.tailscale.enable = true;
|
||||||
|
|
||||||
|
services.transmission = {
|
||||||
|
enable = true;
|
||||||
|
openRPCPort = true;
|
||||||
|
settings = {
|
||||||
|
rpc-port = 9091;
|
||||||
|
rpc-bind-address = "0.0.0.0";
|
||||||
|
rpc-whitelist-enabled = false;
|
||||||
|
rpc-authentication-required = true;
|
||||||
|
# TODO change
|
||||||
|
rpc-password = "123456";
|
||||||
|
rpc-username = "123456";
|
||||||
|
};
|
||||||
|
webHome = pkgs.flood-for-transmission;
|
||||||
|
};
|
||||||
|
# https://github.com/NixOS/nixpkgs/issues/258793
|
||||||
|
systemd.services.transmission.serviceConfig = {
|
||||||
|
RootDirectoryStartOnly = lib.mkForce false;
|
||||||
|
RootDirectory = lib.mkForce "";
|
||||||
|
PrivateMounts = lib.mkForce false;
|
||||||
|
PrivateUsers = lib.mkForce false;
|
||||||
|
};
|
||||||
|
|
||||||
services.lidarr = {
|
services.lidarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
#settings = {
|
|
||||||
# server = {
|
|
||||||
# bindaddress = "*";
|
|
||||||
# port = 8686;
|
|
||||||
# };
|
|
||||||
#};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
Loading…
x
Reference in New Issue
Block a user