From d1f430db0d240ac45d5042cb8a49cff5effc2525 Mon Sep 17 00:00:00 2001 From: Johannes Rothe Date: Tue, 1 Apr 2025 23:22:05 +0200 Subject: [PATCH] Add lidarr to dalinar --- hosts/dalinar/default.nix | 21 ++++++++++++++++++++- 1 file changed, 20 insertions(+), 1 deletion(-) diff --git a/hosts/dalinar/default.nix b/hosts/dalinar/default.nix index 4c8eef7..7fd9291 100644 --- a/hosts/dalinar/default.nix +++ b/hosts/dalinar/default.nix @@ -301,6 +301,11 @@ reverse_proxy ${config.containers.searx.localAddress}:${builtins.toString config.containers.searx.config.services.searx.settings.server.port} ''; }; + "https://lidarr.dalinar.home.johannes-rothe.de" = { + extraConfig = '' + reverse_proxy lidarr:${builtins.toString config.containers.lidarr.config.services.lidarr.settings.server.port} + ''; + }; "https://jellyfin.dalinar.home.johannes-rothe.de" = { extraConfig = '' reverse_proxy localhost:8096 @@ -324,6 +329,7 @@ autoStart = true; ephemeral = true; privateNetwork = true; + # privateUsers = "pick"; hostAddress = "192.168.100.2"; localAddress = "192.168.100.3"; bindMounts."/run/secrets/searx-env" = { @@ -351,13 +357,26 @@ enableTun = true; hostAddress = "192.168.100.4"; localAddress = "192.168.100.5"; - config = { ... }: { + config = { ... }: { system.stateVersion = "24.11"; networking.useHostResolvConf = lib.mkForce false; # Required workaround for tailscale exit nodes, see https://nixos.wiki/wiki/Tailscale networking.firewall.checkReversePath = "loose"; + networking.nftables.enable = true; services.resolved.enable = true; + # Tailscale is also used for local connectivity, since the exit node for + # some reason prevents local access services.tailscale.enable = true; + services.lidarr = { + enable = true; + openFirewall = true; + #settings = { + # server = { + # bindaddress = "*"; + # port = 8686; + # }; + #}; + }; }; };