Add lidarr to dalinar
This commit is contained in:
parent
dc582e9b4c
commit
d1f430db0d
@ -301,6 +301,11 @@
|
|||||||
reverse_proxy ${config.containers.searx.localAddress}:${builtins.toString config.containers.searx.config.services.searx.settings.server.port}
|
reverse_proxy ${config.containers.searx.localAddress}:${builtins.toString config.containers.searx.config.services.searx.settings.server.port}
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
"https://lidarr.dalinar.home.johannes-rothe.de" = {
|
||||||
|
extraConfig = ''
|
||||||
|
reverse_proxy lidarr:${builtins.toString config.containers.lidarr.config.services.lidarr.settings.server.port}
|
||||||
|
'';
|
||||||
|
};
|
||||||
"https://jellyfin.dalinar.home.johannes-rothe.de" = {
|
"https://jellyfin.dalinar.home.johannes-rothe.de" = {
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
reverse_proxy localhost:8096
|
reverse_proxy localhost:8096
|
||||||
@ -324,6 +329,7 @@
|
|||||||
autoStart = true;
|
autoStart = true;
|
||||||
ephemeral = true;
|
ephemeral = true;
|
||||||
privateNetwork = true;
|
privateNetwork = true;
|
||||||
|
# privateUsers = "pick";
|
||||||
hostAddress = "192.168.100.2";
|
hostAddress = "192.168.100.2";
|
||||||
localAddress = "192.168.100.3";
|
localAddress = "192.168.100.3";
|
||||||
bindMounts."/run/secrets/searx-env" = {
|
bindMounts."/run/secrets/searx-env" = {
|
||||||
@ -351,13 +357,26 @@
|
|||||||
enableTun = true;
|
enableTun = true;
|
||||||
hostAddress = "192.168.100.4";
|
hostAddress = "192.168.100.4";
|
||||||
localAddress = "192.168.100.5";
|
localAddress = "192.168.100.5";
|
||||||
config = { ... }: {
|
config = { ... }: {
|
||||||
system.stateVersion = "24.11";
|
system.stateVersion = "24.11";
|
||||||
networking.useHostResolvConf = lib.mkForce false;
|
networking.useHostResolvConf = lib.mkForce false;
|
||||||
# Required workaround for tailscale exit nodes, see https://nixos.wiki/wiki/Tailscale
|
# Required workaround for tailscale exit nodes, see https://nixos.wiki/wiki/Tailscale
|
||||||
networking.firewall.checkReversePath = "loose";
|
networking.firewall.checkReversePath = "loose";
|
||||||
|
networking.nftables.enable = true;
|
||||||
services.resolved.enable = true;
|
services.resolved.enable = true;
|
||||||
|
# Tailscale is also used for local connectivity, since the exit node for
|
||||||
|
# some reason prevents local access
|
||||||
services.tailscale.enable = true;
|
services.tailscale.enable = true;
|
||||||
|
services.lidarr = {
|
||||||
|
enable = true;
|
||||||
|
openFirewall = true;
|
||||||
|
#settings = {
|
||||||
|
# server = {
|
||||||
|
# bindaddress = "*";
|
||||||
|
# port = 8686;
|
||||||
|
# };
|
||||||
|
#};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user