Compare commits

...

3 Commits

Author SHA1 Message Date
Giulio De Pasquale
1304289db6 navidrome: commented out scripts. ported to vhost 2023-06-05 05:00:55 +02:00
Giulio De Pasquale
b95afdd471 libreddit: vhost 2023-06-05 04:54:30 +02:00
Giulio De Pasquale
cd6c3e75ed invidious: vhost 2023-06-05 04:50:44 +02:00
3 changed files with 80 additions and 114 deletions

View File

@ -2,27 +2,15 @@
let let
domain = "tube.giugl.io"; domain = "tube.giugl.io";
utilities = import ./utilities.nix { inherit lib config; };
inherit (utilities) architectInterfaceAddress;
in in
{ {
services = { services.invidious = {
invidious = { enable = true;
enable = true; package = pkgs.unstablePkgs.invidious;
package = pkgs.unstablePkgs.invidious; };
};
architect.vhost.${domain} = {
nginx.virtualHosts.${domain} = { dnsInterfaces = [ "lan" "tailscale" "wireguard" ];
forceSSL = true; locations."/".port = config.services.invidious.port;
enableACME = true;
locations."/" = { proxyPass = "http://127.0.0.1:${toString config.services.invidious.port}"; };
};
}; };
networking.extraHosts = ''
${architectInterfaceAddress "lan"} ${domain}
${architectInterfaceAddress "wireguard"} ${domain}
${architectInterfaceAddress "tailscale"} ${domain}
'';
} }

View File

@ -2,27 +2,15 @@
let let
domain = "reddit.giugl.io"; domain = "reddit.giugl.io";
utilities = import ./utilities.nix { inherit lib config; };
inherit (utilities) architectInterfaceAddress;
in in
{ {
services = { services.libreddit = {
libreddit = { enable = true;
enable = true; port = 9090;
port = 9090; };
};
architect.vhost.${domain} = {
nginx.virtualHosts.${domain} = { dnsInterfaces = [ "lan" "tailscale" "wireguard" ];
forceSSL = true; locations."/".port = config.services.libreddit.port;
enableACME = true;
locations."/" = { proxyPass = "http://127.0.0.1:${toString config.services.libreddit.port}"; };
};
}; };
networking.extraHosts = ''
${architectInterfaceAddress "lan"} ${domain}
${architectInterfaceAddress "wireguard"} ${domain}
${architectInterfaceAddress "tailscale"} ${domain}
'';
} }

View File

@ -1,91 +1,81 @@
{ lib, pkgs, ... }: { config, lib, pkgs, ... }:
let let
domain = "music.runas.rocks"; domain = "music.runas.rocks";
network = import ./network.nix;
library_path = "/media/Music"; library_path = "/media/Music";
beets_config = "/media/beets.conf"; beets_config = "/media/beets.conf";
auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
in in
{ {
services = { services.navidrome = {
navidrome = { enable = true;
enable = true;
settings = { settings = {
MusicFolder = library_path; MusicFolder = library_path;
LastFM.enable = true; LastFM.enable = true;
LastFM.ApiKey = "5cef5cb5f9d31326b97d0f929ca9cf20"; LastFM.ApiKey = "5cef5cb5f9d31326b97d0f929ca9cf20";
LastFM.Secret = "d1296896126f4caae47407aecf080b25"; LastFM.Secret = "d1296896126f4caae47407aecf080b25";
Spotify.ID = "3900c029b4f34f3fb61d554dda64794d"; Spotify.ID = "3900c029b4f34f3fb61d554dda64794d";
Spotify.Secret = "d931ce5575a9401aa5ff8d37558cca0a"; Spotify.Secret = "d931ce5575a9401aa5ff8d37558cca0a";
EnableGravatar = true; EnableGravatar = true;
LogLevel = "WARN"; LogLevel = "WARN";
};
};
nginx.virtualHosts.${domain} = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://127.0.0.1:4533";
};
extraConfig = auth_block { access_role = "navidrome"; };
}; };
}; };
systemd.services = { architect.vhost.${domain} = {
"beets-update" = { dnsInterfaces = [ "lan" "tailscale" "wireguard" ];
enable = true; locations."/" = {
# requires = [ "remove-badmp3.service" "remove-badflac.service" ]; port = 4533;
before = [ "beets-import.service" ]; allowLan = true;
serviceConfig = { allow = [ config.architect.networks."tailscale".net ];
Type = "oneshot";
ExecStart = "${pkgs.beets}/bin/beet -c ${beets_config} update";
};
};
"beets-import" = {
enable = true;
path = [ pkgs.imagemagick ];
requires = [ "beets-update.service" ];
after = [ "beets-update.service" ];
serviceConfig = {
Type = "oneshot";
ExecStart =
"${pkgs.beets}/bin/beet -c ${beets_config} import --flat -q ${library_path}";
};
startAt = "weekly";
};
"remove-badmp3" = {
enable = true;
before = [ "beets-import.service" "beets-update.service" ];
serviceConfig = {
Type = "oneshot";
ExecStart = ''
${pkgs.findutils}/bin/find ${library_path} -name "*.mp3" -type f -exec ${pkgs.bash}/bin/sh -c '${pkgs.mp3val}/bin/mp3val "{}" | grep -Pi error 1>/dev/null && ${pkgs.busybox}/bin/rm "{}"' \;
'';
};
};
"remove-badflac" = {
enable = true;
before = [ "beets-import.service" "beets-update.service" ];
serviceConfig = {
Type = "oneshot";
ExecStart = ''
${pkgs.findutils}/bin/find ${library_path} -name "*.flac" -type f -exec ${pkgs.bash}/bin/sh -c '${pkgs.flac}/bin/flac -st "{}" || ${pkgs.busybox}/bin/rm "{}"' \;
'';
};
}; };
}; };
networking.extraHosts = '' # systemd.services = {
${network.architect-lan} ${domain} # "beets-update" = {
${network.architect-wg} ${domain} # enable = true;
${network.architect-ts} ${domain} # # requires = [ "remove-badmp3.service" "remove-badflac.service" ];
''; # before = [ "beets-import.service" ];
# serviceConfig = {
# Type = "oneshot";
# ExecStart = "${pkgs.beets}/bin/beet -c ${beets_config} update";
# };
# };
# "beets-import" = {
# enable = true;
# path = [ pkgs.imagemagick ];
# requires = [ "beets-update.service" ];
# after = [ "beets-update.service" ];
# serviceConfig = {
# Type = "oneshot";
# ExecStart =
# "${pkgs.beets}/bin/beet -c ${beets_config} import --flat -q ${library_path}";
# };
# startAt = "weekly";
# };
# "remove-badmp3" = {
# enable = true;
# before = [ "beets-import.service" "beets-update.service" ];
# serviceConfig = {
# Type = "oneshot";
# ExecStart = ''
# ${pkgs.findutils}/bin/find ${library_path} -name "*.mp3" -type f -exec ${pkgs.bash}/bin/sh -c '${pkgs.mp3val}/bin/mp3val "{}" | grep -Pi error 1>/dev/null && ${pkgs.busybox}/bin/rm "{}"' \;
# '';
# };
# };
# "remove-badflac" = {
# enable = true;
# before = [ "beets-import.service" "beets-update.service" ];
# serviceConfig = {
# Type = "oneshot";
# ExecStart = ''
# ${pkgs.findutils}/bin/find ${library_path} -name "*.flac" -type f -exec ${pkgs.bash}/bin/sh -c '${pkgs.flac}/bin/flac -st "{}" || ${pkgs.busybox}/bin/rm "{}"' \;
# '';
# };
# };
# };
users.groups.media.members = [ "navidrome" ]; users.groups.media.members = [ "navidrome" ];
} }