Compare commits

..

3 Commits

Author SHA1 Message Date
Giulio De Pasquale
1304289db6 navidrome: commented out scripts. ported to vhost 2023-06-05 05:00:55 +02:00
Giulio De Pasquale
b95afdd471 libreddit: vhost 2023-06-05 04:54:30 +02:00
Giulio De Pasquale
cd6c3e75ed invidious: vhost 2023-06-05 04:50:44 +02:00
3 changed files with 80 additions and 114 deletions

View File

@ -2,27 +2,15 @@
let let
domain = "tube.giugl.io"; domain = "tube.giugl.io";
utilities = import ./utilities.nix { inherit lib config; };
inherit (utilities) architectInterfaceAddress;
in in
{ {
services = { services.invidious = {
invidious = {
enable = true; enable = true;
package = pkgs.unstablePkgs.invidious; package = pkgs.unstablePkgs.invidious;
}; };
nginx.virtualHosts.${domain} = { architect.vhost.${domain} = {
forceSSL = true; dnsInterfaces = [ "lan" "tailscale" "wireguard" ];
enableACME = true; locations."/".port = config.services.invidious.port;
locations."/" = { proxyPass = "http://127.0.0.1:${toString config.services.invidious.port}"; };
}; };
};
networking.extraHosts = ''
${architectInterfaceAddress "lan"} ${domain}
${architectInterfaceAddress "wireguard"} ${domain}
${architectInterfaceAddress "tailscale"} ${domain}
'';
} }

View File

@ -2,27 +2,15 @@
let let
domain = "reddit.giugl.io"; domain = "reddit.giugl.io";
utilities = import ./utilities.nix { inherit lib config; };
inherit (utilities) architectInterfaceAddress;
in in
{ {
services = { services.libreddit = {
libreddit = {
enable = true; enable = true;
port = 9090; port = 9090;
}; };
nginx.virtualHosts.${domain} = { architect.vhost.${domain} = {
forceSSL = true; dnsInterfaces = [ "lan" "tailscale" "wireguard" ];
enableACME = true; locations."/".port = config.services.libreddit.port;
locations."/" = { proxyPass = "http://127.0.0.1:${toString config.services.libreddit.port}"; };
}; };
};
networking.extraHosts = ''
${architectInterfaceAddress "lan"} ${domain}
${architectInterfaceAddress "wireguard"} ${domain}
${architectInterfaceAddress "tailscale"} ${domain}
'';
} }

View File

@ -1,15 +1,12 @@
{ lib, pkgs, ... }: { config, lib, pkgs, ... }:
let let
domain = "music.runas.rocks"; domain = "music.runas.rocks";
network = import ./network.nix;
library_path = "/media/Music"; library_path = "/media/Music";
beets_config = "/media/beets.conf"; beets_config = "/media/beets.conf";
auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
in in
{ {
services = { services.navidrome = {
navidrome = {
enable = true; enable = true;
settings = { settings = {
@ -24,68 +21,61 @@ in
}; };
}; };
nginx.virtualHosts.${domain} = { architect.vhost.${domain} = {
forceSSL = true; dnsInterfaces = [ "lan" "tailscale" "wireguard" ];
enableACME = true;
locations."/" = { locations."/" = {
proxyPass = "http://127.0.0.1:4533"; port = 4533;
}; allowLan = true;
extraConfig = auth_block { access_role = "navidrome"; }; allow = [ config.architect.networks."tailscale".net ];
}; };
}; };
systemd.services = { # systemd.services = {
"beets-update" = { # "beets-update" = {
enable = true; # enable = true;
# requires = [ "remove-badmp3.service" "remove-badflac.service" ]; # # requires = [ "remove-badmp3.service" "remove-badflac.service" ];
before = [ "beets-import.service" ]; # before = [ "beets-import.service" ];
serviceConfig = { # serviceConfig = {
Type = "oneshot"; # Type = "oneshot";
ExecStart = "${pkgs.beets}/bin/beet -c ${beets_config} update"; # ExecStart = "${pkgs.beets}/bin/beet -c ${beets_config} update";
}; # };
}; # };
"beets-import" = { # "beets-import" = {
enable = true; # enable = true;
path = [ pkgs.imagemagick ]; # path = [ pkgs.imagemagick ];
requires = [ "beets-update.service" ]; # requires = [ "beets-update.service" ];
after = [ "beets-update.service" ]; # after = [ "beets-update.service" ];
serviceConfig = { # serviceConfig = {
Type = "oneshot"; # Type = "oneshot";
ExecStart = # ExecStart =
"${pkgs.beets}/bin/beet -c ${beets_config} import --flat -q ${library_path}"; # "${pkgs.beets}/bin/beet -c ${beets_config} import --flat -q ${library_path}";
}; # };
startAt = "weekly"; # startAt = "weekly";
}; # };
"remove-badmp3" = { # "remove-badmp3" = {
enable = true; # enable = true;
before = [ "beets-import.service" "beets-update.service" ]; # before = [ "beets-import.service" "beets-update.service" ];
serviceConfig = { # serviceConfig = {
Type = "oneshot"; # Type = "oneshot";
ExecStart = '' # ExecStart = ''
${pkgs.findutils}/bin/find ${library_path} -name "*.mp3" -type f -exec ${pkgs.bash}/bin/sh -c '${pkgs.mp3val}/bin/mp3val "{}" | grep -Pi error 1>/dev/null && ${pkgs.busybox}/bin/rm "{}"' \; # ${pkgs.findutils}/bin/find ${library_path} -name "*.mp3" -type f -exec ${pkgs.bash}/bin/sh -c '${pkgs.mp3val}/bin/mp3val "{}" | grep -Pi error 1>/dev/null && ${pkgs.busybox}/bin/rm "{}"' \;
''; # '';
}; # };
}; # };
"remove-badflac" = { # "remove-badflac" = {
enable = true; # enable = true;
before = [ "beets-import.service" "beets-update.service" ]; # before = [ "beets-import.service" "beets-update.service" ];
serviceConfig = { # serviceConfig = {
Type = "oneshot"; # Type = "oneshot";
ExecStart = '' # ExecStart = ''
${pkgs.findutils}/bin/find ${library_path} -name "*.flac" -type f -exec ${pkgs.bash}/bin/sh -c '${pkgs.flac}/bin/flac -st "{}" || ${pkgs.busybox}/bin/rm "{}"' \; # ${pkgs.findutils}/bin/find ${library_path} -name "*.flac" -type f -exec ${pkgs.bash}/bin/sh -c '${pkgs.flac}/bin/flac -st "{}" || ${pkgs.busybox}/bin/rm "{}"' \;
''; # '';
}; # };
}; # };
}; # };
networking.extraHosts = ''
${network.architect-lan} ${domain}
${network.architect-wg} ${domain}
${network.architect-ts} ${domain}
'';
users.groups.media.members = [ "navidrome" ]; users.groups.media.members = [ "navidrome" ];
} }