removed proxy for torrent, nzb, multi-scrobbler

This commit is contained in:
2024-09-27 23:59:42 -06:00
parent 23d69d9691
commit 2485f544fb
7 changed files with 35 additions and 66 deletions

View File

@@ -51,9 +51,9 @@ in
"music.${config.my.domain}" = proxyReverseArr 8686 // { }; "music.${config.my.domain}" = proxyReverseArr 8686 // { };
"subs.${config.my.domain}" = proxyReverse config.services.bazarr.listenPort // { }; "subs.${config.my.domain}" = proxyReverse config.services.bazarr.listenPort // { };
"library.${config.my.domain}" = proxyReverse config.services.kavita.port // { }; "library.${config.my.domain}" = proxyReverse config.services.kavita.port // { };
"vnfx2cojmt7dwzcfmi73.${config.my.domain}" = proxyReverse 9091 // { }; # "vnfx2cojmt7dwzcfmi73.${config.my.domain}" = proxyReverse 9091 // { };
"HSoeJdGRd2Orj0n31UGI.${config.my.domain}" = proxyReverse 3399 // { }; # "HSoeJdGRd2Orj0n31UGI.${config.my.domain}" = proxyReverse 3399 // { };
"hjL9GS7edDQVranqV5V4.${config.my.domain}" = proxyReverse 9999 // { }; # "hjL9GS7edDQVranqV5V4.${config.my.domain}" = proxyReverse 9999 // { };
"flix.${config.my.domain}" = { "flix.${config.my.domain}" = {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;

View File

@@ -80,29 +80,22 @@ in
; ;
}) })
(import ./servers/lidarr.nix { inherit lib config proxyReverseArr; }) (import ./servers/lidarr.nix { inherit lib config proxyReverseArr; })
(import ./servers/maloja.nix { inherit lib config proxyReverse; }) (import ./servers/maloja.nix {
inherit
lib
config
proxyReverse
setup
;
})
(import ./servers/mealie.nix { inherit lib config proxyReverse; }) (import ./servers/mealie.nix { inherit lib config proxyReverse; })
(import ./servers/metube.nix { inherit lib config proxyReverse; }) (import ./servers/metube.nix { inherit lib config proxyReverse; })
(import ./servers/microbin.nix { inherit lib config proxyReverse; }) (import ./servers/microbin.nix { inherit lib config proxyReverse; })
(import ./servers/multi-scrobbler.nix { inherit lib config proxyReverse; }) (import ./servers/multi-scrobbler.nix { inherit lib config; })
(import ./servers/nextcloud.nix { inherit lib config pkgs; }) (import ./servers/nextcloud.nix { inherit lib config pkgs; })
(import ./servers/prowlarr.nix { inherit lib config proxyReverseArr; }) (import ./servers/prowlarr.nix { inherit lib config proxyReverseArr; })
(import ./servers/qbittorrent.nix { (import ./servers/qbittorrent.nix { inherit lib config pkgs; })
inherit (import ./servers/sabnzbd.nix { inherit lib config pkgs; })
lib
config
pkgs
proxyReverse
;
})
(import ./servers/sabnzbd.nix {
inherit
lib
config
pkgs
proxyReverse
;
})
(import ./servers/radarr.nix { inherit lib config proxyReverseArr; }) (import ./servers/radarr.nix { inherit lib config proxyReverseArr; })
(import ./servers/ryot.nix { inherit lib config proxyReverse; }) (import ./servers/ryot.nix { inherit lib config proxyReverse; })
(import ./servers/shiori.nix { (import ./servers/shiori.nix {
@@ -122,14 +115,7 @@ in
proxyReverse proxyReverse
; ;
}) })
(import ./servers/firefly-iii.nix { (import ./servers/firefly-iii.nix { inherit lib config; })
inherit
lib
config
pkgs
proxyReverse
;
})
]; ];
options.my = { options.my = {
localhost = lib.mkOption { localhost = lib.mkOption {

View File

@@ -135,14 +135,14 @@
"qbittorrent server" = "qbittorrent server" =
let let
name = "qbittorrent"; name = "qbittorrent";
url = "https://vnfx2cojmt7dwzcfmi73.servidos.lat"; url = "http://192.168.1.69:9091";
in in
{ {
icon = "${name}.png"; icon = "${name}.png";
href = url; href = url;
widget = { widget = {
type = name; type = name;
url = "http://192.168.1.69:9091"; url = url;
username = "{{HOMEPAGE_VAR_QBIT_USERNAME}}"; username = "{{HOMEPAGE_VAR_QBIT_USERNAME}}";
password = "{{HOMEPAGE_VAR_QBIT_PASSWORD}}"; password = "{{HOMEPAGE_VAR_QBIT_PASSWORD}}";
}; };
@@ -150,14 +150,14 @@
"qbittorrent miniserver" = "qbittorrent miniserver" =
let let
name = "qbittorrent"; name = "qbittorrent";
url = "https://xfwmrle6h6skqujbeizw.servidos.lat"; url = "http://192.168.1.100:9091";
in in
{ {
icon = "${name}.png"; icon = "${name}.png";
href = url; href = url;
widget = { widget = {
type = name; type = name;
url = "http://192.168.1.100:9091"; url = url;
username = "{{HOMEPAGE_VAR_QBIT_USERNAME}}"; username = "{{HOMEPAGE_VAR_QBIT_USERNAME}}";
password = "{{HOMEPAGE_VAR_QBIT_PASSWORD}}"; password = "{{HOMEPAGE_VAR_QBIT_PASSWORD}}";
}; };
@@ -165,7 +165,7 @@
sabnzbd = sabnzbd =
let let
name = "sabnzbd"; name = "sabnzbd";
url = "https://HSoeJdGRd2Orj0n31UGI.servidos.lat"; url = "http://192.168.1.69:3399";
in in
{ {
icon = "${name}.png"; icon = "${name}.png";

View File

@@ -2,19 +2,19 @@
lib, lib,
config, config,
proxyReverse, proxyReverse,
setup,
... ...
}: }:
let let
port = 42010; cfg = config.my.servers.maloja;
url = "maloja.${config.my.domain}";
in in
{ {
options.my.servers.maloja.enable = lib.mkEnableOption "enable"; options.my.servers.maloja = setup.mkOptions "maloja" "maloja" 42010;
config = lib.mkIf config.my.servers.maloja.enable { config = lib.mkIf cfg.enable {
sops.secrets.maloja.sopsFile = ../../secrets/env.yaml; sops.secrets.maloja.sopsFile = ../../secrets/env.yaml;
virtualisation.oci-containers.containers.maloja = { virtualisation.oci-containers.containers.maloja = {
image = "krateng/maloja"; image = "krateng/maloja";
ports = [ "${toString port}:${toString port}" ]; ports = [ "${toString cfg.port}:${toString cfg.port}" ];
environmentFiles = [ config.sops.secrets.maloja.path ]; environmentFiles = [ config.sops.secrets.maloja.path ];
environment = { environment = {
TZ = "America/Mexico_City"; TZ = "America/Mexico_City";
@@ -28,10 +28,10 @@ in
labels = { labels = {
"flame.type" = "application"; "flame.type" = "application";
"flame.name" = "Maloja"; "flame.name" = "Maloja";
"flame.url" = url; "flame.url" = cfg.url;
"flame.icon" = "bookmark-music"; "flame.icon" = "bookmark-music";
}; };
}; };
services.nginx.virtualHosts."${url}" = proxyReverse port // { }; services.nginx.virtualHosts."${cfg.host}" = proxyReverse cfg.port // { };
}; };
} }

View File

@@ -1,13 +1,7 @@
{ { lib, config, ... }:
lib,
config,
proxyReverse,
...
}:
let let
port = 9078; port = 9078;
domain = "scrobble.${config.my.domain}"; url = "http://${config.my.miniserver-ip}:${toString port}";
url = "https://${domain}";
in in
{ {
options.my.servers.multi-scrobbler.enable = lib.mkEnableOption "enable"; options.my.servers.multi-scrobbler.enable = lib.mkEnableOption "enable";
@@ -23,7 +17,7 @@ in
PGID = "100"; PGID = "100";
BASE_URL = url; BASE_URL = url;
DEEZER_REDIRECT_URI = "http://${config.my.miniserver-ip}:${toString port}/deezer/callback"; DEEZER_REDIRECT_URI = "http://${config.my.miniserver-ip}:${toString port}/deezer/callback";
MALOJA_URL = "http://maloja:42010"; MALOJA_URL = config.my.servers.maloja.url;
WS_ENABLE = "true"; WS_ENABLE = "true";
}; };
volumes = [ "${config.my.containerData}/multi-scrobbler:/config" ]; volumes = [ "${config.my.containerData}/multi-scrobbler:/config" ];
@@ -34,6 +28,5 @@ in
"flame.icon" = "broadcast"; "flame.icon" = "broadcast";
}; };
}; };
services.nginx.virtualHosts."${domain}" = proxyReverse port // { };
}; };
} }

View File

@@ -2,7 +2,6 @@
lib, lib,
config, config,
pkgs, pkgs,
proxyReverse,
... ...
}: }:
let let
@@ -98,7 +97,6 @@ in
}; };
}; };
}; };
services.nginx.virtualHosts."xfwmrle6h6skqujbeizw.${config.my.domain}" = proxyReverse port // { };
networking.firewall = { networking.firewall = {
allowedTCPPorts = ports; allowedTCPPorts = ports;
allowedUDPPorts = ports; allowedUDPPorts = ports;

View File

@@ -1,19 +1,11 @@
{ { lib, config, ... }:
lib,
config,
proxyReverse,
...
}:
{ {
options.my.servers.sabnzbd.enable = lib.mkEnableOption "enable"; options.my.servers.sabnzbd.enable = lib.mkEnableOption "enable";
config = lib.mkIf config.my.servers.sabnzbd.enable { config = lib.mkIf config.my.servers.sabnzbd.enable {
services = { services.sabnzbd = {
sabnzbd = {
enable = true; enable = true;
group = "piracy"; group = "piracy";
openFirewall = true; openFirewall = true;
}; };
nginx.virtualHosts."HSoeJdGRd2Orj0n31UGI.${config.my.domain}" = proxyReverse 3399 // { };
};
}; };
} }