discord upgrades
This commit is contained in:
@@ -14,3 +14,7 @@ trust_level = "trusted"
|
|||||||
[mcp_servers.nixos-mcp]
|
[mcp_servers.nixos-mcp]
|
||||||
command = "nixos-mcp"
|
command = "nixos-mcp"
|
||||||
cwd = "/home/jawz/Development/NixOS"
|
cwd = "/home/jawz/Development/NixOS"
|
||||||
|
|
||||||
|
[mcp_servers.nixos]
|
||||||
|
command = "nix"
|
||||||
|
args = ["run", "github:utensils/mcp-nixos", "--"]
|
||||||
|
|||||||
@@ -217,7 +217,6 @@ in
|
|||||||
config.my.servers.go-vod.enable
|
config.my.servers.go-vod.enable
|
||||||
config.my.servers.tranga.enable
|
config.my.servers.tranga.enable
|
||||||
config.my.servers.drpp.enable
|
config.my.servers.drpp.enable
|
||||||
config.my.servers.plex-discord-bot.enable
|
|
||||||
]);
|
]);
|
||||||
message = "Container services are enabled but enableContainers is false";
|
message = "Container services are enabled but enableContainers is false";
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,7 +16,6 @@ let
|
|||||||
"drpp"
|
"drpp"
|
||||||
"metube"
|
"metube"
|
||||||
"multi-scrobbler"
|
"multi-scrobbler"
|
||||||
"plex-discord-bot"
|
|
||||||
];
|
];
|
||||||
nativeServicesWithOpenFirewall = inputs.self.lib.getServicesWithNativeFirewall config firewallBlacklist;
|
nativeServicesWithOpenFirewall = inputs.self.lib.getServicesWithNativeFirewall config firewallBlacklist;
|
||||||
servicesConfig = lib.listToAttrs (
|
servicesConfig = lib.listToAttrs (
|
||||||
|
|||||||
@@ -21,7 +21,7 @@ in
|
|||||||
virtualisation.oci-containers.containers = lib.mkIf enable {
|
virtualisation.oci-containers.containers = lib.mkIf enable {
|
||||||
flame = lib.mkIf cfg.enable {
|
flame = lib.mkIf cfg.enable {
|
||||||
autoStart = true;
|
autoStart = true;
|
||||||
image = "pawelmalak/flame";
|
image = "pawelmalak/flame:latest";
|
||||||
ports = [ "${toString cfg.port}:${toString cfg.port}" ];
|
ports = [ "${toString cfg.port}:${toString cfg.port}" ];
|
||||||
volumes = [
|
volumes = [
|
||||||
"${config.my.containerData}/flame:/app/data"
|
"${config.my.containerData}/flame:/app/data"
|
||||||
@@ -36,7 +36,7 @@ in
|
|||||||
};
|
};
|
||||||
flame-nsfw = lib.mkIf cfgS.enable {
|
flame-nsfw = lib.mkIf cfgS.enable {
|
||||||
autoStart = true;
|
autoStart = true;
|
||||||
image = "pawelmalak/flame";
|
image = "pawelmalak/flame:latest";
|
||||||
ports = [ "${toString cfgS.port}:${toString cfg.port}" ];
|
ports = [ "${toString cfgS.port}:${toString cfg.port}" ];
|
||||||
volumes = [ "${config.my.containerData}/flame-nsfw:/app/data" ];
|
volumes = [ "${config.my.containerData}/flame-nsfw:/app/data" ];
|
||||||
environmentFiles = [ config.sops.secrets.flame.path ];
|
environmentFiles = [ config.sops.secrets.flame.path ];
|
||||||
|
|||||||
@@ -11,7 +11,7 @@ in
|
|||||||
options.my.servers.lidarr = setup.mkOptions "lidarr" "music" 8686;
|
options.my.servers.lidarr = setup.mkOptions "lidarr" "music" 8686;
|
||||||
config.virtualisation.oci-containers.containers.lidarr = lib.mkIf cfg.enable {
|
config.virtualisation.oci-containers.containers.lidarr = lib.mkIf cfg.enable {
|
||||||
autoStart = true;
|
autoStart = true;
|
||||||
image = "linuxserver/lidarr:version-3.0.1.4866";
|
image = "linuxserver/lidarr:latest";
|
||||||
ports = [ "${toString cfg.port}:${toString cfg.port}" ];
|
ports = [ "${toString cfg.port}:${toString cfg.port}" ];
|
||||||
environment = {
|
environment = {
|
||||||
TZ = config.my.timeZone;
|
TZ = config.my.timeZone;
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ in
|
|||||||
config = lib.mkIf (cfg.enable && config.my.secureHost) {
|
config = lib.mkIf (cfg.enable && config.my.secureHost) {
|
||||||
sops.secrets.maloja.sopsFile = ../../secrets/env.yaml;
|
sops.secrets.maloja.sopsFile = ../../secrets/env.yaml;
|
||||||
virtualisation.oci-containers.containers.maloja = {
|
virtualisation.oci-containers.containers.maloja = {
|
||||||
image = "krateng/maloja:3.2.4";
|
image = "krateng/maloja:latest";
|
||||||
ports = [ "${toString cfg.port}:${toString cfg.port}" ];
|
ports = [ "${toString cfg.port}:${toString cfg.port}" ];
|
||||||
environmentFiles = [ config.sops.secrets.maloja.path ];
|
environmentFiles = [ config.sops.secrets.maloja.path ];
|
||||||
environment = {
|
environment = {
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ in
|
|||||||
{
|
{
|
||||||
options.my.servers.metube = setup.mkOptions "metube" "bajameesta" 8881;
|
options.my.servers.metube = setup.mkOptions "metube" "bajameesta" 8881;
|
||||||
config.virtualisation.oci-containers.containers.metube = lib.mkIf cfg.enable {
|
config.virtualisation.oci-containers.containers.metube = lib.mkIf cfg.enable {
|
||||||
image = "ghcr.io/alexta69/metube:2026.01.02";
|
image = "ghcr.io/alexta69/metube:latest";
|
||||||
ports = [ "${toString cfg.port}:8081" ];
|
ports = [ "${toString cfg.port}:8081" ];
|
||||||
volumes = [
|
volumes = [
|
||||||
"${config.my.containerData}/metube:/downloads"
|
"${config.my.containerData}/metube:/downloads"
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ in
|
|||||||
config = lib.mkIf (cfg.enable && config.my.secureHost) {
|
config = lib.mkIf (cfg.enable && config.my.secureHost) {
|
||||||
sops.secrets.multi-scrobbler.sopsFile = ../../secrets/env.yaml;
|
sops.secrets.multi-scrobbler.sopsFile = ../../secrets/env.yaml;
|
||||||
virtualisation.oci-containers.containers.multi-scrobbler = {
|
virtualisation.oci-containers.containers.multi-scrobbler = {
|
||||||
image = "foxxmd/multi-scrobbler:0.10.0";
|
image = "foxxmd/multi-scrobbler:latest";
|
||||||
ports = [ "${toString cfg.port}:${toString cfg.port}" ];
|
ports = [ "${toString cfg.port}:${toString cfg.port}" ];
|
||||||
environmentFiles = [ config.sops.secrets.multi-scrobbler.path ];
|
environmentFiles = [ config.sops.secrets.multi-scrobbler.path ];
|
||||||
environment = {
|
environment = {
|
||||||
|
|||||||
@@ -188,7 +188,7 @@ in
|
|||||||
virtualisation.oci-containers.containers = {
|
virtualisation.oci-containers.containers = {
|
||||||
go-vod = lib.mkIf config.my.servers.go-vod.enable {
|
go-vod = lib.mkIf config.my.servers.go-vod.enable {
|
||||||
autoStart = true;
|
autoStart = true;
|
||||||
image = "radialapps/go-vod";
|
image = "radialapps/go-vod:latest";
|
||||||
environment = {
|
environment = {
|
||||||
TZ = config.my.timeZone;
|
TZ = config.my.timeZone;
|
||||||
NEXTCLOUD_HOST = "https://${config.services.nextcloud.hostName}";
|
NEXTCLOUD_HOST = "https://${config.services.nextcloud.hostName}";
|
||||||
|
|||||||
@@ -1,24 +0,0 @@
|
|||||||
{
|
|
||||||
lib,
|
|
||||||
config,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
let
|
|
||||||
setup = import ../factories/mkserver.nix { inherit lib config; };
|
|
||||||
cfg = config.my.servers.plex-discord-bot;
|
|
||||||
name = "plex-discord-bot";
|
|
||||||
in
|
|
||||||
{
|
|
||||||
options.my.servers.plex-discord-bot = setup.mkOptions name name 0;
|
|
||||||
config.virtualisation.oci-containers.containers.plex-discord-bot = lib.mkIf cfg.enable {
|
|
||||||
image = "ghcr.io/phin05/discord-rich-presence-plex:latest";
|
|
||||||
environment = {
|
|
||||||
DRPP_UID = toString config.users.users.jawz.uid;
|
|
||||||
DRPP_GID = toString config.users.groups.users.gid;
|
|
||||||
};
|
|
||||||
volumes = [
|
|
||||||
"${config.my.containerData}/drpp:/app/data"
|
|
||||||
"/run/user/${toString config.users.users.jawz.uid}:/run/app"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -12,9 +12,9 @@ in
|
|||||||
config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable && config.my.secureHost) {
|
config = lib.mkIf (cfg.enable && config.my.servers.postgres.enable && config.my.secureHost) {
|
||||||
sops.secrets.yamtrack.sopsFile = ../../secrets/env.yaml;
|
sops.secrets.yamtrack.sopsFile = ../../secrets/env.yaml;
|
||||||
virtualisation.oci-containers.containers = {
|
virtualisation.oci-containers.containers = {
|
||||||
yamtrack-redis.image = "redis:7-alpine";
|
yamtrack-redis.image = "redis:latest";
|
||||||
yamtrack = {
|
yamtrack = {
|
||||||
image = "ghcr.io/fuzzygrim/yamtrack";
|
image = "ghcr.io/fuzzygrim/yamtrack:latest";
|
||||||
ports = [ "${toString cfg.port}:8000" ];
|
ports = [ "${toString cfg.port}:8000" ];
|
||||||
dependsOn = [ "yamtrack-redis" ];
|
dependsOn = [ "yamtrack-redis" ];
|
||||||
environmentFiles = [ config.sops.secrets.yamtrack.path ];
|
environmentFiles = [ config.sops.secrets.yamtrack.path ];
|
||||||
|
|||||||
Reference in New Issue
Block a user