minidlna disabled

This commit is contained in:
Danilo Reyes 2024-09-22 14:41:57 -06:00
parent 2146eb0e51
commit dd00fb4854
2 changed files with 91 additions and 71 deletions

View File

@ -1,5 +1,10 @@
{ ... }: { { ... }:
imports = [ ./hardware-configuration.nix ../../base.nix ./temp-nginx.nix ]; {
imports = [
./hardware-configuration.nix
../../base.nix
./temp-nginx.nix
];
my = { my = {
emacs.enable = true; emacs.enable = true;
apps.dictionaries.enable = true; apps.dictionaries.enable = true;
@ -73,7 +78,8 @@
allowedUDPPorts = [ 2049 ]; allowedUDPPorts = [ 2049 ];
}; };
}; };
nix = let nix =
let
featuresList = [ featuresList = [
"nixos-test" "nixos-test"
"benchmark" "benchmark"
@ -83,16 +89,19 @@
"gccarch-skylake" "gccarch-skylake"
"gccarch-alderlake" "gccarch-alderlake"
]; ];
in { in
{
settings.cores = 3; settings.cores = 3;
buildMachines = [{ buildMachines = [
{
hostName = "workstation"; hostName = "workstation";
system = "x86_64-linux"; system = "x86_64-linux";
sshUser = "nixremote"; sshUser = "nixremote";
maxJobs = 14; maxJobs = 14;
speedFactor = 1; speedFactor = 1;
supportedFeatures = featuresList; supportedFeatures = featuresList;
}]; }
];
}; };
nixpkgs = { nixpkgs = {
config.permittedInsecurePackages = [ "openssl-1.1.1w" ]; config.permittedInsecurePackages = [ "openssl-1.1.1w" ];
@ -105,8 +114,7 @@
createHome = true; createHome = true;
group = "nixremote"; group = "nixremote";
home = "/var/nixremote/"; home = "/var/nixremote/";
openssh.authorizedKeys.keys = openssh.authorizedKeys.keys = [ (builtins.readFile ../../secrets/ssh/ed25519_nixworkstation.pub) ];
[ (builtins.readFile ../../secrets/ssh/ed25519_nixworkstation.pub) ];
}; };
}; };
services = { services = {
@ -115,7 +123,7 @@
fileSystems = [ "/" ]; fileSystems = [ "/" ];
}; };
minidlna = { minidlna = {
enable = true; enable = false;
openFirewall = true; openFirewall = true;
settings = { settings = {
inotify = "yes"; inotify = "yes";

View File

@ -1,5 +1,9 @@
{ ... }: { { ... }:
imports = [ ./hardware-configuration.nix ../../base.nix ]; {
imports = [
./hardware-configuration.nix
../../base.nix
];
my = { my = {
emacs.enable = true; emacs.enable = true;
apps.dictionaries.enable = true; apps.dictionaries.enable = true;
@ -35,7 +39,8 @@
}; };
}; };
}; };
networking = let networking =
let
ports = [ ports = [
2049 # idk 2049 # idk
8989 # sonarr 8989 # sonarr
@ -47,7 +52,8 @@
5000 # kavita 5000 # kavita
3399 # sabnzbd 3399 # sabnzbd
]; ];
in { in
{
hostName = "server"; hostName = "server";
firewall = { firewall = {
allowedTCPPorts = ports; allowedTCPPorts = ports;
@ -55,7 +61,8 @@
}; };
}; };
nixpkgs.hostPlatform = "x86_64-linux"; nixpkgs.hostPlatform = "x86_64-linux";
nix = let nix =
let
featuresList = [ featuresList = [
"nixos-test" "nixos-test"
"benchmark" "benchmark"
@ -65,16 +72,19 @@
"gccarch-skylake" "gccarch-skylake"
"gccarch-alderlake" "gccarch-alderlake"
]; ];
in { in
{
settings.cores = 6; settings.cores = 6;
buildMachines = [{ buildMachines = [
{
hostName = "workstation"; hostName = "workstation";
system = "x86_64-linux"; system = "x86_64-linux";
sshUser = "nixremote"; sshUser = "nixremote";
maxJobs = 14; maxJobs = 14;
speedFactor = 1; speedFactor = 1;
supportedFeatures = featuresList; supportedFeatures = featuresList;
}]; }
];
}; };
users = { users = {
groups.nixremote.gid = 555; groups.nixremote.gid = 555;
@ -83,17 +93,19 @@
createHome = true; createHome = true;
group = "nixremote"; group = "nixremote";
home = "/var/nixremote/"; home = "/var/nixremote/";
openssh.authorizedKeys.keys = openssh.authorizedKeys.keys = [ (builtins.readFile ../../secrets/ssh/ed25519_nixworkstation.pub) ];
[ (builtins.readFile ../../secrets/ssh/ed25519_nixworkstation.pub) ];
}; };
}; };
services = { services = {
minidlna = { minidlna = {
enable = true; enable = false;
openFirewall = true; openFirewall = true;
settings = { settings = {
inotify = "yes"; inotify = "yes";
media_dir = [ "/mnt/pool" "/home/jawz" ]; media_dir = [
"/mnt/pool"
"/home/jawz"
];
}; };
}; };
btrfs.autoScrub = { btrfs.autoScrub = {