metube and jira
This commit is contained in:
@@ -41,6 +41,18 @@
|
|||||||
# };
|
# };
|
||||||
# extraOptions = [ "--cap-add" "MKNOD" ];
|
# extraOptions = [ "--cap-add" "MKNOD" ];
|
||||||
# };
|
# };
|
||||||
|
# metube = {
|
||||||
|
# image = "ghcr.io/alexta69/metube";
|
||||||
|
# ports = [ "8881:8081" ];
|
||||||
|
# volumes = [
|
||||||
|
# "/var/lib/docker-configs/metube:/downloads"
|
||||||
|
# "/home/jawz/.local/share/cookies.txt:/cookies.txt"
|
||||||
|
# ];
|
||||||
|
# environment = {
|
||||||
|
# TZ = "America/Mexico_City";
|
||||||
|
# YTDL_OPTIONS = ''{"cookiefile":"/cookies.txt"}'';
|
||||||
|
# };
|
||||||
|
# };
|
||||||
vocechat = {
|
vocechat = {
|
||||||
image = "privoce/vocechat-server:latest";
|
image = "privoce/vocechat-server:latest";
|
||||||
ports = [ "3001:3000" ];
|
ports = [ "3001:3000" ];
|
||||||
|
|||||||
152
server/nginx.nix
152
server/nginx.nix
@@ -22,6 +22,8 @@ let
|
|||||||
scrobblePort = 9078;
|
scrobblePort = 9078;
|
||||||
malojaPort = 42010;
|
malojaPort = 42010;
|
||||||
darkwirePort = 3001;
|
darkwirePort = 3001;
|
||||||
|
jiraPort = 8091;
|
||||||
|
metatubePort = 8881;
|
||||||
bazarrPort = config.services.bazarr.listenPort;
|
bazarrPort = config.services.bazarr.listenPort;
|
||||||
kavitaPort = config.services.kavita.port;
|
kavitaPort = config.services.kavita.port;
|
||||||
vaultPort = config.services.vaultwarden.config.ROCKET_PORT;
|
vaultPort = config.services.vaultwarden.config.ROCKET_PORT;
|
||||||
@@ -79,6 +81,8 @@ in {
|
|||||||
"tracker.${domain}" = proxy ryotPort // { };
|
"tracker.${domain}" = proxy ryotPort // { };
|
||||||
"scrobble.${domain}" = proxy scrobblePort // { };
|
"scrobble.${domain}" = proxy scrobblePort // { };
|
||||||
"maloja.${domain}" = proxy malojaPort // { };
|
"maloja.${domain}" = proxy malojaPort // { };
|
||||||
|
"jira.${domain}" = proxy jiraPort // { };
|
||||||
|
"bajameesta.${domain}" = proxy metatubePort // { };
|
||||||
"qampqwn4wprhqny8h8zj.${domain}" = proxy secretFlamePort // { };
|
"qampqwn4wprhqny8h8zj.${domain}" = proxy secretFlamePort // { };
|
||||||
"xfwmrle6h6skqujbeizw.${domain}" = proxy qbitPort // { };
|
"xfwmrle6h6skqujbeizw.${domain}" = proxy qbitPort // { };
|
||||||
"audiobooks.${domain}" = base {
|
"audiobooks.${domain}" = base {
|
||||||
@@ -121,86 +125,86 @@ in {
|
|||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
# "flix.${domain}" = {
|
"flix.${domain}" = {
|
||||||
# forceSSL = true;
|
forceSSL = true;
|
||||||
# enableACME = true;
|
enableACME = true;
|
||||||
# http2 = true;
|
http2 = true;
|
||||||
# extraConfig = ''
|
extraConfig = ''
|
||||||
# # use a variable to store the upstream proxy
|
# use a variable to store the upstream proxy
|
||||||
# # in this example we are using a hostname which is resolved via DNS
|
# in this example we are using a hostname which is resolved via DNS
|
||||||
# # (if you aren't using DNS remove the resolver line and change the variable to point to an IP address
|
# (if you aren't using DNS remove the resolver line and change the variable to point to an IP address
|
||||||
# resolver ${localhost} valid=30;
|
resolver ${localhost} valid=30;
|
||||||
|
|
||||||
# location = / {
|
location = / {
|
||||||
# return 302 http://$host/web/;
|
return 302 http://$host/web/;
|
||||||
# #return 302 https://$host/web/;
|
#return 302 https://$host/web/;
|
||||||
# }
|
}
|
||||||
|
|
||||||
# location = /web/ {
|
location = /web/ {
|
||||||
# # Proxy main Jellyfin traffic
|
# Proxy main Jellyfin traffic
|
||||||
# proxy_pass http://${localhost}:${
|
proxy_pass http://${localhost}:${
|
||||||
# toString (jellyfinPort)
|
toString (jellyfinPort)
|
||||||
# }/web/index.html;
|
}/web/index.html;
|
||||||
# proxy_set_header Host $host;
|
proxy_set_header Host $host;
|
||||||
# proxy_set_header X-Real-IP $remote_addr;
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
# proxy_set_header X-Forwarded-Proto $scheme;
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
# proxy_set_header X-Forwarded-Protocol $scheme;
|
proxy_set_header X-Forwarded-Protocol $scheme;
|
||||||
# proxy_set_header X-Forwarded-Host $http_host;
|
proxy_set_header X-Forwarded-Host $http_host;
|
||||||
# }
|
}
|
||||||
# '';
|
'';
|
||||||
# locations = {
|
locations = {
|
||||||
# "/" = {
|
"/" = {
|
||||||
# proxyPass = "http://${localhost}:${toString (jellyfinPort)}";
|
proxyPass = "http://${localhost}:${toString (jellyfinPort)}";
|
||||||
# proxyWebsockets = true;
|
proxyWebsockets = true;
|
||||||
# };
|
};
|
||||||
# "/socket" = {
|
"/socket" = {
|
||||||
# proxyPass = "http://${localhost}:${toString (jellyfinPort)}";
|
proxyPass = "http://${localhost}:${toString (jellyfinPort)}";
|
||||||
# extraConfig = ''
|
extraConfig = ''
|
||||||
# proxy_http_version 1.1;
|
proxy_http_version 1.1;
|
||||||
# proxy_set_header Upgrade $http_upgrade;
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
# proxy_set_header Connection "upgrade";
|
proxy_set_header Connection "upgrade";
|
||||||
# '';
|
'';
|
||||||
# };
|
};
|
||||||
# "~ /Items/(.*)/Images" = {
|
"~ /Items/(.*)/Images" = {
|
||||||
# proxyPass = "http://${localhost}:${toString (jellyfinPort)}";
|
proxyPass = "http://${localhost}:${toString (jellyfinPort)}";
|
||||||
# extraConfig = ''
|
extraConfig = ''
|
||||||
# proxy_cache jellyfin;
|
proxy_cache jellyfin;
|
||||||
# proxy_cache_revalidate on;
|
proxy_cache_revalidate on;
|
||||||
# proxy_cache_lock on;
|
proxy_cache_lock on;
|
||||||
# '';
|
'';
|
||||||
# };
|
};
|
||||||
# "~* ^/Videos/(.*)/(?!live)" = {
|
"~* ^/Videos/(.*)/(?!live)" = {
|
||||||
# proxyPass = "http://${localhost}:${toString (jellyfinPort)}";
|
proxyPass = "http://${localhost}:${toString (jellyfinPort)}";
|
||||||
# extraConfig = ''
|
extraConfig = ''
|
||||||
# # Set size of a slice (this amount will be always requested from the backend by nginx)
|
# Set size of a slice (this amount will be always requested from the backend by nginx)
|
||||||
# # Higher value means more latency, lower more overhead
|
# Higher value means more latency, lower more overhead
|
||||||
# # This size is independent of the size clients/browsers can request
|
# This size is independent of the size clients/browsers can request
|
||||||
# # slice 2m;
|
# slice 2m;
|
||||||
|
|
||||||
# proxy_cache jellyfin-videos;
|
proxy_cache jellyfin-videos;
|
||||||
# proxy_cache_valid 200 206 301 302 30d;
|
proxy_cache_valid 200 206 301 302 30d;
|
||||||
# proxy_ignore_headers Expires Cache-Control Set-Cookie X-Accel-Expires;
|
proxy_ignore_headers Expires Cache-Control Set-Cookie X-Accel-Expires;
|
||||||
# proxy_cache_use_stale error timeout invalid_header updating http_500 http_502 http_503 http_504;
|
proxy_cache_use_stale error timeout invalid_header updating http_500 http_502 http_503 http_504;
|
||||||
# proxy_connect_timeout 15s;
|
proxy_connect_timeout 15s;
|
||||||
# proxy_http_version 1.1;
|
proxy_http_version 1.1;
|
||||||
# proxy_set_header Connection "";
|
proxy_set_header Connection "";
|
||||||
# # Transmit slice range to the backend
|
# Transmit slice range to the backend
|
||||||
# proxy_set_header Range 2m;
|
proxy_set_header Range 2m;
|
||||||
|
|
||||||
# # This saves bandwidth between the proxy and jellyfin, as a file is only downloaded one time instead of multiple times when multiple clients want to at the same time
|
# This saves bandwidth between the proxy and jellyfin, as a file is only downloaded one time instead of multiple times when multiple clients want to at the same time
|
||||||
# # The first client will trigger the download, the other clients will have to wait until the slice is cached
|
# The first client will trigger the download, the other clients will have to wait until the slice is cached
|
||||||
# # Esp. practical during SyncPlay
|
# Esp. practical during SyncPlay
|
||||||
# proxy_cache_lock on;
|
proxy_cache_lock on;
|
||||||
# proxy_cache_lock_age 60s;
|
proxy_cache_lock_age 60s;
|
||||||
|
|
||||||
# proxy_cache_key "jellyvideo$uri?MediaSourceId=$arg_MediaSourceId&VideoCodec=$arg_VideoCodec&AudioCodec=$arg_AudioCodec&AudioStreamIndex=$arg_AudioStreamIndex&VideoBitrate=$arg_VideoBitrate&AudioBitrate=$arg_AudioBitrate&SubtitleMethod=$arg_SubtitleMethod&TranscodingMaxAudioChannels=$arg_TranscodingMaxAudioChannels&RequireAvc=$arg_RequireAvc&SegmentContainer=$arg_SegmentContainer&MinSegments=$arg_MinSegments&BreakOnNonKeyFrames=$arg_BreakOnNonKeyFrames&h264-profile=$h264Profile&h264-level=$h264Level&slicerange=2m";
|
proxy_cache_key "jellyvideo$uri?MediaSourceId=$arg_MediaSourceId&VideoCodec=$arg_VideoCodec&AudioCodec=$arg_AudioCodec&AudioStreamIndex=$arg_AudioStreamIndex&VideoBitrate=$arg_VideoBitrate&AudioBitrate=$arg_AudioBitrate&SubtitleMethod=$arg_SubtitleMethod&TranscodingMaxAudioChannels=$arg_TranscodingMaxAudioChannels&RequireAvc=$arg_RequireAvc&SegmentContainer=$arg_SegmentContainer&MinSegments=$arg_MinSegments&BreakOnNonKeyFrames=$arg_BreakOnNonKeyFrames&h264-profile=$h264Profile&h264-level=$h264Level&slicerange=2m";
|
||||||
|
|
||||||
# # add_header X-Cache-Status $upstream_cache_status; # This is only for debugging cache
|
# add_header X-Cache-Status $upstream_cache_status; # This is only for debugging cache
|
||||||
# '';
|
'';
|
||||||
# };
|
};
|
||||||
# };
|
};
|
||||||
# };
|
};
|
||||||
# ${config.services.nextcloud.hostName} = {
|
# ${config.services.nextcloud.hostName} = {
|
||||||
# forceSSL = true;
|
# forceSSL = true;
|
||||||
# enableACME = true;
|
# enableACME = true;
|
||||||
|
|||||||
@@ -78,8 +78,9 @@ in {
|
|||||||
# sonarr = base // { package = pkgs.sonarr; };
|
# sonarr = base // { package = pkgs.sonarr; };
|
||||||
# radarr = base // { package = pkgs.radarr; };
|
# radarr = base // { package = pkgs.radarr; };
|
||||||
# bazarr = base // { };
|
# bazarr = base // { };
|
||||||
# jellyfin = base // { };
|
jellyfin = base // { };
|
||||||
# prowlarr.enable = true;
|
# prowlarr.enable = true;
|
||||||
|
jira.enable = true;
|
||||||
microbin = {
|
microbin = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
@@ -234,19 +235,19 @@ in {
|
|||||||
};
|
};
|
||||||
systemd = {
|
systemd = {
|
||||||
services = {
|
services = {
|
||||||
nextcloud-cronjob = let
|
# nextcloud-cronjob = let
|
||||||
jawzNextcloudCronjob = pkgs.writeScriptBin "nextcloud-cronjob"
|
# jawzNextcloudCronjob = pkgs.writeScriptBin "nextcloud-cronjob"
|
||||||
(builtins.readFile ../scripts/nextcloud-cronjob.sh);
|
# (builtins.readFile ../scripts/nextcloud-cronjob.sh);
|
||||||
in {
|
# in {
|
||||||
description = "Runs various nextcloud-related cronjobs";
|
# description = "Runs various nextcloud-related cronjobs";
|
||||||
wantedBy = [ "multi-user.target" ];
|
# wantedBy = [ "multi-user.target" ];
|
||||||
path = [ pkgs.bash jawzNextcloudCronjob ];
|
# path = [ pkgs.bash jawzNextcloudCronjob ];
|
||||||
serviceConfig = {
|
# serviceConfig = {
|
||||||
Restart = "on-failure";
|
# Restart = "on-failure";
|
||||||
RestartSec = 30;
|
# RestartSec = 30;
|
||||||
ExecStart = "${jawzNextcloudCronjob}/bin/nextcloud-cronjob";
|
# ExecStart = "${jawzNextcloudCronjob}/bin/nextcloud-cronjob";
|
||||||
};
|
# };
|
||||||
};
|
# };
|
||||||
};
|
};
|
||||||
timers = {
|
timers = {
|
||||||
# nextcloud-cronjob = {
|
# nextcloud-cronjob = {
|
||||||
|
|||||||
Reference in New Issue
Block a user