metube and jira

This commit is contained in:
Danilo Reyes 2024-03-28 13:34:04 -06:00
parent 8b10e9020f
commit ff98822668
3 changed files with 105 additions and 88 deletions

View File

@ -41,6 +41,18 @@
# }; # };
# extraOptions = [ "--cap-add" "MKNOD" ]; # extraOptions = [ "--cap-add" "MKNOD" ];
# }; # };
# metube = {
# image = "ghcr.io/alexta69/metube";
# ports = [ "8881:8081" ];
# volumes = [
# "/var/lib/docker-configs/metube:/downloads"
# "/home/jawz/.local/share/cookies.txt:/cookies.txt"
# ];
# environment = {
# TZ = "America/Mexico_City";
# YTDL_OPTIONS = ''{"cookiefile":"/cookies.txt"}'';
# };
# };
vocechat = { vocechat = {
image = "privoce/vocechat-server:latest"; image = "privoce/vocechat-server:latest";
ports = [ "3001:3000" ]; ports = [ "3001:3000" ];

View File

@ -22,6 +22,8 @@ let
scrobblePort = 9078; scrobblePort = 9078;
malojaPort = 42010; malojaPort = 42010;
darkwirePort = 3001; darkwirePort = 3001;
jiraPort = 8091;
metatubePort = 8881;
bazarrPort = config.services.bazarr.listenPort; bazarrPort = config.services.bazarr.listenPort;
kavitaPort = config.services.kavita.port; kavitaPort = config.services.kavita.port;
vaultPort = config.services.vaultwarden.config.ROCKET_PORT; vaultPort = config.services.vaultwarden.config.ROCKET_PORT;
@ -79,6 +81,8 @@ in {
"tracker.${domain}" = proxy ryotPort // { }; "tracker.${domain}" = proxy ryotPort // { };
"scrobble.${domain}" = proxy scrobblePort // { }; "scrobble.${domain}" = proxy scrobblePort // { };
"maloja.${domain}" = proxy malojaPort // { }; "maloja.${domain}" = proxy malojaPort // { };
"jira.${domain}" = proxy jiraPort // { };
"bajameesta.${domain}" = proxy metatubePort // { };
"qampqwn4wprhqny8h8zj.${domain}" = proxy secretFlamePort // { }; "qampqwn4wprhqny8h8zj.${domain}" = proxy secretFlamePort // { };
"xfwmrle6h6skqujbeizw.${domain}" = proxy qbitPort // { }; "xfwmrle6h6skqujbeizw.${domain}" = proxy qbitPort // { };
"audiobooks.${domain}" = base { "audiobooks.${domain}" = base {
@ -121,86 +125,86 @@ in {
''; '';
}; };
}; };
# "flix.${domain}" = { "flix.${domain}" = {
# forceSSL = true; forceSSL = true;
# enableACME = true; enableACME = true;
# http2 = true; http2 = true;
# extraConfig = '' extraConfig = ''
# # use a variable to store the upstream proxy # use a variable to store the upstream proxy
# # in this example we are using a hostname which is resolved via DNS # in this example we are using a hostname which is resolved via DNS
# # (if you aren't using DNS remove the resolver line and change the variable to point to an IP address # (if you aren't using DNS remove the resolver line and change the variable to point to an IP address
# resolver ${localhost} valid=30; resolver ${localhost} valid=30;
# location = / { location = / {
# return 302 http://$host/web/; return 302 http://$host/web/;
# #return 302 https://$host/web/; #return 302 https://$host/web/;
# } }
# location = /web/ { location = /web/ {
# # Proxy main Jellyfin traffic # Proxy main Jellyfin traffic
# proxy_pass http://${localhost}:${ proxy_pass http://${localhost}:${
# toString (jellyfinPort) toString (jellyfinPort)
# }/web/index.html; }/web/index.html;
# proxy_set_header Host $host; proxy_set_header Host $host;
# proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Real-IP $remote_addr;
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Forwarded-Proto $scheme;
# proxy_set_header X-Forwarded-Protocol $scheme; proxy_set_header X-Forwarded-Protocol $scheme;
# proxy_set_header X-Forwarded-Host $http_host; proxy_set_header X-Forwarded-Host $http_host;
# } }
# ''; '';
# locations = { locations = {
# "/" = { "/" = {
# proxyPass = "http://${localhost}:${toString (jellyfinPort)}"; proxyPass = "http://${localhost}:${toString (jellyfinPort)}";
# proxyWebsockets = true; proxyWebsockets = true;
# }; };
# "/socket" = { "/socket" = {
# proxyPass = "http://${localhost}:${toString (jellyfinPort)}"; proxyPass = "http://${localhost}:${toString (jellyfinPort)}";
# extraConfig = '' extraConfig = ''
# proxy_http_version 1.1; proxy_http_version 1.1;
# proxy_set_header Upgrade $http_upgrade; proxy_set_header Upgrade $http_upgrade;
# proxy_set_header Connection "upgrade"; proxy_set_header Connection "upgrade";
# ''; '';
# }; };
# "~ /Items/(.*)/Images" = { "~ /Items/(.*)/Images" = {
# proxyPass = "http://${localhost}:${toString (jellyfinPort)}"; proxyPass = "http://${localhost}:${toString (jellyfinPort)}";
# extraConfig = '' extraConfig = ''
# proxy_cache jellyfin; proxy_cache jellyfin;
# proxy_cache_revalidate on; proxy_cache_revalidate on;
# proxy_cache_lock on; proxy_cache_lock on;
# ''; '';
# }; };
# "~* ^/Videos/(.*)/(?!live)" = { "~* ^/Videos/(.*)/(?!live)" = {
# proxyPass = "http://${localhost}:${toString (jellyfinPort)}"; proxyPass = "http://${localhost}:${toString (jellyfinPort)}";
# extraConfig = '' extraConfig = ''
# # Set size of a slice (this amount will be always requested from the backend by nginx) # Set size of a slice (this amount will be always requested from the backend by nginx)
# # Higher value means more latency, lower more overhead # Higher value means more latency, lower more overhead
# # This size is independent of the size clients/browsers can request # This size is independent of the size clients/browsers can request
# # slice 2m; # slice 2m;
# proxy_cache jellyfin-videos; proxy_cache jellyfin-videos;
# proxy_cache_valid 200 206 301 302 30d; proxy_cache_valid 200 206 301 302 30d;
# proxy_ignore_headers Expires Cache-Control Set-Cookie X-Accel-Expires; proxy_ignore_headers Expires Cache-Control Set-Cookie X-Accel-Expires;
# proxy_cache_use_stale error timeout invalid_header updating http_500 http_502 http_503 http_504; proxy_cache_use_stale error timeout invalid_header updating http_500 http_502 http_503 http_504;
# proxy_connect_timeout 15s; proxy_connect_timeout 15s;
# proxy_http_version 1.1; proxy_http_version 1.1;
# proxy_set_header Connection ""; proxy_set_header Connection "";
# # Transmit slice range to the backend # Transmit slice range to the backend
# proxy_set_header Range 2m; proxy_set_header Range 2m;
# # This saves bandwidth between the proxy and jellyfin, as a file is only downloaded one time instead of multiple times when multiple clients want to at the same time # This saves bandwidth between the proxy and jellyfin, as a file is only downloaded one time instead of multiple times when multiple clients want to at the same time
# # The first client will trigger the download, the other clients will have to wait until the slice is cached # The first client will trigger the download, the other clients will have to wait until the slice is cached
# # Esp. practical during SyncPlay # Esp. practical during SyncPlay
# proxy_cache_lock on; proxy_cache_lock on;
# proxy_cache_lock_age 60s; proxy_cache_lock_age 60s;
# proxy_cache_key "jellyvideo$uri?MediaSourceId=$arg_MediaSourceId&VideoCodec=$arg_VideoCodec&AudioCodec=$arg_AudioCodec&AudioStreamIndex=$arg_AudioStreamIndex&VideoBitrate=$arg_VideoBitrate&AudioBitrate=$arg_AudioBitrate&SubtitleMethod=$arg_SubtitleMethod&TranscodingMaxAudioChannels=$arg_TranscodingMaxAudioChannels&RequireAvc=$arg_RequireAvc&SegmentContainer=$arg_SegmentContainer&MinSegments=$arg_MinSegments&BreakOnNonKeyFrames=$arg_BreakOnNonKeyFrames&h264-profile=$h264Profile&h264-level=$h264Level&slicerange=2m"; proxy_cache_key "jellyvideo$uri?MediaSourceId=$arg_MediaSourceId&VideoCodec=$arg_VideoCodec&AudioCodec=$arg_AudioCodec&AudioStreamIndex=$arg_AudioStreamIndex&VideoBitrate=$arg_VideoBitrate&AudioBitrate=$arg_AudioBitrate&SubtitleMethod=$arg_SubtitleMethod&TranscodingMaxAudioChannels=$arg_TranscodingMaxAudioChannels&RequireAvc=$arg_RequireAvc&SegmentContainer=$arg_SegmentContainer&MinSegments=$arg_MinSegments&BreakOnNonKeyFrames=$arg_BreakOnNonKeyFrames&h264-profile=$h264Profile&h264-level=$h264Level&slicerange=2m";
# # add_header X-Cache-Status $upstream_cache_status; # This is only for debugging cache # add_header X-Cache-Status $upstream_cache_status; # This is only for debugging cache
# ''; '';
# }; };
# }; };
# }; };
# ${config.services.nextcloud.hostName} = { # ${config.services.nextcloud.hostName} = {
# forceSSL = true; # forceSSL = true;
# enableACME = true; # enableACME = true;

View File

@ -78,8 +78,9 @@ in {
# sonarr = base // { package = pkgs.sonarr; }; # sonarr = base // { package = pkgs.sonarr; };
# radarr = base // { package = pkgs.radarr; }; # radarr = base // { package = pkgs.radarr; };
# bazarr = base // { }; # bazarr = base // { };
# jellyfin = base // { }; jellyfin = base // { };
# prowlarr.enable = true; # prowlarr.enable = true;
jira.enable = true;
microbin = { microbin = {
enable = true; enable = true;
settings = { settings = {
@ -234,19 +235,19 @@ in {
}; };
systemd = { systemd = {
services = { services = {
nextcloud-cronjob = let # nextcloud-cronjob = let
jawzNextcloudCronjob = pkgs.writeScriptBin "nextcloud-cronjob" # jawzNextcloudCronjob = pkgs.writeScriptBin "nextcloud-cronjob"
(builtins.readFile ../scripts/nextcloud-cronjob.sh); # (builtins.readFile ../scripts/nextcloud-cronjob.sh);
in { # in {
description = "Runs various nextcloud-related cronjobs"; # description = "Runs various nextcloud-related cronjobs";
wantedBy = [ "multi-user.target" ]; # wantedBy = [ "multi-user.target" ];
path = [ pkgs.bash jawzNextcloudCronjob ]; # path = [ pkgs.bash jawzNextcloudCronjob ];
serviceConfig = { # serviceConfig = {
Restart = "on-failure"; # Restart = "on-failure";
RestartSec = 30; # RestartSec = 30;
ExecStart = "${jawzNextcloudCronjob}/bin/nextcloud-cronjob"; # ExecStart = "${jawzNextcloudCronjob}/bin/nextcloud-cronjob";
}; # };
}; # };
}; };
timers = { timers = {
# nextcloud-cronjob = { # nextcloud-cronjob = {