helix: host photos.sealight.xyz

This commit is contained in:
Anish Lakhwara
2025-02-23 20:09:55 -08:00
parent c6d64984bf
commit a305adaa46
24 changed files with 240 additions and 88 deletions
+1 -1
View File
@@ -60,7 +60,7 @@ in {
#unstable.sublime-music
# olm-3.2.16 is now insecure
# some reason I can't set insecure packages that will be respected
nheko
# nheko
unstable.signal-desktop
unstable.tuba
unstable.newsflash
-1
View File
@@ -4,7 +4,6 @@
enable = true;
host = "0.0.0.0";
port = 8181;
package = "${pkgs.unstable.headphones}";
user = "headphones";
group = "audio";
dataDir = "/data/music";
+23
View File
@@ -0,0 +1,23 @@
{ ... }:
{
services.immich = {
enable = true;
database = {
enable = true;
};
host = "0.0.0.0";
port = 8567;
mediaLocation = "/data/photos";
externalDomain = "https://photos.sealight.xyz";
};
services.nginx.virtualHosts."photos.mossnet.lan" = {
enableACME = false;
forceSSL = false;
locations."/" = {
extraConfig = ''
proxy_pass http://127.0.0.1:8567/;
'';
};
};
}
+37
View File
@@ -0,0 +1,37 @@
{ config, lib, pkgs, ... }:
{
services.jackett = {
enable = true;
host = "0.0.0.0";
port = 8011;
user = "jackett";
group = "transmission";
};
services.nginx.virtualHosts."jackett.mossnet.lan" = {
enableACME = false;
forceSSL = false;
locations."/" = {
extraConfig = ''
proxy_pass http://127.0.0.1:8011/;
'';
};
};
services.lidarr = {
enable = true;
host = "0.0.0.0";
port = 8012;
user = "lidarr";
group = "transmission";
};
services.nginx.virtualHosts."lidarr.mossnet.lan" = {
enableACME = false;
forceSSL = false;
locations."/" = {
extraConfig = ''
proxy_pass http://127.0.0.1:8012/;
'';
};
};
}
+26 -26
View File
@@ -19,34 +19,34 @@
homeserverURL = "https://sealight.xyz/";
homeserverDomain = "sealight.xyz";
services = {
whatsapp = {
port = 29183;
format = "mautrix-go";
package = pkgs.mautrix-whatsapp;
};
# whatsapp = {
# port = 29183;
# format = "mautrix-go";
# package = pkgs.mautrix-whatsapp;
# };
discord = {
port = 29188;
format = "mautrix-go";
package = pkgs.my-mautrix-discord;
};
# discord = {
# port = 29188;
# format = "mautrix-go";
# package = pkgs.unstable.mautrix-discord;
# };
signal = {
port = 29184;
format = "mautrix-python";
package = pkgs.unstable.mautrix-signal;
serviceConfig = {
StateDirectory = [ "matrix-as-signal" "signald" ];
SupplementaryGroups = [ "signald" ];
TimeoutStopSec = 1; # work around the service ignoring SIGTERM, see https://gitlab.com/coffeetables/nix-matrix-appservices/-/issues/12
User = lib.mkForce config.services.signald.user;
Group = lib.mkForce config.services.signald.group;
};
settings.signal = {
socket_path = config.services.signald.socketPath;
outgoing_attachment_dir = "/var/lib/signald/tmp";
};
};
# signal = {
# port = 29184;
# format = "mautrix-python";
# package = pkgs.unstable.mautrix-signal;
# serviceConfig = {
# StateDirectory = [ "matrix-as-signal" "signald" ];
# SupplementaryGroups = [ "signald" ];
# TimeoutStopSec = 1; # work around the service ignoring SIGTERM, see https://gitlab.com/coffeetables/nix-matrix-appservices/-/issues/12
# User = lib.mkForce config.services.signald.user;
# Group = lib.mkForce config.services.signald.group;
# };
# settings.signal = {
# socket_path = config.services.signald.socketPath;
# outgoing_attachment_dir = "/var/lib/signald/tmp";
# };
# };
};
};
}
+1 -1
View File
@@ -12,7 +12,7 @@
# Plugins
helm
# surge
distrho
# distrho
orca-c
supercollider
dirt
@@ -0,0 +1,3 @@
#!/usr/bin/env bash
beet import -ql "$TR_TORRENT_DIR"
+33
View File
@@ -0,0 +1,33 @@
{ pkgs, ... }:
{
services.transmission = {
enable = true;
settings = {
rpc-enabled = true;
rpc-bind-address = "0.0.0.0";
rpc-whitelist-enabled = false;
script-torrent-done-enabled = true;
# Normally, I would write this into the homedir with home-manager
# And explictly set the dir to be the output of the home-manager location
# But this seems better, if it'll work?
script-torrent-done-filename = pkgs.writeShellScript "beet-import.sh" ''
#!/usr/bin/env bash
beet import -ql "$TR_TORRENT_DIR"
'';
rpc-url = "/transmission/rpc/";
download-dir = "/mnt/two/new-music";
};
};
services.nginx.virtualHosts."transmission.mossnet.lan" = {
enableACME = false;
forceSSL = false;
locations."/" = {
extraConfig = ''
proxy_pass http://localhost:9091/;
proxy_set_header X-Forwarded-Host $host;
'';
};
};
}