diff --git a/docs/TODO.md b/docs/TODO.md index d340d8f..e5fb0fc 100644 --- a/docs/TODO.md +++ b/docs/TODO.md @@ -2,6 +2,9 @@ feel free to contribute <3 ([CONTRIBUTING.md](CONTRIBUTING.md)) +- [ ] Jackflix V2 + - Backup Radarr, Prowlarr, Sonarr config + - [ ] Nixy - [~] Installation script ([install.sh](./scripts/install.sh) to test on a fresh install) - [~] Variables-template with defaults diff --git a/hosts/server/modules/jackflix/default.nix b/hosts/server/modules/jackflix/default.nix index 1fcfced..e68557f 100644 --- a/hosts/server/modules/jackflix/default.nix +++ b/hosts/server/modules/jackflix/default.nix @@ -7,4 +7,11 @@ ./sonarr.nix ./transmission.nix ]; + + users.users.jackflix = { + isNormalUser = true; + home = "/home/jackflix"; + description = "My own netflix"; + extraGroups = [ "docker" ]; + }; } diff --git a/hosts/server/modules/jackflix/jellyfin.nix b/hosts/server/modules/jackflix/jellyfin.nix index 8379831..0e47193 100644 --- a/hosts/server/modules/jackflix/jellyfin.nix +++ b/hosts/server/modules/jackflix/jellyfin.nix @@ -1,6 +1,9 @@ { services.jellyfin = { enable = true; + user = "jackflix"; + group = "jackflix"; + dataDir = "/home/jackflix/jellyfin"; openFirewall = true; }; } diff --git a/hosts/server/modules/jackflix/radarr.nix b/hosts/server/modules/jackflix/radarr.nix index 81bfec1..a4a4e63 100644 --- a/hosts/server/modules/jackflix/radarr.nix +++ b/hosts/server/modules/jackflix/radarr.nix @@ -1,6 +1,9 @@ { services.radarr = { enable = true; + user = "jackflix"; + group = "jackflix"; + dataDir = "/home/jackflix/radarr"; openFirewall = true; }; } diff --git a/hosts/server/modules/jackflix/sonarr.nix b/hosts/server/modules/jackflix/sonarr.nix index 9c35473..3c27875 100644 --- a/hosts/server/modules/jackflix/sonarr.nix +++ b/hosts/server/modules/jackflix/sonarr.nix @@ -1,6 +1,9 @@ { services.sonarr = { enable = true; + user = "jackflix"; + group = "jackflix"; + dataDir = "/home/jackflix/sonarr"; openFirewall = true; }; } diff --git a/hosts/server/modules/jackflix/transmission.nix b/hosts/server/modules/jackflix/transmission.nix index 7ecdee9..ae85c8f 100644 --- a/hosts/server/modules/jackflix/transmission.nix +++ b/hosts/server/modules/jackflix/transmission.nix @@ -1,22 +1,22 @@ # I'm using the transmission-openvpn docker image to be sure that my torrent traffic is going through a VPN. # Only to download legal stuff of course. { - environment.etc."/etc/transmission.sh" = { - text = '' - docker run --cap-add=NET_ADMIN -d \ - -v /var/lib/transmission-openvpn/data:/data \ - -v /var/lib/transmission-openvpn/config:/config \ - -e OPENVPN_PROVIDER=PIA \ - -e OPENVPN_CONFIG=france \ - -e OPENVPN_USERNAME=username\ - -e OPENVPN_PASSWORD="password" \ - -e LOCAL_NETWORK=192.168.2.0/24 \ - --log-driver json-file \ - --log-opt max-size=10m \ - -p 9091:9091 \ - haugene/transmission-openvpn - ''; - }; + # environment.etc."/etc/transmission.sh" = { + # text = '' + # docker run --cap-add=NET_ADMIN -d \ + # -v /var/lib/transmission-openvpn/data:/data \ + # -v /var/lib/transmission-openvpn/config:/config \ + # -e OPENVPN_PROVIDER=PIA \ + # -e OPENVPN_CONFIG=france \ + # -e OPENVPN_USERNAME=username\ + # -e OPENVPN_PASSWORD="password" \ + # -e LOCAL_NETWORK=192.168.2.0/24 \ + # --log-driver json-file \ + # --log-opt max-size=10m \ + # -p 9091:9091 \ + # haugene/transmission-openvpn + # ''; + # }; # TODO: launch the container at boot networking.firewall.allowedTCPPorts = [ 9091 ]; diff --git a/hosts/server/secrets/server.yaml b/hosts/server/secrets/server.yaml index 2a6fe65..656efc8 100644 --- a/hosts/server/secrets/server.yaml +++ b/hosts/server/secrets/server.yaml @@ -3,7 +3,7 @@ github-key: ENC[AES256_GCM,data:6u7+Rq+FYhYvfHoCNeQ2zKHVzsw9gbsFcoEcEMHc5gDenLwj nextcloud-adminpass: ENC[AES256_GCM,data:skcJhRBDDAIqdrUkylqntJE7ErG+4jWAcw==,iv:gf49orzxxyr+CAYCHQwvHCE6IcaR3iCu4blfn/HFzlc=,tag:b7R4Y8GSKAqoZuUBLPj2AQ==,type:str] cloudflare-apitoken: ENC[AES256_GCM,data:VVMa84UpCFcUSFVdnBt4mVTnm5rGDJBtw0nEm6584mDcVT35Ycc8LyhHJofQRNQQPviDKgmjgt9Tv7ZgRg==,iv:fVC2cWfveeACJ0x+weKzv0bQZGucfwZi5rq2RiDJgsY=,tag:uCN/IKaFbqQaDoA+M704sw==,type:str] tailscaled-authKey: ENC[AES256_GCM,data:wIFPKLoD2BDgBjBmOSx2a5okN8BWFdEqApXD4QeVA9uxXBSBhfPu+57dh4O0gTH77n0RgbhxJ/TCorTtNg==,iv:ue/MeYAhUcG69p2Vw5drGdGxkRC8ofzzE910nZd2JKk=,tag:xKjlIpi8WHWT57ryWtUnlg==,type:str] -transmission-script: ENC[AES256_GCM,data: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,iv:/MPLzP1MwgYxWJMld9FHi8D+d+VJNtPg+j6RzBXV/YY=,tag:gZ2ThckyUQjbgD26M8vi3A==,type:str] +transmission-script: ENC[AES256_GCM,data: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,iv:DiigKUxufAnX52PSLga57wphg5/6zhpM6lnSg0sCuJc=,tag:LvBwGQOA7GgsdlwJTxEWOA==,type:str] sops: kms: [] gcp_kms: [] @@ -19,8 +19,8 @@ sops: cmVxVC8rVDlWMUdZaGw3bmdOaWZGS1EKYahBlc8XpB5UdKZQkvxbLcKQ/xkFJjWo FSfQWnjhe/a7BJtJEcKZkjOQU0mYqlSu+uT2RA9diCQeRUJPRF+nAw== -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-06-30T15:46:28Z" - mac: ENC[AES256_GCM,data:BZBxM0z+/Ac32bmRnfLA5aSxWe64bvZp5Bcwij926Z5WhI3iFKxlGJb89pd+ydi79mO95qs7YUK5Ns0qTfvtGIBcxchImfZ3FQjmQAamH8RHp9uG8S1vE2QRoN/GFq2VNCbDurmaa8le0q9wSHjQDmx6t/NI7uTWUMi3eeyyOhk=,iv:9JoageIKMQtpqnFD2zdZcpIWp8Rw6nXn0mvxFfhouQc=,tag:Q/o+qy5psnpZid8v1JN0OA==,type:str] + lastmodified: "2024-07-10T12:41:14Z" + mac: ENC[AES256_GCM,data:dpTc4kP4VNsvdNDACarP7LJrB3xTbUZJU5eH6otgSzXHCDSRWSsV0mhlNoAizz8dT73RLQMtyHaL6NezKLTIJGnCpccT4KFoNcoee6EtlnNSeG5PUwX07DVy+govqjVw8Pzr89BOSXFJN6UDLald1moR33k6ePUg1aSk0O0yWCk=,iv:BVM2MdEM3IpciVFAhTe6bZGgyVi0AcjZwRVd18CEDX8=,tag:dbPnoIiSGPWFFaVeLQ9ldA==,type:str] pgp: [] unencrypted_suffix: _unencrypted version: 3.8.1