Compare commits

..

4 commits

Author SHA1 Message Date
mc-fucker
0834ce42d0 disabled automatic scan for navidrome 2025-06-06 10:24:45 +02:00
mc-fucker
4dc55a82c9 added sudo rule to allow zabbix to execute smartctl 2025-06-06 10:23:41 +02:00
mc-fucker
ddf6abe85f added calibre-web draft 2025-06-06 10:22:31 +02:00
mc-fucker
644385ab14 cleaned crossseed.nix 2025-06-06 10:20:36 +02:00
4 changed files with 23 additions and 9 deletions

View file

@ -2,8 +2,8 @@
let let
cfg = import /etc/nixos/modules/vars.nix; cfg = import /etc/nixos/modules/vars.nix;
crossseed_port = cfg.arrstack.crossseed.port; crossseed_port = cfg.arrstack.crossseed.port;
#outpost_port = cfg.authentik.outpostPort; PUID = toString config.users.users.arr.uid;
#domain = "mc-fucker.cool"; PGID = toString config.users.groups.arr.gid;
in in
{ {
@ -12,24 +12,21 @@ in
cmd = [ "daemon" ]; cmd = [ "daemon" ];
environment = { environment = {
TZ = "Europe/Berlin"; TZ = "Europe/Berlin";
PUID = toString config.users.users.arr.uid;
PGID = toString config.users.groups.arr.gid;
}; };
ports = [ ports = [
"${crossseed_port}:${crossseed_port}" "${crossseed_port}:${crossseed_port}"
]; ];
user = "${PUID}:${PGID}";
volumes = [ volumes = [
"/var/lib/cross-seed:/config" "/var/lib/cross-seed:/config"
#"/mnt/mergerfs/media:/data"
"/var/lib/qbittorrent/qBittorrent/data/BT_backup:/torrents" "/var/lib/qbittorrent/qBittorrent/data/BT_backup:/torrents"
"/var/lib/qbittorrent/qBittorrent/data/cross-seeds:/cross-seeds"
"/mnt/mergerfs/media/qbittorrent:/data/qbittorrent" "/mnt/mergerfs/media/qbittorrent:/data/qbittorrent"
"/mnt/cache/qbittorrent:/cache"
]; ];
extraOptions = cfg.podman.extraOptions; extraOptions = cfg.podman.extraOptions;
autoStart = false;
}; };
#services.nginx.virtualHosts = {
#};
} }
# vim: set et ts=2 sw=2 ai: # vim: set et ts=2 sw=2 ai:

View file

@ -29,6 +29,8 @@ in
environment = { environment = {
TZ = "Europe/Berlin"; TZ = "Europe/Berlin";
DOCKER_MODS = "linuxserver/mods:universal-calibre"; DOCKER_MODS = "linuxserver/mods:universal-calibre";
PUID = "1337";
PGID = "1337";
}; };
#environmentFiles = [ config.sops.secrets."${name}/env".path ]; #environmentFiles = [ config.sops.secrets."${name}/env".path ];
ports = [ ports = [
@ -39,6 +41,7 @@ in
"/mnt/mergerfs/media/books:/books" "/mnt/mergerfs/media/books:/books"
]; ];
extraOptions = cfg.podman.extraOptions; extraOptions = cfg.podman.extraOptions;
autoStart = false;
}; };
#services.nginx.virtualHosts.${domain} = { #services.nginx.virtualHosts.${domain} = {

View file

@ -17,6 +17,7 @@ in
environment = { environment = {
TZ = "Europe/Berlin"; TZ = "Europe/Berlin";
ND_SESSIONTIMEOUT = "336h"; ND_SESSIONTIMEOUT = "336h";
ND_SCANNER_ENABLED = "false";
}; };
environmentFiles = [ config.sops.secrets.navidrome.path ]; environmentFiles = [ config.sops.secrets.navidrome.path ];
ports = [ ports = [

View file

@ -22,6 +22,19 @@ in
pkgs.smartmontools pkgs.smartmontools
]; ];
users.users.zabbix-agent.extraGroups = [ "systemd-journal" ]; users.users.zabbix-agent.extraGroups = [ "systemd-journal" ];
#allow zabbix-agent to run smartctl
security.sudo.extraRules = [
{
users = [ "zabbix-agent" ];
commands = [
{
command = "${pkgs.smartmontools}/bin/smartctl";
options = [ "NOPASSWD" ];
}
];
}
];
} }
# vim: set et ts=2 sw=2 ai: # vim: set et ts=2 sw=2 ai: