From 84899440edcd364c0128832055bfd4f2a52c7eab Mon Sep 17 00:00:00 2001 From: Lillian-Violet Date: Thu, 4 Jan 2024 13:32:13 +0100 Subject: [PATCH] Try and fix the aria2 situation --- nixos/hosts/queen/secrets/sops.yaml | 5 ++-- nixos/package-configs/aria2/configuration.nix | 25 +++++++++++++++++++ nixos/package-configs/ombi/configuration.nix | 2 +- .../package-configs/radarr/configuration.nix | 3 +++ .../package-configs/sonarr/configuration.nix | 3 +++ 5 files changed, 35 insertions(+), 3 deletions(-) create mode 100644 nixos/package-configs/aria2/configuration.nix diff --git a/nixos/hosts/queen/secrets/sops.yaml b/nixos/hosts/queen/secrets/sops.yaml index df84d54..8c97dd6 100644 --- a/nixos/hosts/queen/secrets/sops.yaml +++ b/nixos/hosts/queen/secrets/sops.yaml @@ -5,6 +5,7 @@ mailpass: ENC[AES256_GCM,data:UVrc1RUV0xJFPiZ8J4refglR0p35gUd21EvvTSoeXHVE9/xC0b releaseCookie: ENC[AES256_GCM,data:oG8DcUP+gIm5xPzIJdmjrtX/TdrcS8IgeGJeu0oOmZb0/J0AP0o3qw==,iv:zS12xjcNbLaLaLd3VQT8+o9hDqTo1cZdxoPjjhiExDU=,tag:nJFelasEUjebEBpvmfcDEA==,type:str] mssqlpass: ENC[AES256_GCM,data:XEu4bQC5qM5Cm8UDVX3qAzTuL/t3xbx+qcEbZM4h3Hg=,iv:jgpZ93THYBlUvJDC5+YZiIxu/14e7nFSy76J0vc8Hek=,tag:iKsEDp/KZ5juqzmUgtP8iA==,type:str] mailpassunhash: ENC[AES256_GCM,data:q/P3nrNLy3hCISDmalw94nzWIFhoCdCTyflj27D2Ltr8,iv:oAFna87l3sL/42ljUF1QsRL0xBrP82uYdKLxK/8HcQE=,tag:liFFGHbNPOpOHyMsjnvMOQ==,type:str] +rpcSecret: ENC[AES256_GCM,data:gOuQSY2RI6rnSnG1,iv:xz1ueq4/UOKYBs5r9Tk4jL0+GyX8uo8I8ZymVgIMKLI=,tag:Fr8rWIttLz7X8Pri6FBJBQ==,type:str] sops: kms: [] gcp_kms: [] @@ -20,8 +21,8 @@ sops: KzNBMCtUaS9sU21Xc1JUd1FSR29tSkEKyqaDM/WUWjK2l+ahE6sIFYsQ6Qtkf7yz NWFTzsDZBmm9kpSIjchf+PuBuoRHeEKbEH8jnMlYB3J8boEnUnXMlw== -----END AGE ENCRYPTED FILE----- - lastmodified: "2023-12-26T15:30:39Z" - mac: ENC[AES256_GCM,data:j0ZX7F0etvbL1Th3I3eO36PSA5/IiXHzPFWJdxeZEUN9N40hshppeRQ/54Nnn//k9uFennC4F/CIFu5fZioBcQJUnxuCy2EmpztWiGSIbiO94+H2ovMy9Wly8NgvG/DnYb1uSBhTEdXJoEDbzJ/ngb/MtvgB1mCZKbhIw88IDM0=,iv:5XcfXAu6mORLd/O2UCfaPhiPQul7b807xy1PyZo3MF0=,tag:mC5JAmb7jgezJjm5AXT+sg==,type:str] + lastmodified: "2024-01-04T12:15:46Z" + mac: ENC[AES256_GCM,data:a9SPOcOGrhB3u2d1Ju9rEFrkS/PjkK3aTmHJSODRtameV6f2h3iuLzpgHVtZZ08MPoajriasAxAYIsZNwfGbRvAffqf+H85TnKy8e115x9MqZB0EFAwHWuxysjRsRwaJLpjFos3HdsYciro4EDrBKfbvLrLLjxNRWf3FwALA6WQ=,iv:VXUTnQN7B+u+g4OCut3YUxqqGb6mTN7yTubZLZpR19w=,tag:NfBfVQkFlcwq+w5/ckQqGA==,type:str] pgp: [] unencrypted_suffix: _unencrypted version: 3.8.1 diff --git a/nixos/package-configs/aria2/configuration.nix b/nixos/package-configs/aria2/configuration.nix new file mode 100644 index 0000000..0bd31a2 --- /dev/null +++ b/nixos/package-configs/aria2/configuration.nix @@ -0,0 +1,25 @@ +{ + config, + pkgs, + ... +}: { + users.users = { + aria2.extraGroups = ["jellyfin" "nextcloud"]; + }; + services.aria2 = { + enable = true; + downloadDir = "/var/lib/media"; + }; + + # services.nginx = { + # virtualHosts = { + # "aria2.gladtherescake.eu" = { + # forceSSL = true; + # enableACME = true; + # locations."/" = { + # proxyPass = "http://localhost:6800"; + # }; + # }; + # }; + # }; +} diff --git a/nixos/package-configs/ombi/configuration.nix b/nixos/package-configs/ombi/configuration.nix index a5da7de..8c79fdf 100644 --- a/nixos/package-configs/ombi/configuration.nix +++ b/nixos/package-configs/ombi/configuration.nix @@ -4,7 +4,7 @@ ... }: { users.users = { - ombi.extraGroups = ["radarr" "sonarr"]; + ombi.extraGroups = ["radarr" "sonarr" "aria2"]; }; services.ombi = { enable = true; diff --git a/nixos/package-configs/radarr/configuration.nix b/nixos/package-configs/radarr/configuration.nix index 98046d4..45a13a5 100644 --- a/nixos/package-configs/radarr/configuration.nix +++ b/nixos/package-configs/radarr/configuration.nix @@ -3,6 +3,9 @@ pkgs, ... }: { + users.users = { + radarr.extraGroups = ["aria2"]; + }; #uses port 7878 services.radarr = { enable = true; diff --git a/nixos/package-configs/sonarr/configuration.nix b/nixos/package-configs/sonarr/configuration.nix index e7e60c9..884cd5a 100644 --- a/nixos/package-configs/sonarr/configuration.nix +++ b/nixos/package-configs/sonarr/configuration.nix @@ -3,6 +3,9 @@ pkgs, ... }: { + users.users = { + sonarr.extraGroups = ["aria2"]; + }; #uses port 8989 services.sonarr = { enable = true;