nixos/hosts/FredOS-Mediaserver.nix

130 lines
3.4 KiB
Nix
Raw Normal View History

2026-01-20 09:59:20 +00:00
{ config, pkgs, lib, ... }:
{
2026-01-20 14:35:20 +00:00
config = lib.mkIf (config.networking.hostName == "FredOS-Mediaserver") {
2026-01-20 14:42:21 +00:00
# Individual Data Disks
fileSystems."/mnt/disk1" = {
device = "/dev/disk/by-uuid/90ae3493-38c1-4473-b409-e9d99c3b315e";
fsType = "ext4";
};
fileSystems."/mnt/disk2" = {
device = "/dev/disk/by-uuid/7145223e-f285-424a-a114-cb0b1b64e068";
fsType = "ext4";
};
2026-01-20 09:59:20 +00:00
2026-01-20 14:42:21 +00:00
fileSystems."/mnt/disk3" = {
device = "/dev/disk/by-uuid/58cecfd5-2fd7-4c4b-b3a1-0bf5e9d0beab";
fsType = "ext4";
};
2026-01-20 09:59:20 +00:00
2026-01-20 14:42:21 +00:00
# The Combined MergerFS Pool
fileSystems."/mnt/storage" = {
device = "/mnt/disk1:/mnt/disk2:/mnt/disk3";
fsType = "fuse.mergerfs";
options = [
"defaults"
"allow_other"
"use_ino"
"cache.files=partial"
"dropcacheonclose=true"
"category.create=mfs"
];
};
# Create symlink from home to storage
systemd.tmpfiles.rules = [
"L+ /home/fred/storage - - - - /mnt/storage"
"d /var/lib/nginx-proxy-manager/data 0755 root root -"
"d /var/lib/nginx-proxy-manager/letsencrypt 0755 root root -"
];
2026-01-20 09:59:20 +00:00
2026-01-20 14:42:21 +00:00
# Basic system packages
2026-01-20 14:35:20 +00:00
environment.systemPackages = with pkgs; [
mergerfs
wget
btop
util-linux
];
2026-01-20 09:59:20 +00:00
2026-01-20 14:42:21 +00:00
# Jellyfin
2026-01-20 14:35:20 +00:00
services.jellyfin = {
enable = true;
openFirewall = true;
};
2026-01-20 14:42:21 +00:00
# Nginx Proxy Manager
2026-01-20 14:35:20 +00:00
virtualisation.docker.enable = true;
2026-01-20 14:42:21 +00:00
2026-01-20 14:35:20 +00:00
systemd.services.nginx-proxy-manager = {
description = "Nginx Proxy Manager";
after = [ "docker.service" ];
requires = [ "docker.service" ];
wantedBy = [ "multi-user.target" ];
2026-01-20 14:42:21 +00:00
2026-01-20 14:35:20 +00:00
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStartPre = "-${pkgs.docker}/bin/docker rm -f nginx-proxy-manager";
ExecStart = ''
${pkgs.docker}/bin/docker run -d \
--name=nginx-proxy-manager \
--restart=unless-stopped \
-p 80:80 \
-p 81:81 \
-p 443:443 \
-v /var/lib/nginx-proxy-manager/data:/data \
-v /var/lib/nginx-proxy-manager/letsencrypt:/etc/letsencrypt \
jc21/nginx-proxy-manager:latest
'';
ExecStop = "${pkgs.docker}/bin/docker stop nginx-proxy-manager";
};
};
2026-01-20 13:31:23 +00:00
2026-01-20 16:08:59 +00:00
2026-01-20 19:27:51 +00:00
virtualisation.oci-containers = {
backend = "docker"; # Explicitly set the backend
containers."hytale-server" = {
image = "ghcr.io/terkea/hytale-server:latest";
ports = [ "5520:5520/udp" ];
environment = {
SERVER_NAME = "My Hytale Server";
MAX_PLAYERS = "50";
MEMORY = "4G";
};
volumes = [
"/home/fred/docker/hytale-server/hytale-data:/data"
];
# Explicitly disable interactive and TTY
extraOptions = [
"--interactive=false"
"--tty=false"
];
};
};
# Also make sure to open the firewall port
networking.firewall.allowedUDPPorts = [ 5520 ];
2026-01-20 14:42:21 +00:00
# Open firewall for web traffic
networking.firewall.allowedTCPPorts = [ 80 443 81 22 ];
# Basic networking
networking.useDHCP = lib.mkDefault true;
services.openssh = {
enable = true;
settings.PermitRootLogin = "no";
};
# Boot loader
2026-01-20 14:35:20 +00:00
boot.loader.grub = {
enable = true;
2026-01-20 14:42:21 +00:00
# Includes all 4 physical disks for redundancy
2026-01-20 14:35:20 +00:00
devices = [ "/dev/sda" "/dev/sdb" "/dev/sdc" "/dev/sdd" ];
useOSProber = true;
};
};
2026-01-20 09:59:20 +00:00
}