Update FredOS-Mediaserver.nix

This commit is contained in:
ediblerope 2026-01-20 14:35:20 +00:00 committed by GitHub
parent 5af13373df
commit 2afac3399a
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -1,23 +1,22 @@
{ config, pkgs, lib, ... }: { config, pkgs, lib, ... }:
{ {
config = lib.mkIf (config.networking.hostName == "FredOS-Mediaserver") { config = lib.mkIf (config.networking.hostName == "FredOS-Mediaserver") {
# --- File Systems (Uncomment and add UUIDs as needed) ---
# fileSystems."/mnt/disk1" = { # fileSystems."/mnt/disk1" = {
# device = "/dev/disk/by-uuid/90ae3493-38c1-4473-b409-e9d99c3b315e"; # device = "/dev/disk/by-uuid/90ae3493-38c1-4473-b409-e9d99c3b315e";
# fsType = "ext4"; # fsType = "ext4";
# options = [ "defaults" ]; # options = [ "defaults" ];
# }; # };
# fileSystems."/mnt/disk2" = {
# device = "/dev/disk/by-uuid/7145223e-f285-424a-a114-cb0b1b64e068"; # fileSystems."/mnt/disk4" = {
# fsType = "ext4"; # device = "/dev/disk/by-uuid/PASTE_NEW_SSD_UUID_HERE";
# options = [ "defaults" ];
# };
# fileSystems."/mnt/disk3" = {
# device = "/dev/disk/by-uuid/613abe28-9af9-481e-9673-0eab1913b32c";
# fsType = "ext4"; # fsType = "ext4";
# options = [ "defaults" ]; # options = [ "defaults" ];
# }; # };
# fileSystems."/mnt/storage" = { # fileSystems."/mnt/storage" = {
# device = "/mnt/disk1:/mnt/disk2:/mnt/disk3"; # device = "/mnt/disk1:/mnt/disk2:/mnt/disk3:/mnt/disk4";
# fsType = "fuse.mergerfs"; # fsType = "fuse.mergerfs";
# options = [ # options = [
# "defaults" # "defaults"
@ -25,18 +24,11 @@ config = lib.mkIf (config.networking.hostName == "FredOS-Mediaserver") {
# "use_ino" # "use_ino"
# "cache.files=partial" # "cache.files=partial"
# "dropcacheonclose=true" # "dropcacheonclose=true"
# "category.create=mfs" # Most free space for new files # "category.create=mfs"
# ]; # ];
# }; # };
# Create symlink from home to storage # --- System Packages ---
# systemd.tmpfiles.rules = [
# "L+ /home/fred/storage - - - - /mnt/storage"
# "d /var/lib/nginx-proxy-manager/data 0755 root root -"
# "d /var/lib/nginx-proxy-manager/letsencrypt 0755 root root -"
# ];
# Basic system packages
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
mergerfs mergerfs
wget wget
@ -44,13 +36,22 @@ config = lib.mkIf (config.networking.hostName == "FredOS-Mediaserver") {
util-linux util-linux
]; ];
# Jellyfin # --- Services ---
services.jellyfin = { services.jellyfin = {
enable = true; enable = true;
openFirewall = true; openFirewall = true;
}; };
# Nginx Proxy Manager services.openssh = {
enable = true;
settings.PermitRootLogin = "no";
};
# --- Networking ---
networking.useDHCP = lib.mkDefault true;
networking.firewall.allowedTCPPorts = [ 80 443 81 22 ];
# --- Docker & Nginx Proxy Manager ---
virtualisation.docker.enable = true; virtualisation.docker.enable = true;
systemd.services.nginx-proxy-manager = { systemd.services.nginx-proxy-manager = {
@ -58,16 +59,10 @@ config = lib.mkIf (config.networking.hostName == "FredOS-Mediaserver") {
after = [ "docker.service" ]; after = [ "docker.service" ];
requires = [ "docker.service" ]; requires = [ "docker.service" ];
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
systemd.services.nginx-proxy-manager = {
description = "Nginx Proxy Manager";
after = [ "docker.service" ];
requires = [ "docker.service" ];
wantedBy = [ "multi-user.target" ];
serviceConfig = { serviceConfig = {
Type = "oneshot"; Type = "oneshot";
RemainAfterExit = true; RemainAfterExit = true;
# The '-' tells systemd to ignore errors if the container doesn't exist yet
ExecStartPre = "-${pkgs.docker}/bin/docker rm -f nginx-proxy-manager"; ExecStartPre = "-${pkgs.docker}/bin/docker rm -f nginx-proxy-manager";
ExecStart = '' ExecStart = ''
${pkgs.docker}/bin/docker run -d \ ${pkgs.docker}/bin/docker run -d \
@ -84,20 +79,13 @@ systemd.services.nginx-proxy-manager = {
}; };
}; };
# Open firewall for web traffic # --- Bootloader ---
networking.firewall.allowedTCPPorts = [ 80 443 81 22 ]; # 81 is NPM admin interface boot.loader.grub = {
# Basic networking
networking.useDHCP = lib.mkDefault true;
services.openssh = {
enable = true; enable = true;
settings.PermitRootLogin = "no"; # We recommend using /dev/disk/by-id/ names here eventually!
devices = [ "/dev/sda" "/dev/sdb" "/dev/sdc" "/dev/sdd" ];
useOSProber = true;
}; };
# Boot loader
boot.loader.grub.enable = true;
boot.loader.grub.devices = [ "/dev/sda" "/dev/sdb" "/dev/sdc" "/dev/sdd" ];
boot.loader.grub.useOSProber = true;
}; };
} }