Compare commits
No commits in common. "319d292fa0f5b3699f07780092b87ebe115e432f" and "338246498da757c66d0762f54f9bf42b0410c219" have entirely different histories.
319d292fa0
...
338246498d
@ -31,6 +31,10 @@
|
|||||||
443 # HTTPS
|
443 # HTTPS
|
||||||
25565 # Minecraft
|
25565 # Minecraft
|
||||||
];
|
];
|
||||||
|
extraCommands = ''
|
||||||
|
iptables -I INPUT 1 -i 172.16.0.0/12 -p tcp -d 172.17.0.1 -j ACCEPT
|
||||||
|
iptables -I INPUT 1 -i 172.16.0.0/12 -p tcp -d 172.17.0.1 -j ACCEPT
|
||||||
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
packages.nix = {
|
packages.nix = {
|
||||||
@ -39,10 +43,6 @@
|
|||||||
};
|
};
|
||||||
services = {
|
services = {
|
||||||
endlessh.enable = true;
|
endlessh.enable = true;
|
||||||
plex = {
|
|
||||||
enable = true;
|
|
||||||
dataDir = "/tank/web/stacks/plex/plex-config";
|
|
||||||
};
|
|
||||||
ssh = {
|
ssh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
allowedUsers = ["phundrak"];
|
allowedUsers = ["phundrak"];
|
||||||
|
@ -2,7 +2,6 @@
|
|||||||
imports = [
|
imports = [
|
||||||
./endlessh.nix
|
./endlessh.nix
|
||||||
./fwupd.nix
|
./fwupd.nix
|
||||||
./plex.nix
|
|
||||||
./printing.nix
|
./printing.nix
|
||||||
./ssh.nix
|
./ssh.nix
|
||||||
./sunshine.nix
|
./sunshine.nix
|
||||||
|
@ -1,35 +0,0 @@
|
|||||||
{
|
|
||||||
lib,
|
|
||||||
config,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib; let
|
|
||||||
cfg = config.system.services.plex;
|
|
||||||
in {
|
|
||||||
options.system.services.plex = {
|
|
||||||
enable = mkEnableOption "Enable Plex";
|
|
||||||
group = mkOption {
|
|
||||||
type = types.string;
|
|
||||||
default = "users";
|
|
||||||
example = "users";
|
|
||||||
description = "Group under which Plex runs";
|
|
||||||
};
|
|
||||||
dataDir = mkOption {
|
|
||||||
type = types.string;
|
|
||||||
example = "/tank/plex-config";
|
|
||||||
};
|
|
||||||
user = mkOption {
|
|
||||||
type = types.string;
|
|
||||||
default = "phundrak";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
config = {
|
|
||||||
services.plex = mkIf cfg.enable {
|
|
||||||
inherit (cfg) enable user group dataDir;
|
|
||||||
openFirewall = cfg.enable;
|
|
||||||
};
|
|
||||||
boot.kernel.sysctl = {
|
|
||||||
"kernel.unprivileged_userns_clone" = 1;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
@ -1,7 +1,7 @@
|
|||||||
{config, ...}: {
|
{config, ...}: {
|
||||||
imports = [../light-home.nix];
|
imports = [../light-home.nix];
|
||||||
home = {
|
home = {
|
||||||
cli.nh.flake = "/tank/phundrak/nixos";
|
cli.nh.flake = "${config.home.homeDirectory}/nixos";
|
||||||
phundrak.sshKey = {
|
phundrak.sshKey = {
|
||||||
content = builtins.readFile ../../../keys/id_tilo.pub;
|
content = builtins.readFile ../../../keys/id_tilo.pub;
|
||||||
# file = "${config.home.homeDirectory}/.ssh/id_ed25519.pub";
|
# file = "${config.home.homeDirectory}/.ssh/id_ed25519.pub";
|
||||||
|
Loading…
x
Reference in New Issue
Block a user