about summary refs log tree commit diff
path: root/modules
diff options
context:
space:
mode:
Diffstat (limited to 'modules')
-rw-r--r--modules/nixos/default.nix1
-rw-r--r--modules/nixos/jackett.nix33
-rw-r--r--modules/nixos/nsd.nix1
-rw-r--r--modules/nixos/openssh.nix2
-rw-r--r--modules/nixos/unbound.nix1
5 files changed, 36 insertions, 2 deletions
diff --git a/modules/nixos/default.nix b/modules/nixos/default.nix
index 3c4192d..3c6e61b 100644
--- a/modules/nixos/default.nix
+++ b/modules/nixos/default.nix
@@ -22,6 +22,7 @@ _: {
     ./grafana.nix
     ./hydra.nix
     ./ipfs.nix
+    ./jackett.nix
     ./k3s.nix
     ./kde.nix
     ./libvirtd.nix
diff --git a/modules/nixos/jackett.nix b/modules/nixos/jackett.nix
new file mode 100644
index 0000000..f8e45ba
--- /dev/null
+++ b/modules/nixos/jackett.nix
@@ -0,0 +1,33 @@
+{
+  config,
+  lib,
+  ...
+}:
+with lib; let
+  cfg = config.nixfiles.modules.jackett;
+in {
+  options.nixfiles.modules.jackett = {
+    enable = mkEnableOption "Jackett";
+
+    domain = mkOption {
+      description = "Domain name sans protocol scheme.";
+      type = with types; str;
+      default = "jackett.${config.networking.domain}";
+    };
+  };
+
+  config = mkIf cfg.enable {
+    ark.directories = ["/var/lib/jackett"];
+
+    nixfiles.modules.nginx = {
+      enable = true;
+      upstreams.jackett.servers."127.0.0.1:9117" = {};
+      virtualHosts.${cfg.domain} = {
+        locations."/".proxyPass = "http://jackett";
+        extraConfig = nginxInternalOnly;
+      };
+    };
+
+    services.jackett.enable = true;
+  };
+}
diff --git a/modules/nixos/nsd.nix b/modules/nixos/nsd.nix
index 3659a7a..255c787 100644
--- a/modules/nixos/nsd.nix
+++ b/modules/nixos/nsd.nix
@@ -118,6 +118,7 @@ in {
                       vaultwarden = manwe;
 
                       flood = yavanna;
+                      jackett = yavanna;
                       lidarr = yavanna;
                     };
                   }
diff --git a/modules/nixos/openssh.nix b/modules/nixos/openssh.nix
index 164f5bb..22e4b51 100644
--- a/modules/nixos/openssh.nix
+++ b/modules/nixos/openssh.nix
@@ -17,8 +17,6 @@ in {
   };
 
   config = mkIf cfg.server.enable {
-    # authorized_keys is not added here because it only contains my SSH keys and
-    # all non-declarative ones are located in the home directory.
     ark.files = [
       "/etc/ssh/ssh_host_ed25519_key"
       "/etc/ssh/ssh_host_ed25519_key.pub"
diff --git a/modules/nixos/unbound.nix b/modules/nixos/unbound.nix
index d24b79e..7805b02 100644
--- a/modules/nixos/unbound.nix
+++ b/modules/nixos/unbound.nix
@@ -133,6 +133,7 @@ in {
           localControlSocketPath = "/run/unbound/unbound.socket";
         };
 
+        # TODO Switch to https://github.com/letsencrypt/unbound_exporter.
         prometheus.exporters.unbound = {
           enable = true;
           listenAddress = mkDefault this.wireguard.ipv4.address;

Consider giving Nix/NixOS a try! <3