colin
d13bcc49ab
longer-term, i want hosts/by-name to define host-specific data that's accessible via the other hosts (things like pubkeys). also the secrets management needs some rethinking. there's really not much point in me specifiying where *exactly* a secret comes from at its use site. i should really be specifying secret store manifests; i.e. "servo.yaml contains secrets X Y and Z", and leaving the rest up to auto-computing.
33 lines
1.0 KiB
Nix
33 lines
1.0 KiB
Nix
{ ... }:
|
|
|
|
{
|
|
sane.persist.sys.plaintext = [
|
|
# TODO: mode? we only need this to save Indexer creds ==> migrate to config?
|
|
{ user = "root"; group = "root"; directory = "/var/lib/jackett"; }
|
|
];
|
|
services.jackett.enable = true;
|
|
|
|
systemd.services.jackett.after = [ "wireguard-wg-ovpns.service" ];
|
|
systemd.services.jackett.partOf = [ "wireguard-wg-ovpns.service" ];
|
|
systemd.services.jackett.serviceConfig = {
|
|
# run this behind the OVPN static VPN
|
|
NetworkNamespacePath = "/run/netns/ovpns";
|
|
# patch jackett to listen on the public interfaces
|
|
# ExecStart = lib.mkForce "${pkgs.jackett}/bin/Jackett --NoUpdates --DataFolder /var/lib/jackett/.config/Jackett --ListenPublic";
|
|
};
|
|
|
|
# jackett torrent search
|
|
services.nginx.virtualHosts."jackett.uninsane.org" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
# inherit kTLS;
|
|
locations."/" = {
|
|
# proxyPass = "http://ovpns.uninsane.org:9117";
|
|
proxyPass = "http://10.0.1.6:9117";
|
|
};
|
|
};
|
|
|
|
sane.services.trust-dns.zones."uninsane.org".inet.CNAME."jackett" = "native";
|
|
}
|
|
|