fix: Store torrents on NAS
This commit is contained in:
@@ -49,13 +49,13 @@ in {
|
|||||||
access.r = "*";
|
access.r = "*";
|
||||||
};
|
};
|
||||||
"/Media library" = {
|
"/Media library" = {
|
||||||
path = "/persist/media/library";
|
path = "/media/library";
|
||||||
# View and upload, but no deleting.
|
# View and upload, but no deleting.
|
||||||
access.rw = "*";
|
access.rw = "*";
|
||||||
access.rwmd = "@jellyfin-admin";
|
access.rwmd = "@jellyfin-admin";
|
||||||
};
|
};
|
||||||
"/Torrents" = {
|
"/Torrents" = {
|
||||||
path = "/persist/media/torrents";
|
path = "/media/torrents";
|
||||||
access.r = "*";
|
access.r = "*";
|
||||||
access.rwmd = "@jellyfin-admin";
|
access.rwmd = "@jellyfin-admin";
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -35,10 +35,10 @@ in {
|
|||||||
];
|
];
|
||||||
|
|
||||||
# Mount our NAS's 'media' share.
|
# Mount our NAS's 'media' share.
|
||||||
fileSystems."/persist/media/library" = {
|
fileSystems."/media" = {
|
||||||
# DNS is seemingly unavailable to the mount service.
|
# DNS is seemingly unavailable to the mount service.
|
||||||
device = "//192.168.68.62/media";
|
device = "//192.168.68.62/media";
|
||||||
mountPoint = "/persist/media/library";
|
mountPoint = "/media";
|
||||||
fsType = "cifs";
|
fsType = "cifs";
|
||||||
options = [
|
options = [
|
||||||
"vers=2.0"
|
"vers=2.0"
|
||||||
@@ -72,22 +72,22 @@ in {
|
|||||||
requiredBy = [ "wg.service" ];
|
requiredBy = [ "wg.service" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
systemd.services.test-mullvad-connection = {
|
# systemd.services.test-mullvad-connection = {
|
||||||
script = ''
|
# script = ''
|
||||||
${pkgs.curl}/bin/curl -s https://am.i.mullvad.net/connected >&2
|
# ${pkgs.curl}/bin/curl -s https://am.i.mullvad.net/connected >&2
|
||||||
${pkgs.curl}/bin/curl -s https://am.i.mullvad.net/connected 2>/dev/null
|
# ${pkgs.curl}/bin/curl -s https://am.i.mullvad.net/connected 2>/dev/null
|
||||||
'';
|
# '';
|
||||||
vpnconfinement = {
|
# vpnconfinement = {
|
||||||
enable = true;
|
# enable = true;
|
||||||
vpnnamespace = "wg";
|
# vpnnamespace = "wg";
|
||||||
};
|
# };
|
||||||
};
|
# };
|
||||||
|
|
||||||
nixarr = {
|
nixarr = {
|
||||||
enable = true;
|
enable = true;
|
||||||
# The default value is overly anti-FHS.
|
# The default value is overly anti-FHS.
|
||||||
stateDir = "/var/lib/nixarr";
|
stateDir = "/var/lib/nixarr";
|
||||||
mediaDir = "/persist/media";
|
mediaDir = "/media";
|
||||||
vpn = {
|
vpn = {
|
||||||
enable = true;
|
enable = true;
|
||||||
wgConf = "${config.nixarr.stateDir}/wg.conf";
|
wgConf = "${config.nixarr.stateDir}/wg.conf";
|
||||||
|
|||||||
Reference in New Issue
Block a user