From dadc0f401ffce8bff8066eee5f8f61718dcb0ed7 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Madeleine=20Sydney=20=C5=9Alaga?= Date: Sat, 20 Dec 2025 13:59:27 -0700 Subject: [PATCH] refactor(servarr): remove unused slskd module --- modules/nixos/deertopia/servarr.nix | 1 - modules/nixos/deertopia/servarr/slskd.nix | 74 ----------------------- 2 files changed, 75 deletions(-) delete mode 100644 modules/nixos/deertopia/servarr/slskd.nix diff --git a/modules/nixos/deertopia/servarr.nix b/modules/nixos/deertopia/servarr.nix index ad76bf5..ae128b7 100644 --- a/modules/nixos/deertopia/servarr.nix +++ b/modules/nixos/deertopia/servarr.nix @@ -23,7 +23,6 @@ in { ./servarr/sonarr.nix ./servarr/radarr.nix ./servarr/transmission.nix - # ./servarr/slskd.nix ]; config = lib.mkIf cfg.enable { diff --git a/modules/nixos/deertopia/servarr/slskd.nix b/modules/nixos/deertopia/servarr/slskd.nix deleted file mode 100644 index b431158..0000000 --- a/modules/nixos/deertopia/servarr/slskd.nix +++ /dev/null @@ -1,74 +0,0 @@ -{ config, lib, pkgs, ... }: - -let cfg = config.sydnix.deertopia.servarr.slskd; -in { - options.sydnix.deertopia.servarr.slskd = { - enable = lib.mkEnableOption "Slskd (à la Nixarr)"; - }; - - config = lib.mkIf cfg.enable { - sydnix.sops.secrets.slskd-credentials = { - owner = "torrenter"; - }; - - # TODO: Patch Nixpkgs to add option services.slskd.appDir. - - services.slskd = { - enable = true; - user = "torrenter"; - group = "media"; - - openFirewall = true; - domain = null; - environmentFile = "/run/secrets/slskd-credentials"; - - settings = { - # Disable slskd's authentication in favour of Authelia. - web.authentication.disabled = true; - shares.directories = [ - config.nixarr.mediaDir - ]; - directories = { - downloads = "/var/lib/slskd/downloads"; - incomplete = "/var/lib/slskd/incomplete"; - }; - }; - }; - - networking.firewall.allowedTCPPorts = [ - config.services.slskd.settings.web.port - ]; - - sydnix.deertopia.nginx.vhosts."slsk" = { - directory = null; - vhost = { - forceSSL = true; - enableACME = true; - extraConfig = - let port = builtins.toString config.services.slskd.settings.web.port; - in '' - include ${../authelia/authelia-location.conf}; - set $upstream http://127.0.0.1:${port}; - ''; - locations."/".extraConfig = '' - include ${../authelia/authelia-authrequest.conf}; - include ${../authelia/proxy.conf}; - proxy_pass $upstream; - ''; - locations."/hub".extraConfig = '' - proxy_pass $upstream; - proxy_http_version 1.1; - proxy_set_header Upgrade $http_upgrade; - proxy_set_header Connection "upgrade"; - proxy_set_header Host $host; - proxy_set_header X-Real-IP $remote_addr; - proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; - proxy_set_header X-Forwarded-Proto $scheme; - proxy_set_header X-Forwarded-Protocol $scheme; - proxy_set_header X-Forwarded-Host $http_host; - ''; - }; - }; - }; -} -