Compare commits

...

2 commits

Author SHA1 Message Date
e03c4d07ec
Bump emacs-overlay
Some checks failed
EVAL aarch64-linux.sisko
BUILD aarch64-linux.sisko
UPLOAD aarch64-linux.sisko
DOWNLOAD aarch64-linux.sisko
CACHIX aarch64-linux.sisko
ATTIC aarch64-linux.sisko
/ test (push) Successful in 16m46s
2025-03-17 17:17:51 +01:00
30cc84fbda
Complete arr suite 2025-03-17 17:17:51 +01:00
4 changed files with 69 additions and 24 deletions

18
flake.lock generated
View file

@ -156,11 +156,11 @@
"nixpkgs-stable": "nixpkgs-stable_2" "nixpkgs-stable": "nixpkgs-stable_2"
}, },
"locked": { "locked": {
"lastModified": 1736759802, "lastModified": 1742203058,
"narHash": "sha256-XCaIRTC+YlL5nRi9WJHeftyfw2Z0YXwwzEmHThGuR3Q=", "narHash": "sha256-YMy01dURXhxyjx2W+Dv83b2RRnNq28K4t4+kvrRxFto=",
"owner": "nix-community", "owner": "nix-community",
"repo": "emacs-overlay", "repo": "emacs-overlay",
"rev": "244a2ab1459c72bac32a2db088549f8bc6d7a836", "rev": "7a9a25389a6ad9402f9aa5087ccb36f8383045a8",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -783,11 +783,11 @@
}, },
"nixpkgs-stable_2": { "nixpkgs-stable_2": {
"locked": { "locked": {
"lastModified": 1736549401, "lastModified": 1742136038,
"narHash": "sha256-ibkQrMHxF/7TqAYcQE+tOnIsSEzXmMegzyBWza6uHKM=", "narHash": "sha256-DDe16FJk18sadknQKKG/9FbwEro7A57tg9vB5kxZ8kY=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "1dab772dd4a68a7bba5d9460685547ff8e17d899", "rev": "a1185f4064c18a5db37c5c84e5638c78b46e3341",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -847,11 +847,11 @@
}, },
"nixpkgs_4": { "nixpkgs_4": {
"locked": { "locked": {
"lastModified": 1736523798, "lastModified": 1742069588,
"narHash": "sha256-Xb8mke6UCYjge9kPR9o4P1nVrhk7QBbKv3xQ9cj7h2s=", "narHash": "sha256-C7jVfohcGzdZRF6DO+ybyG/sqpo1h6bZi9T56sxLy+k=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "130595eba61081acde9001f43de3248d8888ac4a", "rev": "c80f6a7e10b39afcc1894e02ef785b1ad0b0d7e5",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -30,7 +30,7 @@
"atticd" "atticd"
"jellyfin" "jellyfin"
"matrix" "matrix"
"radarr" "arr"
"zerotier" "zerotier"
"mosh" "mosh"
] ]

59
modules/arr/default.nix Normal file
View file

@ -0,0 +1,59 @@
{ pkgs, lib, ... }:
{
services.radarr = {
enable = true;
};
services.sonarr = {
enable = true;
package =
(builtins.getFlake "github:NixOS/nixpkgs/c80f6a7e10b39afcc1894e02ef785b1ad0b0d7e5")
.legacyPackages.${pkgs.stdenv.system}.sonarr;
};
services.prowlarr = {
enable = true;
};
systemd.services.prowlarr = {
serviceConfig = {
DynamicUser = lib.mkForce false;
};
};
users.users.radarr.extraGroups = [ "transmission" ];
users.users.sonarr.extraGroups = [ "transmission" ];
environment.persistence."/persist".directories = [
"/var/lib/radarr"
"/var/lib/prowlarr"
"/var/lib/sonarr"
];
services.nginx.virtualHosts = {
"radarr.sisko.wg.aciceri.dev" = {
forceSSL = true;
useACMEHost = "aciceri.dev";
locations."/" = {
proxyPass = "http://localhost:7878"; # FIXME hardcoded port
};
serverAliases = [ "radarr.sisko.zt.aciceri.dev" ];
};
"prowlarr.sisko.wg.aciceri.dev" = {
forceSSL = true;
useACMEHost = "aciceri.dev";
locations."/" = {
proxyPass = "http://localhost:9696"; # FIXME hardcoded port
};
serverAliases = [ "prowlarr.sisko.zt.aciceri.dev" ];
};
"sonarr.sisko.wg.aciceri.dev" = {
forceSSL = true;
useACMEHost = "aciceri.dev";
locations."/" = {
proxyPass = "http://localhost:8989"; # FIXME hardcoded port
};
serverAliases = [ "sonarr.sisko.zt.aciceri.dev" ];
};
};
}

View file

@ -1,14 +0,0 @@
{
services.radarr = {
enable = true;
};
services.nginx.virtualHosts."radarr.sisko.wg.aciceri.dev" = {
forceSSL = true;
useACMEHost = "aciceri.dev";
locations."/" = {
proxyPass = "http://localhost:7878"; # FIXME hardcoded port
};
serverAliases = [ "radarr.sisko.zt.aciceri.dev" ];
};
}