nixfleet/modules/arr/default.nix
2025-03-17 17:17:51 +01:00

59 lines
1.5 KiB
Nix

{ pkgs, lib, ... }:
{
services.radarr = {
enable = true;
};
services.sonarr = {
enable = true;
package =
(builtins.getFlake "github:NixOS/nixpkgs/c80f6a7e10b39afcc1894e02ef785b1ad0b0d7e5")
.legacyPackages.${pkgs.stdenv.system}.sonarr;
};
services.prowlarr = {
enable = true;
};
systemd.services.prowlarr = {
serviceConfig = {
DynamicUser = lib.mkForce false;
};
};
users.users.radarr.extraGroups = [ "transmission" ];
users.users.sonarr.extraGroups = [ "transmission" ];
environment.persistence."/persist".directories = [
"/var/lib/radarr"
"/var/lib/prowlarr"
"/var/lib/sonarr"
];
services.nginx.virtualHosts = {
"radarr.sisko.wg.aciceri.dev" = {
forceSSL = true;
useACMEHost = "aciceri.dev";
locations."/" = {
proxyPass = "http://localhost:7878"; # FIXME hardcoded port
};
serverAliases = [ "radarr.sisko.zt.aciceri.dev" ];
};
"prowlarr.sisko.wg.aciceri.dev" = {
forceSSL = true;
useACMEHost = "aciceri.dev";
locations."/" = {
proxyPass = "http://localhost:9696"; # FIXME hardcoded port
};
serverAliases = [ "prowlarr.sisko.zt.aciceri.dev" ];
};
"sonarr.sisko.wg.aciceri.dev" = {
forceSSL = true;
useACMEHost = "aciceri.dev";
locations."/" = {
proxyPass = "http://localhost:8989"; # FIXME hardcoded port
};
serverAliases = [ "sonarr.sisko.zt.aciceri.dev" ];
};
};
}