54 lines
1.2 KiB
Nix
54 lines
1.2 KiB
Nix
|
{ pkgs, lib, ... }:
|
||
|
|
||
|
{
|
||
|
services.sonarr = {
|
||
|
enable = true;
|
||
|
user = "media_user";
|
||
|
group = "media_group";
|
||
|
openFirewall = false;
|
||
|
};
|
||
|
|
||
|
systemd.services.sonarr = {
|
||
|
bindsTo = [ "wg.service" ];
|
||
|
after = lib.mkForce [ "wg.service" ];
|
||
|
|
||
|
serviceConfig = {
|
||
|
NetworkNamespacePath = "/var/run/netns/wg";
|
||
|
};
|
||
|
};
|
||
|
|
||
|
systemd.services.socat-sonarr = {
|
||
|
description = "socat exposes sonarr";
|
||
|
bindsTo = [ "wg.service" ];
|
||
|
requires = [ "sonarr.service" ];
|
||
|
after = [ "wg.service" ];
|
||
|
|
||
|
serviceConfig = {
|
||
|
Type = "simple";
|
||
|
RuntimeDirectory = "socat-sonarr";
|
||
|
DynamicUser = true;
|
||
|
UMask = "000";
|
||
|
NetworkNamespacePath = "/var/run/netns/wg";
|
||
|
ExecStart = "${pkgs.socat}/bin/socat -d -d UNIX-LISTEN:/run/socat-sonarr/sonarr.sock,unlink-early,fork TCP4:127.0.0.1:8989";
|
||
|
Restart = "on-failure";
|
||
|
};
|
||
|
};
|
||
|
|
||
|
services.nginx.virtualHosts."sonarr.internal.kempkens.network" = {
|
||
|
quic = true;
|
||
|
http3 = true;
|
||
|
|
||
|
onlySSL = true;
|
||
|
useACMEHost = "internal.kempkens.network";
|
||
|
|
||
|
extraConfig = ''
|
||
|
client_max_body_size 32m;
|
||
|
'';
|
||
|
|
||
|
locations."/" = {
|
||
|
recommendedProxySettings = true;
|
||
|
proxyPass = "http://unix:/run/socat-sonarr/sonarr.sock:/";
|
||
|
};
|
||
|
};
|
||
|
}
|