1
0
Fork 0
dotfiles/system/nixos/prowlarr.nix

54 lines
1.3 KiB
Nix
Raw Normal View History

2023-04-15 00:04:18 +02:00
{ pkgs, lib, ... }:
2023-04-14 00:12:24 +02:00
2023-04-13 22:53:38 +02:00
{
services.prowlarr = {
enable = true;
openFirewall = false;
};
systemd.services.prowlarr = {
2023-04-15 00:52:07 +02:00
bindsTo = [ "wg.service" ];
2023-04-15 00:04:18 +02:00
after = lib.mkForce [ "wg.service" ];
2023-04-13 22:53:38 +02:00
serviceConfig = {
NetworkNamespacePath = "/var/run/netns/wg";
};
};
2023-04-14 00:12:24 +02:00
systemd.services.socat-prowlarr = {
description = "socat exposes prowlarr";
2023-04-15 00:52:07 +02:00
bindsTo = [ "wg.service" ];
2023-04-15 22:26:41 +02:00
requires = [ "prowlarr.service" ];
2023-04-15 00:31:56 +02:00
after = [ "wg.service" ];
2023-04-16 00:39:50 +02:00
wantedBy = [ "multi-user.target" ];
2023-04-14 00:12:24 +02:00
serviceConfig = {
Type = "simple";
2023-04-15 01:08:14 +02:00
RuntimeDirectory = "socat-prowlarr";
2023-04-15 00:55:32 +02:00
DynamicUser = true;
2023-04-15 01:11:03 +02:00
UMask = "000";
2023-04-14 00:12:24 +02:00
NetworkNamespacePath = "/var/run/netns/wg";
2023-04-15 01:08:14 +02:00
ExecStart = "${pkgs.socat}/bin/socat -d -d UNIX-LISTEN:/run/socat-prowlarr/prowlarr.sock,unlink-early,fork TCP4:127.0.0.1:9696";
2023-04-14 00:12:24 +02:00
Restart = "on-failure";
};
};
2023-04-14 17:45:02 +02:00
services.nginx.virtualHosts."prowlarr.internal.kempkens.network" = {
quic = true;
http3 = true;
onlySSL = true;
useACMEHost = "internal.kempkens.network";
2023-04-15 01:29:59 +02:00
extraConfig = ''
client_max_body_size 32m;
'';
2023-04-14 17:45:02 +02:00
locations."/" = {
recommendedProxySettings = true;
2023-04-15 01:27:47 +02:00
proxyWebsockets = true;
2023-04-15 01:08:14 +02:00
proxyPass = "http://unix:/run/socat-prowlarr/prowlarr.sock:/";
2023-04-14 17:45:02 +02:00
};
};
2023-04-13 22:53:38 +02:00
}