1
0
Fork 0
dotfiles/system/nixos/prowlarr.nix

45 lines
1 KiB
Nix

{ pkgs, ... }:
{
services.prowlarr = {
enable = true;
openFirewall = false;
};
systemd.services.prowlarr = {
bindsTo = [ "netns@wg.service" ];
after = [ "wg.service" ];
serviceConfig = {
NetworkNamespacePath = "/var/run/netns/wg";
};
};
systemd.services.socat-prowlarr = {
description = "socat exposes prowlarr";
bindsTo = [ "netns@wg.service" ];
after = [ "network.target" "wg.service" ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "simple";
User = "nobody";
NetworkNamespacePath = "/var/run/netns/wg";
ExecStart = "${pkgs.socat}/bin/socat -d -d UNIX-LISTEN:/tmp/prowlarr.sock,unlink-early,fork TCP4:127.0.0.1:9696";
Restart = "on-failure";
};
};
services.nginx.virtualHosts."prowlarr.internal.kempkens.network" = {
quic = true;
http3 = true;
onlySSL = true;
useACMEHost = "internal.kempkens.network";
locations."/" = {
recommendedProxySettings = true;
proxyPass = "http://unix:/tmp/prowlarr.sock";
};
};
}