55 lines
1.5 KiB
Nix
55 lines
1.5 KiB
Nix
{ pkgs, ... }:
|
|
|
|
{
|
|
# The nix-provided options force a sabnzbd-user to a certain degree
|
|
systemd.services.sabnzbd = {
|
|
description = "sabnzbd server";
|
|
bindsTo = [ "wg.service" ];
|
|
after = [ "wg.service" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
serviceConfig = {
|
|
Type = "forking";
|
|
GuessMainPID = "no";
|
|
User = "media_user";
|
|
Group = "media_group";
|
|
NetworkNamespacePath = "/var/run/netns/wg";
|
|
ExecStart = "${pkgs.sabnzbd}/bin/sabnzbd -d -f /var/lib/sabnzbd/sabnzbd.ini";
|
|
};
|
|
};
|
|
|
|
systemd.services.socat-sabnzbd = {
|
|
description = "socat exposes sabnzbd";
|
|
bindsTo = [ "wg.service" ];
|
|
requires = [ "sabnzbd.service" ];
|
|
after = [ "wg.service" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
serviceConfig = {
|
|
Type = "simple";
|
|
RuntimeDirectory = "socat-sabnzbd";
|
|
DynamicUser = true;
|
|
UMask = "000";
|
|
NetworkNamespacePath = "/var/run/netns/wg";
|
|
ExecStart = "${pkgs.socat}/bin/socat -d -d UNIX-LISTEN:/run/socat-sabnzbd/sabnzbd.sock,unlink-early,fork TCP4:127.0.0.1:8080";
|
|
Restart = "on-failure";
|
|
};
|
|
};
|
|
|
|
services.nginx.virtualHosts."sabnzbd.internal.kempkens.network" = {
|
|
quic = true;
|
|
http3 = true;
|
|
|
|
onlySSL = true;
|
|
useACMEHost = "internal.kempkens.network";
|
|
|
|
extraConfig = ''
|
|
client_max_body_size 32m;
|
|
'';
|
|
|
|
locations."/" = {
|
|
recommendedProxySettings = true;
|
|
proxyPass = "http://unix:/run/socat-sabnzbd/sabnzbd.sock:/";
|
|
};
|
|
};
|
|
}
|