diff options
author | azahi <azat@bahawi.net> | 2025-01-06 23:21:56 +0300 |
---|---|---|
committer | azahi <azat@bahawi.net> | 2025-01-06 23:21:56 +0300 |
commit | 9faff5e0bee5718a5825cef2604a4e81ddcbd0e0 (patch) | |
tree | f2791f036b339e7c04958e6c0a1ca7604b9523f9 /modules/piracy/lidarr.nix | |
parent | 2025-01-01 (diff) |
Diffstat (limited to '')
-rw-r--r-- | modules/piracy/lidarr.nix (renamed from modules/lidarr.nix) | 46 |
1 files changed, 31 insertions, 15 deletions
diff --git a/modules/lidarr.nix b/modules/piracy/lidarr.nix index 127e8d9..a905d8e 100644 --- a/modules/lidarr.nix +++ b/modules/piracy/lidarr.nix @@ -8,10 +8,12 @@ }: with lib; let - cfg = config.nixfiles.modules.lidarr; + cfg = config.nixfiles.modules.piracy.lidarr; + + port = 8686; in { - options.nixfiles.modules.lidarr = { + options.nixfiles.modules.piracy.lidarr = { enable = mkEnableOption "Lidarr"; domain = mkOption { @@ -26,27 +28,33 @@ in ark.directories = [ "/var/lib/lidarr" ]; - nixfiles.modules.nginx = { - enable = true; - upstreams.lidarr.servers."127.0.0.1:8686" = { }; - virtualHosts.${cfg.domain} = { - locations."/".proxyPass = "http://lidarr"; - extraConfig = libNginx.config.internalOnly; + nixfiles.modules = { + nginx = { + enable = true; + upstreams.lidarr.servers."127.0.0.1:${toString port}" = { }; + virtualHosts.${cfg.domain} = { + locations."/".proxyPass = "http://lidarr"; + extraConfig = libNginx.config.internalOnly; + }; + }; + + piracy = { + enable = true; + jackett.enable = true; }; }; services = { lidarr = { enable = true; - user = "rtorrent"; - group = "rtorrent"; + group = "piracy"; }; prometheus.exporters.exportarr-lidarr = { enable = true; url = "http://127.0.0.1"; + port = port + 10000; apiKeyFile = config.secrets.lidarr-api-key.path; - port = mkDefault 9708; inherit (config.services.lidarr) user; inherit (config.services.lidarr) group; listenAddress = this.wireguard.ipv4.address; @@ -54,14 +62,22 @@ in }; }; - systemd.tmpfiles.rules = with config.services.lidarr; [ - "d /var/lib/lidarr/root 0755 ${user} ${group} - -" - ]; + systemd = { + tmpfiles.rules = with config.services.lidarr; [ + "d /var/lib/lidarr/root 0755 ${user} ${group} - -" + ]; + + services.lidarr.after = [ + "flood.service" + "jackett.service" + "local-fs.target" + ]; + }; topology = with cfg; { nodes.${this.hostname}.services.lidarr = { info = domain; - details.listen.text = "127.0.0.1:8686"; + details.listen.text = "127.0.0.1:${toString port}"; }; }; }; |