Small refactor and added prowlarr

This commit is contained in:
Lillian Violet 2024-01-04 14:49:45 +01:00
parent 1ca82af674
commit 02876ce7b3
15 changed files with 76 additions and 88 deletions

View file

@ -16,19 +16,17 @@
# You can also split up your configuration and import pieces of it here: # You can also split up your configuration and import pieces of it here:
# ./nvim.nix # ./nvim.nix
./hardware-configuration.nix ./hardware-configuration.nix
../../package-configs/akkoma/configuration.nix ../../server/package-configs/akkoma/configuration.nix
../../package-configs/forgejo/configuration.nix ../../server/package-configs/forgejo/configuration.nix
../../package-configs/gotosocial/configuration.nix ../../server/package-configs/gotosocial/configuration.nix
../../package-configs/mail-server/configuration.nix ../../server/package-configs/mail-server/configuration.nix
../../package-configs/nextcloud/configuration.nix ../../server/package-configs/nextcloud/configuration.nix
../../package-configs/postgres/configuration.nix ../../server/package-configs/postgres/configuration.nix
../../package-configs/postgres/upgrade.nix ../../server/package-configs/postgres/upgrade.nix
../../package-configs/roundcube/configuration.nix ../../server/package-configs/roundcube/configuration.nix
../../package-configs/jellyfin/configuration.nix ../../server/package-configs/jellyfin/configuration.nix
../../package-configs/ombi/configuration.nix ../../server/package-configs/ombi/configuration.nix
../../package-configs/radarr/configuration.nix ../../server/package-configs/aria2/configuration.nix
../../package-configs/sonarr/configuration.nix
../../package-configs/aria2/configuration.nix
]; ];
boot.tmp.cleanOnBoot = true; boot.tmp.cleanOnBoot = true;

View file

@ -1,25 +0,0 @@
{
config,
pkgs,
...
}: {
users.users = {
ombi.extraGroups = ["radarr" "sonarr" "aria2"];
};
services.ombi = {
enable = true;
port = 2368;
};
services.nginx = {
virtualHosts = {
"ombi.gladtherescake.eu" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://localhost:2368";
};
};
};
};
}

View file

@ -1,25 +0,0 @@
{
config,
pkgs,
...
}: {
users.users = {
radarr.extraGroups = ["aria2"];
};
#uses port 7878
services.radarr = {
enable = true;
};
services.nginx = {
virtualHosts = {
"radarr.gladtherescake.eu" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://localhost:7878";
};
};
};
};
}

View file

@ -1,25 +0,0 @@
{
config,
pkgs,
...
}: {
users.users = {
sonarr.extraGroups = ["aria2"];
};
#uses port 8989
services.sonarr = {
enable = true;
};
services.nginx = {
virtualHosts = {
"sonarr.gladtherescake.eu" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://localhost:8989";
};
};
};
};
}

View file

@ -0,0 +1,65 @@
{
config,
pkgs,
...
}: {
users.users = {
ombi.extraGroups = ["radarr" "sonarr" "aria2"];
};
services.ombi = {
enable = true;
port = 2368;
};
users.users = {
radarr.extraGroups = ["aria2"];
sonarr.extraGroups = ["aria2"];
prowlarr.extraGroups = ["aria2"];
};
#uses port 7878
services.radarr = {
enable = true;
};
#uses port 8989
services.sonarr = {
enable = true;
};
services.prowlarr = {
enable = true;
};
services.nginx = {
virtualHosts = {
"ombi.gladtherescake.eu" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://localhost:2368";
};
};
"radarr.gladtherescake.eu" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://localhost:7878";
};
};
"sonarr.gladtherescake.eu" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://localhost:8989";
};
};
"prowlarr.gladtherescake.eu" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://localhost:9696";
};
};
};
};
}