241 lines
5.4 KiB
Nix
241 lines
5.4 KiB
Nix
{
|
|
config,
|
|
pkgs,
|
|
lib,
|
|
...
|
|
}:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.my.services.media-mgr;
|
|
|
|
containersDefinition = {
|
|
|
|
flaresolverr = {
|
|
enable = true;
|
|
image = "ghcr.io/flaresolverr/flaresolverr:v3.3.21";
|
|
autoStart = true;
|
|
# volumes = [
|
|
# "jackett_data:/data"
|
|
# ];
|
|
};
|
|
};
|
|
|
|
# Pod Definition
|
|
podDefinition = {
|
|
name = "media-manager-extra";
|
|
ports = [
|
|
"8191:8191" # : FlareSolverr
|
|
];
|
|
containers = containersDefinition;
|
|
};
|
|
|
|
in
|
|
{
|
|
options.my.services.media-mgr = {
|
|
|
|
programs = {
|
|
enable = lib.mkEnableOption "Enable the download manager stack";
|
|
};
|
|
|
|
exportMetrics = {
|
|
enable = lib.mkEnableOption "Enable monitoring for the download manager stack";
|
|
};
|
|
|
|
proxy = {
|
|
enable = lib.mkEnableOption "Set the proxy entry for this service";
|
|
|
|
domain = lib.mkOption {
|
|
default = "example.com";
|
|
type = lib.types.str;
|
|
description = ''
|
|
The domain where Caddy is reachable
|
|
'';
|
|
};
|
|
|
|
host = lib.mkOption {
|
|
default = "localhost";
|
|
type = lib.types.str;
|
|
description = ''
|
|
host name where the download manager stack is running
|
|
'';
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
config = lib.mkMerge [
|
|
|
|
# Services definition
|
|
(lib.mkIf cfg.programs.enable {
|
|
|
|
services = {
|
|
|
|
# Indexer
|
|
prowlarr = {
|
|
enable = true;
|
|
openFirewall = true;
|
|
};
|
|
|
|
# Movies
|
|
radarr = {
|
|
enable = true;
|
|
openFirewall = true;
|
|
};
|
|
|
|
# TV Shows
|
|
sonarr = {
|
|
enable = true;
|
|
openFirewall = true;
|
|
};
|
|
|
|
# Music
|
|
lidarr = {
|
|
enable = true;
|
|
openFirewall = true;
|
|
};
|
|
|
|
# E-books
|
|
readarr = {
|
|
enable = true;
|
|
openFirewall = true;
|
|
};
|
|
|
|
};
|
|
|
|
my.virtualisation.podmanPods = {
|
|
inherit podDefinition;
|
|
};
|
|
|
|
virtualisation.oci-containers.containers =
|
|
let
|
|
pod = config.helpers.processContainers podDefinition;
|
|
in
|
|
pod.containers;
|
|
|
|
})
|
|
|
|
# Caddy for reverse proxy
|
|
(lib.mkIf cfg.proxy.enable {
|
|
services.caddy = with cfg.proxy; {
|
|
virtualHosts."prowlarr.${domain}".extraConfig = ''
|
|
reverse_proxy http://${host}:9696
|
|
import cloudflare
|
|
'';
|
|
virtualHosts."radarr.${domain}".extraConfig = ''
|
|
reverse_proxy http://${host}:7878
|
|
import cloudflare
|
|
'';
|
|
virtualHosts."sonarr.${domain}".extraConfig = ''
|
|
reverse_proxy http://${host}:8989
|
|
import cloudflare
|
|
'';
|
|
virtualHosts."lidarr.${domain}".extraConfig = ''
|
|
reverse_proxy http://${host}:8686
|
|
import cloudflare
|
|
'';
|
|
virtualHosts."readarr.${domain}".extraConfig = ''
|
|
reverse_proxy http://${host}:8787
|
|
import cloudflare
|
|
'';
|
|
};
|
|
})
|
|
|
|
# Prometheus exporters
|
|
(lib.mkIf cfg.exportMetrics.enable {
|
|
|
|
users.groups.exportarr = { };
|
|
users.users.exportarr = {
|
|
group = "exportarr";
|
|
isSystemUser = true;
|
|
};
|
|
|
|
age.secrets = {
|
|
prowlarr-apiKey = {
|
|
file = ../../secrets/prowlarr-apiKey.age;
|
|
owner = "exportarr";
|
|
group = "exportarr";
|
|
mode = "770";
|
|
};
|
|
};
|
|
age.secrets = {
|
|
radarr-apiKey = {
|
|
file = ../../secrets/radarr-apiKey.age;
|
|
owner = "exportarr";
|
|
group = "exportarr";
|
|
mode = "770";
|
|
};
|
|
};
|
|
age.secrets = {
|
|
sonarr-apiKey = {
|
|
file = ../../secrets/sonarr-apiKey.age;
|
|
owner = "exportarr";
|
|
group = "exportarr";
|
|
mode = "770";
|
|
};
|
|
};
|
|
age.secrets = {
|
|
lidarr-apiKey = {
|
|
file = ../../secrets/lidarr-apiKey.age;
|
|
owner = "exportarr";
|
|
group = "exportarr";
|
|
mode = "770";
|
|
};
|
|
};
|
|
age.secrets = {
|
|
readarr-apiKey = {
|
|
file = ../../secrets/readarr-apiKey.age;
|
|
owner = "exportarr";
|
|
group = "exportarr";
|
|
mode = "770";
|
|
};
|
|
};
|
|
|
|
services.prometheus.exporters = {
|
|
exportarr-prowlarr = {
|
|
enable = true;
|
|
url = "http://arr.internal:9696";
|
|
port = 9701;
|
|
user = "exportarr";
|
|
group = "exportarr";
|
|
apiKeyFile = config.age.secrets.prowlarr-apiKey.path;
|
|
};
|
|
exportarr-radarr = {
|
|
enable = true;
|
|
url = "http://arr.internal:7878";
|
|
port = 9702;
|
|
user = "exportarr";
|
|
group = "exportarr";
|
|
apiKeyFile = config.age.secrets.radarr-apiKey.path;
|
|
};
|
|
exportarr-sonarr = {
|
|
enable = true;
|
|
url = "http://arr.internal:8989";
|
|
port = 9703;
|
|
user = "exportarr";
|
|
group = "exportarr";
|
|
apiKeyFile = config.age.secrets.sonarr-apiKey.path;
|
|
};
|
|
exportarr-lidarr = {
|
|
enable = true;
|
|
url = "http://arr.internal:8686";
|
|
port = 9704;
|
|
user = "exportarr";
|
|
group = "exportarr";
|
|
apiKeyFile = config.age.secrets.lidarr-apiKey.path;
|
|
};
|
|
exportarr-readarr = {
|
|
enable = true;
|
|
url = "http://arr.internal:8787";
|
|
port = 9705;
|
|
user = "exportarr";
|
|
group = "exportarr";
|
|
apiKeyFile = config.age.secrets.readarr-apiKey.path;
|
|
};
|
|
};
|
|
})
|
|
|
|
];
|
|
}
|