Skip to content

Commit

Permalink
Added bazarr
Browse files Browse the repository at this point in the history
  • Loading branch information
rasmus-kirk committed Mar 12, 2024
1 parent 31ed200 commit ec65671
Show file tree
Hide file tree
Showing 3 changed files with 92 additions and 0 deletions.
89 changes: 89 additions & 0 deletions nixarr/bazarr/default.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,89 @@
{
config,
lib,
...
}:
with lib; let
cfg = config.nixarr.bazarr;
nixarr = config.nixarr;
in {
options.nixarr.bazarr = {
enable = mkEnableOption "the bazarr service.";

stateDir = mkOption {
type = types.path;
default = "${nixarr.stateDir}/bazarr";
defaultText = literalExpression ''"''${nixarr.stateDir}/bazarr"'';
example = "/home/user/.local/share/nixarr/bazarr";
description = "The state directory for bazarr";
};

vpn.enable = mkOption {
type = types.bool;
default = false;
example = true;
description = ''
**Required options:** [`nixarr.vpn.enable`](#nixarr.vpn.enable)
Route Bazarr traffic through the VPN.
'';
};
};

config = mkIf cfg.enable {
assertions = [
{
assertion = cfg.vpn.enable -> nixarr.vpn.enable;
message = ''
The nixarr.bazarr.vpn.enable option requires the
nixarr.vpn.enable option to be set, but it was not.
'';
}
];

systemd.tmpfiles.rules = [
"d '${cfg.stateDir}' 0700 bazarr root - -"
];

services.bazarr = {
enable = cfg.enable;
user = "bazarr";
group = "media";
dataDir = cfg.stateDir;
};

# Enable and specify VPN namespace to confine service in.
systemd.services.bazarr.vpnconfinement = mkIf cfg.vpn.enable {
enable = true;
vpnnamespace = "wg";
};

# Port mappings
# TODO: openports
vpnnamespaces.wg = mkIf cfg.vpn.enable {
portMappings = [{ from = config.bazarr.listenPort; to = config.bazarr.listenPort; }];
};

services.nginx = mkIf cfg.vpn.enable {
enable = true;

recommendedTlsSettings = true;
recommendedOptimisation = true;
recommendedGzipSettings = true;

virtualHosts."127.0.0.1:${builtins.toString config.bazarr.listenPort}" = {
listen = [
{
addr = "0.0.0.0";
port = config.bazarr.listenPort;
}
];
locations."/" = {
recommendedProxySettings = true;
proxyWebsockets = true;
proxyPass = "http://192.168.15.1:${builtins.toString config.bazarr.listenPort}";
};
};
};
};
}
1 change: 1 addition & 0 deletions nixarr/lidarr/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@
with lib; let
cfg = config.nixarr.lidarr;
nixarr = config.nixarr;
defaultPort = 8686;
in {
options.nixarr.lidarr = {
enable = mkEnableOption "the Lidarr service.";
Expand Down
2 changes: 2 additions & 0 deletions nixarr/nixarr.nix
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,7 @@ with lib; let
in {
imports = [
./jellyfin
./bazarr
./ddns
./radarr
./lidarr
Expand Down Expand Up @@ -53,6 +54,7 @@ in {
The following services are supported:
- [Jellyfin](#nixarr.jellyfin.enable)
- [Bazarr](#nixarr.bazarr.enable)
- [Lidarr](#nixarr.lidarr.enable)
- [Prowlarr](#nixarr.prowlarr.enable)
- [Radarr](#nixarr.radarr.enable)
Expand Down

0 comments on commit ec65671

Please sign in to comment.