From ed466b7fef35e7e6ce4eeb80075e9b76151ff029 Mon Sep 17 00:00:00 2001 From: Tristan Helmich Date: Thu, 2 Jun 2016 21:00:00 +0200 Subject: [PATCH] sonarr service: initial service --- nixos/modules/module-list.nix | 1 + nixos/modules/services/misc/sonarr.nix | 44 ++++++++++++++++++++++++++ 2 files changed, 45 insertions(+) create mode 100644 nixos/modules/services/misc/sonarr.nix diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index 04ea1c14e29..ab9e50c20fc 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -258,6 +258,7 @@ ./services/misc/ripple-data-api.nix ./services/misc/rogue.nix ./services/misc/siproxd.nix + ./services/misc/sonarr.nix ./services/misc/spice-vdagentd.nix ./services/misc/subsonic.nix ./services/misc/sundtek.nix diff --git a/nixos/modules/services/misc/sonarr.nix b/nixos/modules/services/misc/sonarr.nix new file mode 100644 index 00000000000..6d96daa6c3d --- /dev/null +++ b/nixos/modules/services/misc/sonarr.nix @@ -0,0 +1,44 @@ +{ config, pkgs, lib, mono, ... }: + +with lib; + +let + cfg = config.services.sonarr; +in +{ + options = { + services.sonarr = { + enable = mkEnableOption "Sonarr"; + }; + }; + + config = mkIf cfg.enable { + systemd.services.sonarr = { + description = "Sonarr"; + after = [ "network.target" ]; + wantedBy = [ "multi-user.target" ]; + preStart = '' + test -d /var/lib/sonarr/ || { + echo "Creating sonarr data directory in /var/lib/sonarr/" + mkdir -p /var/lib/sonarr/ + } + chown -R sonarr /var/lib/sonarr/ + chmod 0700 /var/lib/sonarr/ + ''; + + serviceConfig = { + Type = "simple"; + User = "sonarr"; + Group = "nogroup"; + PermissionsStartOnly = "true"; + ExecStart = "${pkgs.sonarr}/bin/NzbDrone --no-browser"; + Restart = "on-failure"; + }; + }; + + users.extraUsers.sonarr = { + home = "/var/lib/sonarr"; + }; + + }; +}