2024-05-20 16:27:01 +00:00
|
|
|
{
|
|
|
|
pkgs,
|
|
|
|
config,
|
|
|
|
lib,
|
|
|
|
...
|
|
|
|
}:
|
|
|
|
let
|
|
|
|
cfg = config.host.services.airsonic;
|
|
|
|
in
|
|
|
|
{
|
|
|
|
options = {
|
|
|
|
host.services.airsonic = {
|
2024-05-21 00:52:57 +00:00
|
|
|
autostart = lib.mkEnableOption (lib.mdDoc "Automatically starts Airsonic at boot.");
|
2024-05-20 16:27:01 +00:00
|
|
|
enable = lib.mkEnableOption (lib.mdDoc "Enables Airsonic Advanced media streaming service.");
|
|
|
|
home = lib.mkOption {
|
2024-05-21 13:22:03 +00:00
|
|
|
default = "";
|
2024-05-20 16:27:01 +00:00
|
|
|
type = lib.types.str;
|
|
|
|
description = "Where to store Airsonic's files";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
config = lib.mkIf cfg.enable {
|
|
|
|
host.users.media.enable = true;
|
|
|
|
users.users.airsonic.extraGroups = [ "media" ];
|
|
|
|
|
|
|
|
services = {
|
2024-05-22 19:39:57 +00:00
|
|
|
nginx.virtualHosts."${config.secrets.services.airsonic.url}" = {
|
|
|
|
useACMEHost = config.secrets.networking.primaryDomain;
|
2024-05-20 16:27:01 +00:00
|
|
|
forceSSL = true;
|
|
|
|
locations."/" = {
|
|
|
|
proxyPass = "http://127.0.0.1:4040";
|
|
|
|
proxyWebsockets = true;
|
|
|
|
extraConfig = "proxy_ssl_server_name on;";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
airsonic = {
|
|
|
|
enable = true;
|
|
|
|
war = "${
|
|
|
|
(pkgs.callPackage ../../packages/airsonic-advanced.nix { inherit lib; })
|
|
|
|
}/webapps/airsonic.war";
|
|
|
|
port = 4040;
|
|
|
|
jre = pkgs.jdk17;
|
|
|
|
jvmOptions = [
|
|
|
|
"-Dserver.use-forward-headers=true"
|
|
|
|
"-Xmx4G" # Increase Java heap size to 4GB
|
|
|
|
];
|
2024-05-24 03:50:42 +00:00
|
|
|
} // lib.optionalAttrs (cfg.home != "") { home = cfg.home; };
|
2024-05-20 16:27:01 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
systemd.services = {
|
|
|
|
nginx.wants = [ config.systemd.services.airsonic.name ];
|
2024-05-21 00:52:57 +00:00
|
|
|
} // lib.optionalAttrs (!cfg.autostart) { airsonic.wantedBy = lib.mkForce [ ]; };
|
2024-05-20 16:27:01 +00:00
|
|
|
};
|
|
|
|
}
|