bazarr, lidarr, deluge, sonarr, radarr: Switch to nginx client for openid

This commit is contained in:
Giulio De Pasquale 2022-11-11 19:08:57 +01:00
parent 8118462f59
commit bf117df531
5 changed files with 18 additions and 32 deletions

View File

@ -3,8 +3,9 @@
let let
domain = "htbaz.giugl.io"; domain = "htbaz.giugl.io";
network = import ./network.nix; network = import ./network.nix;
auth_block = (import ./openid.nix).openresty_oidc_block; auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
in { in
{
services = { services = {
bazarr = { bazarr = {
enable = true; enable = true;
@ -15,12 +16,9 @@ in {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
proxyPass = "http://localhost:6767"; proxyPass = "http://127.0.0.1:6767";
extraConfig = auth_block { extraConfig = auth_block {
realm = "master"; access_role = "bazarr";
client_id = "bazarr";
client_secret = "OPn4Mmto2m3dDPji1cjPfHy9W55M9JFq";
redirect_uri = "https://${domain}";
}; };
}; };
}; };

View File

@ -3,7 +3,7 @@
let let
domain = "htdel.giugl.io"; domain = "htdel.giugl.io";
network = import ./network.nix; network = import ./network.nix;
auth_block = (import ./openid.nix).openresty_oidc_block; auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
in { in {
services = { services = {
deluge = { deluge = {
@ -22,7 +22,7 @@ in {
max_active_seeding = 100; max_active_seeding = 100;
max_connections_global = 1000; max_connections_global = 1000;
max_active_limit = 100; max_active_limit = 100;
max_active_downloading = 100; max_active_downloading = 100;
listen_ports = [ 51413 51414 ]; listen_ports = [ 51413 51414 ];
random_port = false; random_port = false;
enabled_plugins = [ "Label" "Extractor" ]; enabled_plugins = [ "Label" "Extractor" ];
@ -37,12 +37,9 @@ in {
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
proxyPass = "http://localhost:8112"; proxyPass = "http://127.0.0.1:8112";
extraConfig = auth_block { extraConfig = auth_block {
realm = "master"; access_role = "deluge";
client_id = "deluge";
client_secret = "AGa1U9S1zkaM3TJVxtyx4Er76DBk1APR";
redirect_uri = "https://${domain}";
}; };
}; };
}; };

View File

@ -3,7 +3,7 @@
let let
domain = "htlid.giugl.io"; domain = "htlid.giugl.io";
network = import ./network.nix; network = import ./network.nix;
auth_block = (import ./openid.nix).openresty_oidc_block; auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
in { in {
services = { services = {
lidarr = { lidarr = {
@ -15,12 +15,9 @@ in {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
proxyPass = "http://localhost:8686"; proxyPass = "http://127.0.0.1:8686";
extraConfig = auth_block { extraConfig = auth_block {
realm = "master"; access_role = "lidarr";
client_id = "lidarr";
client_secret = "7s4dd1SEi84F4fUFsqRaQmSSucZhyTco";
redirect_uri = "https://${domain}";
}; };
}; };
}; };

View File

@ -3,7 +3,7 @@
let let
domain = "htrad.giugl.io"; domain = "htrad.giugl.io";
network = import ./network.nix; network = import ./network.nix;
auth_block = (import ./openid.nix).openresty_oidc_block; auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
in { in {
services = { services = {
radarr = { radarr = {
@ -15,12 +15,9 @@ in {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
proxyPass = "http://localhost:7878"; proxyPass = "http://127.0.0.1:7878";
extraConfig = auth_block { extraConfig = auth_block {
realm = "master"; access_role = "radarr";
client_id = "radarr";
client_secret = "DCoeN4PwqGrAoG6Mqw73orrUjojJ1fmn";
redirect_uri = "https://${domain}";
}; };
}; };
}; };

View File

@ -3,7 +3,7 @@
let let
domain = "htson.giugl.io"; domain = "htson.giugl.io";
network = import ./network.nix; network = import ./network.nix;
auth_block = (import ./openid.nix).openresty_oidc_block; auth_block = (import ./openid.nix { inherit lib; }).openresty_oidc_block;
in { in {
services = { services = {
sonarr = { sonarr = {
@ -15,12 +15,9 @@ in {
forceSSL = true; forceSSL = true;
enableACME = true; enableACME = true;
locations."/" = { locations."/" = {
proxyPass = "http://localhost:8989"; proxyPass = "http://127.0.0.1:8989";
extraConfig = auth_block { extraConfig = auth_block {
realm = "master"; access_role = "sonarr";
client_id = "sonarr";
client_secret = "d36ehMSPCI3xLfOGNcnSUKZWQblyGumi";
redirect_uri = "https://${domain}";
}; };
}; };
}; };