ee68e27f15
Hi, I tried adding [Audiobookshelf](https://www.audiobookshelf.org/) as a new service to SHB. Not sure whether you want this service in SHB at all, but thought I'd create a PR just in case. The service runs, but seemingly fails to add an entry to the nginx config, so it is not reachable. I created the service by basically just copying deluge and then adapting. Any idea why the nginx subdomain isn't being created? The config I used to add this to my SHB server is: ```nix shb.audiobookshelf = { enable = true; domain = "sliper.xyz"; subdomain = "abs"; dataDir = "audiobookshelf"; #turns out this is actually the working dir of the service (/var/lib/<dataDir>) authEndpoint = "https://auth.sliper.xyz"; }; // ... in shb.authelia.oidcClients redirect_uris = [ "https://deluge.sliper.xyz" "https://abs.sliper.xyz" ]; ``` ps. I also need to fix tabs->spaces. Forgot to set up nvim. --------- Co-authored-by: sivert <nei@nei.nei> Co-authored-by: ibizaman <ibizapeanut@gmail.com> Co-authored-by: Pierre Penninckx <github@pierre.tiserbox.com>
160 lines
4.7 KiB
Nix
160 lines
4.7 KiB
Nix
{ config, pkgs, lib, ... }:
|
|
|
|
let
|
|
cfg = config.shb.audiobookshelf;
|
|
|
|
contracts = pkgs.callPackage ../contracts {};
|
|
|
|
fqdn = "${cfg.subdomain}.${cfg.domain}";
|
|
in
|
|
{
|
|
options.shb.audiobookshelf = {
|
|
enable = lib.mkEnableOption "selfhostblocks.audiobookshelf";
|
|
|
|
subdomain = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = "Subdomain under which audiobookshelf will be served.";
|
|
example = "abs";
|
|
};
|
|
|
|
domain = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = "domain under which audiobookshelf will be served.";
|
|
example = "mydomain.com";
|
|
};
|
|
|
|
webPort = lib.mkOption {
|
|
type = lib.types.int;
|
|
description = "Audiobookshelf web port";
|
|
default = 8113;
|
|
};
|
|
|
|
ssl = lib.mkOption {
|
|
description = "Path to SSL files";
|
|
type = lib.types.nullOr contracts.ssl.certs;
|
|
default = null;
|
|
};
|
|
|
|
extraServiceConfig = lib.mkOption {
|
|
type = lib.types.attrsOf lib.types.str;
|
|
description = "Extra configuration given to the systemd service file.";
|
|
default = {};
|
|
example = lib.literalExpression ''
|
|
{
|
|
MemoryHigh = "512M";
|
|
MemoryMax = "900M";
|
|
}
|
|
'';
|
|
};
|
|
|
|
oidcProvider = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = "OIDC provider name";
|
|
default = "Authelia";
|
|
};
|
|
|
|
authEndpoint = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = "OIDC endpoint for SSO";
|
|
example = "https://authelia.example.com";
|
|
};
|
|
|
|
oidcClientID = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = "Client ID for the OIDC endpoint";
|
|
default = "audiobookshelf";
|
|
};
|
|
|
|
oidcAdminUserGroup = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = "OIDC admin group";
|
|
default = "audiobookshelf_admin";
|
|
};
|
|
|
|
oidcUserGroup = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = "OIDC user group";
|
|
default = "audiobookshelf_user";
|
|
};
|
|
|
|
ssoSecretFile = lib.mkOption {
|
|
type = lib.types.path;
|
|
description = "File containing the SSO shared secret.";
|
|
};
|
|
|
|
logLevel = lib.mkOption {
|
|
type = lib.types.nullOr (lib.types.enum ["critical" "error" "warning" "info" "debug"]);
|
|
description = "Enable logging.";
|
|
default = false;
|
|
example = true;
|
|
};
|
|
};
|
|
|
|
config = lib.mkIf cfg.enable (lib.mkMerge [{
|
|
|
|
services.audiobookshelf = {
|
|
enable = true;
|
|
openFirewall = true;
|
|
dataDir = "audiobookshelf";
|
|
host = "127.0.0.1";
|
|
port = cfg.webPort;
|
|
};
|
|
|
|
services.nginx.enable = true;
|
|
services.nginx.virtualHosts."${fqdn}" = {
|
|
http2 = true;
|
|
forceSSL = !(isNull cfg.ssl);
|
|
sslCertificate = lib.mkIf (!(isNull cfg.ssl)) cfg.ssl.paths.cert;
|
|
sslCertificateKey = lib.mkIf (!(isNull cfg.ssl)) cfg.ssl.paths.key;
|
|
|
|
# https://github.com/advplyr/audiobookshelf#nginx-reverse-proxy
|
|
extraConfig = ''
|
|
set $audiobookshelf 127.0.0.1;
|
|
location / {
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
proxy_set_header X-Forwarded-Proto $scheme;
|
|
proxy_set_header Host $host;
|
|
proxy_set_header Upgrade $http_upgrade;
|
|
proxy_set_header Connection "upgrade";
|
|
|
|
proxy_http_version 1.1;
|
|
|
|
proxy_pass http://$audiobookshelf:${builtins.toString cfg.webPort};
|
|
proxy_redirect http:// https://;
|
|
}
|
|
'';
|
|
};
|
|
|
|
shb.authelia.oidcClients = [
|
|
{
|
|
id = cfg.oidcClientID;
|
|
description = "Audiobookshelf";
|
|
secret.source = cfg.ssoSecretFile;
|
|
public = false;
|
|
authorization_policy = "one_factor";
|
|
redirect_uris = [
|
|
"https://${cfg.subdomain}.${cfg.domain}/auth/openid/callback"
|
|
"https://${cfg.subdomain}.${cfg.domain}/auth/openid/mobile-redirect"
|
|
];
|
|
}
|
|
];
|
|
|
|
# We want audiobookshelf to create files in the media group and to make those files group readable.
|
|
users.users.audiobookshelf = {
|
|
extraGroups = [ "media" ];
|
|
};
|
|
systemd.services.audiobookshelfd.serviceConfig.Group = lib.mkForce "media";
|
|
systemd.services.audiobookshelfd.serviceConfig.UMask = lib.mkForce "0027";
|
|
|
|
# We backup the whole audiobookshelf directory and set permissions for the backup user accordingly.
|
|
users.groups.audiobookshelf.members = [ "backup" ];
|
|
users.groups.media.members = [ "backup" ];
|
|
shb.backup.instances.audiobookshelf = {
|
|
sourceDirectories = [
|
|
/var/lib/${config.services.audiobookshelf.dataDir}
|
|
];
|
|
};
|
|
} {
|
|
systemd.services.audiobookshelfd.serviceConfig = cfg.extraServiceConfig;
|
|
}]);
|
|
}
|