Services: ok ok wait, let's try qBittorrent instead
This commit is contained in:
parent
c6506685ba
commit
a374b25753
|
@ -378,10 +378,11 @@
|
||||||
"secrets": {
|
"secrets": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"dirtyRev": "9821d2162d2e2ee58ff65e12c986ef3a8f105058-dirty",
|
"lastModified": 1726013505,
|
||||||
"dirtyShortRev": "9821d21-dirty",
|
"narHash": "sha256-0xzIUXzp3P5sUVB2XLmtxXoxleqHdSw9j/hpbcOCpRg=",
|
||||||
"lastModified": 1725996724,
|
"ref": "refs/heads/main",
|
||||||
"narHash": "sha256-xL7dP5DVkG56pbY9wSJ8v9gpCjtA7UfXC6MwttF8teE=",
|
"rev": "75970a6034cc961a749d07d9c51ef9f8f8f48848",
|
||||||
|
"revCount": 73,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "file:./secrets"
|
"url": "file:./secrets"
|
||||||
},
|
},
|
||||||
|
|
|
@ -20,13 +20,11 @@ let
|
||||||
|
|
||||||
# List of subdomains to add to the TLS certificate
|
# List of subdomains to add to the TLS certificate
|
||||||
subdomains = with config.secrets.services; [
|
subdomains = with config.secrets.services; [
|
||||||
deluge.url
|
|
||||||
forgejo.url
|
forgejo.url
|
||||||
gremlin-lab.url
|
gremlin-lab.url
|
||||||
home-assistant.url
|
|
||||||
jellyfin.url
|
jellyfin.url
|
||||||
netdata.url
|
netdata.url
|
||||||
transmission.url
|
qbittorrent.url
|
||||||
];
|
];
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
@ -188,6 +186,11 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
qbittorrent = {
|
||||||
|
enable = true;
|
||||||
|
home = "${services-root}/qbittorrent";
|
||||||
|
url = config.secrets.services.qbittorrent.url;
|
||||||
|
};
|
||||||
ssh = {
|
ssh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
ports = [ config.secrets.hosts.dimaga.ssh.port ];
|
ports = [ config.secrets.hosts.dimaga.ssh.port ];
|
||||||
|
|
111
modules/services/qbittorrent.nix
Normal file
111
modules/services/qbittorrent.nix
Normal file
|
@ -0,0 +1,111 @@
|
||||||
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
|
||||||
|
let
|
||||||
|
cfg = config.aux.system.services.qbittorrent;
|
||||||
|
UID = 850;
|
||||||
|
GID = 850;
|
||||||
|
package = pkgs.qbittorrent;
|
||||||
|
port = 8080;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options = {
|
||||||
|
aux.system.services.qbittorrent = {
|
||||||
|
enable = lib.mkEnableOption "Enables qBittorrent.";
|
||||||
|
home = lib.mkOption {
|
||||||
|
default = "/var/lib/qbittorrent";
|
||||||
|
type = lib.types.str;
|
||||||
|
description = "Where to store qBittorrent's files";
|
||||||
|
};
|
||||||
|
url = lib.mkOption {
|
||||||
|
default = "";
|
||||||
|
type = lib.types.str;
|
||||||
|
description = "The complete URL where qBittorrent is hosted.";
|
||||||
|
example = "https://qbittorrent.example.com";
|
||||||
|
};
|
||||||
|
user = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
default = "qbittorrent";
|
||||||
|
description = "User account under which qBittorrent runs.";
|
||||||
|
};
|
||||||
|
group = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
default = "qbittorrent";
|
||||||
|
description = "Group under which qBittorrent runs.";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
services = {
|
||||||
|
nginx.virtualHosts."${cfg.url}" = {
|
||||||
|
useACMEHost = pkgs.util.getDomainFromURL cfg.url;
|
||||||
|
forceSSL = true;
|
||||||
|
locations."/" = {
|
||||||
|
proxyPass = "http://127.0.0.1:8080";
|
||||||
|
extraConfig = ''
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-Host $host;
|
||||||
|
proxy_set_header X-Forwarded-Server $host;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwnoxarded_for;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services.qbittorrent = {
|
||||||
|
# based on the plex.nix service module and
|
||||||
|
# https://github.com/qbittorrent/qBittorrent/blob/master/dist/unix/systemd/qbittorrent-nox%40.service.in
|
||||||
|
description = "qBittorrent service";
|
||||||
|
documentation = [ "man:qbittorrent(1)" ];
|
||||||
|
after = [ "network.target" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
unitConfig.RequiresMountsFor = cfg.home;
|
||||||
|
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "simple";
|
||||||
|
User = cfg.user;
|
||||||
|
Group = cfg.group;
|
||||||
|
|
||||||
|
# Run the pre-start script with full permissions (the "!" prefix) so it
|
||||||
|
# can create the data directory if necessary.
|
||||||
|
ExecStartPre =
|
||||||
|
let
|
||||||
|
preStartScript = pkgs.writeScript "qbittorrent-run-prestart" ''
|
||||||
|
#!${pkgs.bash}/bin/bash
|
||||||
|
|
||||||
|
# Create data directory if it doesn't exist
|
||||||
|
if ! test -d "$QBT_PROFILE"; then
|
||||||
|
echo "Creating initial qBittorrent data directory in: $QBT_PROFILE"
|
||||||
|
install -d -m 0755 -o "${cfg.user}" -g "${cfg.group}" "$QBT_PROFILE"
|
||||||
|
fi
|
||||||
|
'';
|
||||||
|
in
|
||||||
|
"!${preStartScript}";
|
||||||
|
ExecStart = "${package}/bin/qbittorrent";
|
||||||
|
};
|
||||||
|
|
||||||
|
environment = {
|
||||||
|
QBT_PROFILE = cfg.home;
|
||||||
|
QBT_WEBUI_PORT = toString port;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
users = {
|
||||||
|
users.${cfg.user} = {
|
||||||
|
description = "qBittorrent user";
|
||||||
|
isNormalUser = false;
|
||||||
|
group = cfg.group;
|
||||||
|
uid = UID;
|
||||||
|
};
|
||||||
|
groups.${cfg.group}.gid = GID;
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services.nginx.wants = [ config.systemd.services.qbittorrent.name ];
|
||||||
|
};
|
||||||
|
}
|
2
secrets
2
secrets
|
@ -1 +1 @@
|
||||||
Subproject commit b086ea560a8c5e2266b70710c6c2478a010f4c59
|
Subproject commit 75970a6034cc961a749d07d9c51ef9f8f8f48848
|
Loading…
Reference in a new issue