From 3cf42db7dc0b263fa4276890173cfb7f1151382e Mon Sep 17 00:00:00 2001 From: Colin Date: Tue, 26 Mar 2024 10:14:51 +0000 Subject: [PATCH] slskd: fix for more recent nixpkgs --- hosts/by-name/servo/services/slskd.nix | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/hosts/by-name/servo/services/slskd.nix b/hosts/by-name/servo/services/slskd.nix index 8d1a5a0a..292ef1b3 100644 --- a/hosts/by-name/servo/services/slskd.nix +++ b/hosts/by-name/servo/services/slskd.nix @@ -6,7 +6,7 @@ { config, lib, ... }: { sane.persist.sys.byStore.plaintext = [ - { user = "slskd"; group = "slskd"; path = "/var/lib/slskd"; method = "bind"; } + { user = "slskd"; group = "media"; path = "/var/lib/slskd"; method = "bind"; } ]; sops.secrets."slskd_env" = { owner = config.users.users.slskd.name; @@ -15,7 +15,7 @@ users.users.slskd.extraGroups = [ "media" ]; - sane.ports.ports."50000" = { + sane.ports.ports."50300" = { protocol = [ "tcp" ]; # not visible to WAN: i run this in a separate netns visibleTo.ovpn = true; @@ -28,12 +28,14 @@ forceSSL = true; enableACME = true; locations."/" = { - proxyPass = "http://10.0.1.6:5001"; + proxyPass = "http://10.0.1.6:5030"; proxyWebsockets = true; }; }; services.slskd.enable = true; + services.slskd.domain = null; # i'll manage nginx for it + services.slskd.group = "media"; # env file, for auth (SLSKD_SLSK_PASSWORD, SLSKD_SLSK_USERNAME) services.slskd.environmentFile = config.sops.secrets.slskd_env.path; services.slskd.settings = { @@ -68,7 +70,6 @@ NetworkNamespacePath = "/run/netns/ovpns"; Restart = lib.mkForce "always"; # exits "success" when it fails to connect to soulseek server RestartSec = "60s"; - Group = "media"; }; }; }