{ pkgs, ... }: { sane.persist.sys.plaintext = [ # TODO: mode? we need this specifically for the stats tracking in .config/ { user = "transmission"; group = "transmission"; directory = "/var/lib/transmission"; } ]; services.transmission.enable = true; services.transmission.settings = { rpc-bind-address = "0.0.0.0"; #rpc-host-whitelist = "bt.uninsane.org"; #rpc-whitelist = "*.*.*.*"; rpc-authentication-required = true; rpc-username = "colin"; # salted pw. to regenerate, set this plaintext, run nixos-rebuild, and then find the salted pw in: # /var/lib/transmission/.config/transmission-daemon/settings.json rpc-password = "{503fc8928344f495efb8e1f955111ca5c862ce0656SzQnQ5"; rpc-whitelist-enabled = false; # download-dir = "/opt/uninsane/media/"; # hopefully, make the downloads world-readable umask = 0; # force peer connections to be encrypted encryption = 2; # units in kBps speed-limit-down = 3000; speed-limit-down-enabled = true; speed-limit-up = 300; speed-limit-up-enabled = true; # see: https://git.zknt.org/mirror/transmission/commit/cfce6e2e3a9b9d31a9dafedd0bdc8bf2cdb6e876?lang=bg-BG anti-brute-force-enabled = false; download-dir = "/var/lib/uninsane/media"; incomplete-dir = "/var/lib/uninsane/media/incomplete"; }; # transmission will by default not allow the world to read its files. services.transmission.downloadDirPermissions = "775"; systemd.services.transmission.after = [ "wireguard-wg0.service" ]; systemd.services.transmission.partOf = [ "wireguard-wg0.service" ]; systemd.services.transmission.serviceConfig = { # run this behind the OVPN static VPN NetworkNamespacePath = "/run/netns/ovpns"; LogLevelMax = "warning"; }; # service to automatically backup torrents i add to transmission systemd.services.backup-torrents = { description = "archive torrents to storage not owned by transmission"; script = '' ${pkgs.rsync}/bin/rsync -arv /var/lib/transmission/.config/transmission-daemon/torrents/ /var/backup/torrents/ ''; }; systemd.timers.backup-torrents = { wantedBy = [ "multi-user.target" ]; timerConfig = { OnStartupSec = "11min"; OnUnitActiveSec = "240min"; }; }; # transmission web client services.nginx.virtualHosts."bt.uninsane.org" = { # basicAuth is literally cleartext user/pw, so FORCE this to happen over SSL forceSSL = true; enableACME = true; # inherit kTLS; locations."/" = { # proxyPass = "http://ovpns.uninsane.org:9091"; proxyPass = "http://10.0.1.6:9091"; }; }; sane.services.trust-dns.zones."uninsane.org".inet.CNAME."bt" = "native"; }