colin
d13bcc49ab
longer-term, i want hosts/by-name to define host-specific data that's accessible via the other hosts (things like pubkeys). also the secrets management needs some rethinking. there's really not much point in me specifiying where *exactly* a secret comes from at its use site. i should really be specifying secret store manifests; i.e. "servo.yaml contains secrets X Y and Z", and leaving the rest up to auto-computing.
81 lines
2.7 KiB
Nix
81 lines
2.7 KiB
Nix
{ pkgs, ... }:
|
|
|
|
{
|
|
sane.persist.sys.plaintext = [
|
|
# TODO: mode? we need this specifically for the stats tracking in .config/
|
|
{ user = "transmission"; group = "transmission"; directory = "/var/lib/transmission"; }
|
|
];
|
|
services.transmission.enable = true;
|
|
services.transmission.settings = {
|
|
rpc-bind-address = "0.0.0.0";
|
|
#rpc-host-whitelist = "bt.uninsane.org";
|
|
#rpc-whitelist = "*.*.*.*";
|
|
rpc-authentication-required = true;
|
|
rpc-username = "colin";
|
|
# salted pw. to regenerate, set this plaintext, run nixos-rebuild, and then find the salted pw in:
|
|
# /var/lib/transmission/.config/transmission-daemon/settings.json
|
|
rpc-password = "{503fc8928344f495efb8e1f955111ca5c862ce0656SzQnQ5";
|
|
rpc-whitelist-enabled = false;
|
|
|
|
# download-dir = "/opt/uninsane/media/";
|
|
# hopefully, make the downloads world-readable
|
|
umask = 0;
|
|
|
|
# force peer connections to be encrypted
|
|
encryption = 2;
|
|
|
|
# units in kBps
|
|
speed-limit-down = 3000;
|
|
speed-limit-down-enabled = true;
|
|
speed-limit-up = 300;
|
|
speed-limit-up-enabled = true;
|
|
|
|
# see: https://git.zknt.org/mirror/transmission/commit/cfce6e2e3a9b9d31a9dafedd0bdc8bf2cdb6e876?lang=bg-BG
|
|
anti-brute-force-enabled = false;
|
|
|
|
download-dir = "/var/lib/uninsane/media";
|
|
incomplete-dir = "/var/lib/uninsane/media/incomplete";
|
|
|
|
};
|
|
# transmission will by default not allow the world to read its files.
|
|
services.transmission.downloadDirPermissions = "775";
|
|
|
|
systemd.services.transmission.after = [ "wireguard-wg-ovpns.service" ];
|
|
systemd.services.transmission.partOf = [ "wireguard-wg-ovpns.service" ];
|
|
systemd.services.transmission.serviceConfig = {
|
|
# run this behind the OVPN static VPN
|
|
NetworkNamespacePath = "/run/netns/ovpns";
|
|
LogLevelMax = "warning";
|
|
};
|
|
|
|
# service to automatically backup torrents i add to transmission
|
|
systemd.services.backup-torrents = {
|
|
description = "archive torrents to storage not owned by transmission";
|
|
script = ''
|
|
${pkgs.rsync}/bin/rsync -arv /var/lib/transmission/.config/transmission-daemon/torrents/ /var/backup/torrents/
|
|
'';
|
|
};
|
|
systemd.timers.backup-torrents = {
|
|
wantedBy = [ "multi-user.target" ];
|
|
timerConfig = {
|
|
OnStartupSec = "11min";
|
|
OnUnitActiveSec = "240min";
|
|
};
|
|
};
|
|
|
|
# transmission web client
|
|
services.nginx.virtualHosts."bt.uninsane.org" = {
|
|
# basicAuth is literally cleartext user/pw, so FORCE this to happen over SSL
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
# inherit kTLS;
|
|
locations."/" = {
|
|
# proxyPass = "http://ovpns.uninsane.org:9091";
|
|
proxyPass = "http://10.0.1.6:9091";
|
|
};
|
|
};
|
|
|
|
sane.services.trust-dns.zones."uninsane.org".inet.CNAME."bt" = "native";
|
|
}
|
|
|