Compare commits

...

2 Commits

2 changed files with 67 additions and 15 deletions

View File

@ -2,10 +2,10 @@
let let
cfg = config.services.qbittorrent-nox; cfg = config.services.qbittorrent-nox;
cfgPath = "/var/lib/qbittorrent/.config/qBittorrent/qBittorrent.conf";
path = "/var/lib/qbittorrent"; path = "/var/lib/qbittorrent";
cfgPath = "${path}/.config/qBittorrent/qBittorrent.conf";
configurationFile = lib.writeText "${cfgPath}" '' configurationFile = pkgs.writeText "qbittorrent-nox.conf" ''
[Application] [Application]
FileLogger\Age=${toString cfg.Filelogger.age} FileLogger\Age=${toString cfg.Filelogger.age}
FileLogger\AgeType=${toString cfg.Filelogger.ageType} FileLogger\AgeType=${toString cfg.Filelogger.ageType}
@ -24,7 +24,7 @@ let
Session\BTProtocol=${cfg.BTProtocol} Session\BTProtocol=${cfg.BTProtocol}
Session\BandwidthSchedulerEnabled=${toString cfg.BandwidthSchedulerEnabled} Session\BandwidthSchedulerEnabled=${toString cfg.BandwidthSchedulerEnabled}
Session\DefaultSavePath=${cfg.DefaultSavePath} Session\DefaultSavePath=${cfg.DefaultSavePath}
Session\Encryption=${ lib.mkIf cfg.Encryption "1" "0" } Session\Encryption=${toString cfg.Encryption }
Session\ExcludedFileNames=${cfg.ExcludedFileNames} Session\ExcludedFileNames=${cfg.ExcludedFileNames}
Session\FinishedTorrentExportDirectory=${cfg.FinishedTorrentExportDirectory} Session\FinishedTorrentExportDirectory=${cfg.FinishedTorrentExportDirectory}
Session\GlobalDLSpeedLimit=${toString cfg.GlobalDLSpeedLimit} Session\GlobalDLSpeedLimit=${toString cfg.GlobalDLSpeedLimit}
@ -190,8 +190,9 @@ in
}; };
Encryption = lib.mkOption { Encryption = lib.mkOption {
type = lib.types.bool; type = lib.types.int;
default = true; default = 1;
example = "0";
description = "Enable encryption."; description = "Enable encryption.";
}; };
@ -439,12 +440,6 @@ in
default = false; default = false;
description = "RSS Session enable processing."; description = "RSS Session enable processing.";
}; };
configFile = lib.mkOption {
type = lib.types.path;
default = "${cfgPath}";
description = "Path to qbittorrent-nox configuration file.";
};
}; };
@ -455,8 +450,8 @@ in
users.users = lib.mkIf (cfg.user == "qbittorrent") { users.users = lib.mkIf (cfg.user == "qbittorrent") {
qbittorrent = { qbittorrent = {
isSystemUser = true; isNormalUser = true;
home = "/var/lib/qbittorrent"; home = path;
group = cfg.group; group = cfg.group;
}; };
}; };
@ -464,9 +459,11 @@ in
qbittorrent = {}; qbittorrent = {};
}; };
systemd.services."qbittorrent-nox@" ={ systemd.services."qbittorrent-nox" ={
serviceConfig = { serviceConfig = {
ExecStart = "qbittorrent-nox -d --configuration=${cfg.configFile}"; #create the configuration file from string using echo
ExecStartPre = "${pkgs.coreutils}/bin/cat ${configurationFile}";
ExecStart = "${pkgs.qbittorrent-nox}/bin/qbittorrent-nox --configuration=${configurationFile}";
User = cfg.user; User = cfg.user;
Group = cfg.group; Group = cfg.group;
Restart = "on-failure"; Restart = "on-failure";

55
services/torrent.nix Normal file
View File

@ -0,0 +1,55 @@
{ config, lib, pkgs, options, ... }:
let
port = 8090;
torrentPort = 44183;
savePath = "/Main/Data/media/Downloads/";
path = "/var/lib/qbittorrent";
in
{
networking.firewall.allowedTCPPorts = [ port torrentPort];
networking.firewall.allowedUDPPorts = [ port torrentPort];
users.users.qbittorrent = {
isNormalUser = true; #make this a normal user to be able to make files
home = path;
group = "qbittorrent";
};
users.groups.qbittorrent = {};
systemd.services."qbittorrent-nox" ={
after = [ "network.target" ];
#environment.HOME = "/var/lib/qbittorrent";
serviceConfig = {
ExecStartPre = "${pkgs.coreutils}/bin/mkdir -p ${path}";
ExecStart = "${pkgs.qbittorrent-nox}/bin/qbittorrent-nox --webui-port=${toString port} --torrenting-port=${toString torrentPort} --save-path=${savePath}";
User = "qbittorrent";
Group = "qbittorrent";
Restart = "on-failure";
DynamicUser = true;
InaccessiblePaths = [ "/home" "/root" "/run" "/boot" "/etc" "/proc" "/sys" "/usr" "/lib" "/bin" "/sbin" "/srv" "/opt" ];
# Security options
PrivateTmp = true;
ProtectSystem = "full";
ProtectKernelTunables = true;
ProtectKernelModules = true;
ProtectControlGroups = true;
NoNewPrivileges = true;
ProtectHome = true;
PrivateDevices = true;
};
};
}