blob: 87ecc1e19e8e10959af4ae27855ed4ca9f2922ec (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
|
{ config, lib, pkgs, ... }:
let
basicAuth = import <torrent-secrets/auth.nix>;
peer-port = 51412;
web-port = 8112;
daemon-port = 58846;
dldir = config.makefu.dl-dir;
in {
services.rtorrent = {
enable = true;
user = "rtorrent";
port = peer-port;
openFirewall = true;
group = "download";
downloadDir = dldir;
configText = ''
schedule2 = watch_start, 10, 10, ((load.start, (cat, (cfg.watch), "/media/cloud/watch/*.torrent")))
'';
};
systemd.services.flood = {
wantedBy = [ "multi-user.target" ];
wants = [ "rtorrent.service" ];
after = [ "rtorrent.service" ];
serviceConfig = {
User = "rtorrent";
ExecStart = "${pkgs.nodePackages.flood}/bin/flood --auth none --port ${toString web-port} --rtsocket ${config.services.rtorrent.rpcSocket}";
};
};
#security.acme.certs."torrent.${config.krebs.build.host.name}.r".server = config.krebs.ssl.acmeURL;
services.nginx = {
enable = true;
virtualHosts."torrent.${config.krebs.build.host.name}.r" = {
# TODO
inherit basicAuth;
#enableACME = true;
#addSSL = true;
root = "${pkgs.nodePackages.flood}/lib/node_modules/flood/dist/assets";
locations."/api".extraConfig = ''
proxy_pass http://localhost:${toString web-port};
'';
locations."/".extraConfig = ''
try_files $uri /index.html;
'';
};
};
}
|