]> Git — Sourcephile - sourcephile-nix.git/blob - hosts/losurdo/transmission.nix
sftp: tweak permissions
[sourcephile-nix.git] / hosts / losurdo / transmission.nix
1 { pkgs, lib, config, hostName, inputs, ... }:
2 let
3 inherit (config.services) transmission;
4 inherit (config.users) users;
5 inherit (config.security) gnupg;
6 netns = "riseup";
7 wg-intra-peers = import (inputs.julm-nix + "/nixos/profiles/wireguard/wg-intra/peers.nix");
8 in
9 {
10 users.groups.transmission.members = [
11 users."julm".name
12 users."sevy".name
13 ];
14 services.netns.namespaces.${netns}.nftables = ''
15 add rule inet filter input tcp dport ${toString transmission.settings.peer-port} counter accept comment "Transmission"
16 add rule inet filter input udp dport ${toString transmission.settings.peer-port} counter accept comment "Transmission"
17 add rule inet filter output meta skuid ${transmission.user} counter accept comment "Transmission"
18 '';
19 #users.groups.keys.members = [ transmission.user ];
20 security.gnupg.secrets."transmission/settings.json" = {
21 user = transmission.user;
22 systemdConfig.before = [ "transmission.service" ];
23 systemdConfig.wantedBy = [ "transmission.service" ];
24 };
25 fileSystems."/var/lib/transmission" = {
26 device = "${hostName}/var/torrents";
27 fsType = "zfs";
28 };
29 systemd.services.transmission = {
30 after = [
31 "netns-${netns}.service"
32 "zfs.target"
33 ];
34 requires = [
35 "netns-${netns}.service"
36 "zfs.target"
37 ];
38 startAt = "20:00:00";
39 serviceConfig.NetworkNamespacePath = "/var/run/netns/${netns}";
40 };
41 systemd.sockets.proxy-to-transmission = {
42 wantedBy = ["sockets.target"];
43 listenStreams = ["${wg-intra-peers.${hostName}.ipv4}:9091"];
44 socketConfig.FreeBind = true;
45 };
46 systemd.services.proxy-to-transmission = {
47 requires = ["transmission.service"];
48 after = ["transmission.service" "proxy-to-transmission.socket"];
49 unitConfig.JoinsNamespaceOf = ["transmission.service"];
50 serviceConfig = {
51 ExecStart = "${pkgs.systemd}/lib/systemd/systemd-socket-proxyd 127.0.0.1:9091";
52 PrivateNetwork = true;
53 PrivateTmp = true;
54 };
55 };
56 systemd.services.stop-transmission = {
57 serviceConfig.Type = "oneshot";
58 unitConfig.Conflicts = ["transmission.service"];
59 startAt = "06..19:0,15,30,45:00";
60 script = "true";
61 };
62 services.transmission = {
63 enable = true;
64 performanceNetParameters = true;
65 credentialsFile = gnupg.secrets."transmission/settings.json".path;
66 settings = {
67 message-level = 2;
68 download-dir = "/var/lib/transmission/downloaded";
69 incomplete-dir = "/var/lib/transmission/.incoming";
70 incomplete-dir-enabled = true;
71 watch-dir = "/var/lib/transmission/.torrents";
72 watch-dir-enabled = true;
73 trash-original-torrent-files = false;
74 preallocation = 0;
75 umask = 7; # 007 octal, in decimal!
76 download-queue-enabled = true;
77 download-queue-size = 5;
78 peer-id-ttl-hours = 6;
79 peer-limit-global = 1000;
80 peer-limit-per-torrent = 100;
81
82 peer-port = 6882;
83 peer-port-random-on-start = false;
84 encryption = 1;
85 dht-enabled = true;
86 lpd-enabled = false;
87 pex-enabled = true;
88 port-forwarding-enabled = true;
89 scrape-paused-torrents-enabled = false;
90 peer-socket-tos = "lowcost";
91 queue-stalled-enabled = true;
92 queue-stalled-minutes = 30;
93 speed-limit-down-enabled = false;
94 speed-limit-up = 50;
95 speed-limit-up-enabled = true;
96 alt-speed-enabled = true;
97 alt-speed-time-enabled = true;
98 alt-speed-down = 1000;
99 alt-speed-up = 0;
100 alt-speed-time-day = 127; # all days. 65; # weekend only
101 alt-speed-time-begin = 360; # 06h00 local time
102 alt-speed-time-end = 1260; # 21h00 local time
103 ratio-limit = 4;
104 ratio-limit-enabled = true;
105
106 rpc-enabled = true;
107 rpc-bind-address = "127.0.0.1";
108 rpc-port = 9091;
109 rpc-whitelist = "127.0.0.1,${wg-intra-peers.${hostName}.ipv4}/24";
110 rpc-whitelist-enabled = true;
111 rpc-host-whitelist = "localhost,${hostName}.wg";
112 rpc-host-whitelist-enabled = true;
113 rpc-authentication-required = true;
114 };
115 };
116 }