temporarily disabled transmission.

This commit is contained in:
Gabe Venberg 2025-05-03 13:49:44 +02:00
parent fe87cf397e
commit 478d5760bd
2 changed files with 56 additions and 56 deletions

View file

@ -116,14 +116,14 @@ in {
description = "Torrent webUI"; description = "Torrent webUI";
}; };
} }
{ # {
Transmission = { # Transmission = {
icon = "sh-transmission.svg"; # icon = "sh-transmission.svg";
href = "http:cirrostratus:9090"; # href = "http:cirrostratus:9091";
siteMonitor = "http:cirrostratus:9091"; # siteMonitor = "http:cirrostratus:9091";
description = "Torrent webUI"; # description = "Torrent webUI";
}; # };
} # }
{ {
Syncthing = { Syncthing = {
icon = "sh-syncthing.svg"; icon = "sh-syncthing.svg";

View file

@ -104,52 +104,52 @@ in {
}; };
}; };
#transmission, another torrent client. #transmission, another torrent client.
services.transmission = { # services.transmission = {
enable = true; # enable = true;
package = pkgs.transmission_4; # package = pkgs.transmission_4;
user = user; # user = user;
group = group; # group = group;
openPeerPorts = true; # openPeerPorts = true;
openRPCPort = true; # openRPCPort = true;
webHome = pkgs.flood-for-transmission; # webHome = pkgs.flood-for-transmission;
settings = { # settings = {
utp-enabled = true; # utp-enabled = true;
watch-dir = "/storage/torrent/watch"; # watch-dir = "/storage/torrent/watch";
watch-dir-enabled = true; # watch-dir-enabled = true;
incomplete-dir = "/storage/torrent/incomplete"; # incomplete-dir = "/storage/torrent/incomplete";
incomplete-dir-enabled = true; # incomplete-dir-enabled = true;
download-dir = "/storage/torrent/complete"; # download-dir = "/storage/torrent/complete";
rpc-bind-address = "100.0.0.0"; # rpc-bind-address = "100.0.0.0/8";
rpc-port = transmissionWebPort; # rpc-port = transmissionWebPort;
rpc-whitelist-enabled = false; # rpc-whitelist-enabled = false;
rpc-host-whitelist-enabled = false; # rpc-host-whitelist-enabled = false;
}; # };
}; # };
systemd.services.transmission = { # systemd.services.transmission = {
# binding transmission to network namespace # # binding transmission to network namespace
bindsTo = ["netns@${namespace}.service"]; # bindsTo = ["netns@${namespace}.service"];
requires = ["network-online.target" "${namespace}.service"]; # requires = ["network-online.target" "${namespace}.service"];
serviceConfig.NetworkNamespacePath = ["/var/run/netns/${namespace}"]; # serviceConfig.NetworkNamespacePath = ["/var/run/netns/${namespace}"];
}; # };
# allowing transmissionweb to access transmission in network namespace, a socket is necesarry # # allowing transmissionweb to access transmission in network namespace, a socket is necesarry
systemd.sockets."proxy-to-transmission" = { # systemd.sockets."proxy-to-transmission" = {
enable = true; # enable = true;
description = "Socket for Proxy to Transmission Daemon"; # description = "Socket for Proxy to Transmission Daemon";
listenStreams = ["${toString transmissionWebPort}"]; # listenStreams = ["${toString transmissionWebPort}"];
wantedBy = ["sockets.target"]; # wantedBy = ["sockets.target"];
}; # };
# creating proxy service on socket, which forwards the same port from the root namespace to the isolated namespace # # creating proxy service on socket, which forwards the same port from the root namespace to the isolated namespace
systemd.services."proxy-to-transmission" = { # systemd.services."proxy-to-transmission" = {
enable = true; # enable = true;
description = "Proxy to Transmission Web UI in Network Namespace"; # description = "Proxy to Transmission Web UI in Network Namespace";
requires = ["transmission.service" "proxy-to-transmission.socket"]; # requires = ["transmission.service" "proxy-to-transmission.socket"];
after = ["transmission.service" "proxy-to-transmission.socket"]; # after = ["transmission.service" "proxy-to-transmission.socket"];
unitConfig = {JoinsNamespaceOf = "transmission.service";}; # unitConfig = {JoinsNamespaceOf = "transmission.service";};
serviceConfig = { # serviceConfig = {
User = user; # User = user;
Group = group; # Group = group;
ExecStart = "${pkgs.systemd}/lib/systemd/systemd-socket-proxyd --exit-idle-time=5min 0.0.0.0:${toString transmissionWebPort}"; # ExecStart = "${pkgs.systemd}/lib/systemd/systemd-socket-proxyd --exit-idle-time=5min 0.0.0.0:${toString transmissionWebPort}";
PrivateNetwork = "yes"; # PrivateNetwork = "yes";
}; # };
}; # };
} }