Add transmission

This commit is contained in:
Johannes Rothe 2025-04-02 19:17:56 +02:00
parent d1f430db0d
commit be6c605f38

View File

@ -306,6 +306,11 @@
reverse_proxy lidarr:${builtins.toString config.containers.lidarr.config.services.lidarr.settings.server.port}
'';
};
"https://transmission.dalinar.home.johannes-rothe.de" = {
extraConfig = ''
reverse_proxy lidarr:${builtins.toString config.containers.lidarr.config.services.transmission.settings.rpc-port}
'';
};
"https://jellyfin.dalinar.home.johannes-rothe.de" = {
extraConfig = ''
reverse_proxy localhost:8096
@ -357,25 +362,43 @@
enableTun = true;
hostAddress = "192.168.100.4";
localAddress = "192.168.100.5";
config = { ... }: {
config = { pkgs, ... }: {
system.stateVersion = "24.11";
networking.useHostResolvConf = lib.mkForce false;
# Required workaround for tailscale exit nodes, see https://nixos.wiki/wiki/Tailscale
networking.firewall.checkReversePath = "loose";
networking.nftables.enable = true;
services.resolved.enable = true;
# Tailscale is also used for local connectivity, since the exit node for
# some reason prevents local access
services.tailscale.enable = true;
services.transmission = {
enable = true;
openRPCPort = true;
settings = {
rpc-port = 9091;
rpc-bind-address = "0.0.0.0";
rpc-whitelist-enabled = false;
rpc-authentication-required = true;
# TODO change
rpc-password = "123456";
rpc-username = "123456";
};
webHome = pkgs.flood-for-transmission;
};
# https://github.com/NixOS/nixpkgs/issues/258793
systemd.services.transmission.serviceConfig = {
RootDirectoryStartOnly = lib.mkForce false;
RootDirectory = lib.mkForce "";
PrivateMounts = lib.mkForce false;
PrivateUsers = lib.mkForce false;
};
services.lidarr = {
enable = true;
openFirewall = true;
#settings = {
# server = {
# bindaddress = "*";
# port = 8686;
# };
#};
};
};
};