2023-09-22 22:58:22 +02:00
|
|
|
{ config, pkgs, lib, ... }:
|
|
|
|
|
|
|
|
let
|
|
|
|
cfg = config.shb.deluge;
|
|
|
|
|
|
|
|
fqdn = "${cfg.subdomain}.${cfg.domain}";
|
|
|
|
in
|
|
|
|
{
|
|
|
|
options.shb.deluge = {
|
|
|
|
enable = lib.mkEnableOption "selfhostblocks.deluge";
|
|
|
|
|
|
|
|
subdomain = lib.mkOption {
|
|
|
|
type = lib.types.str;
|
|
|
|
description = "Subdomain under which deluge will be served.";
|
|
|
|
example = "ha";
|
|
|
|
};
|
|
|
|
|
|
|
|
domain = lib.mkOption {
|
|
|
|
type = lib.types.str;
|
|
|
|
description = "domain under which deluge will be served.";
|
|
|
|
example = "mydomain.com";
|
|
|
|
};
|
|
|
|
|
|
|
|
daemonPort = lib.mkOption {
|
|
|
|
type = lib.types.int;
|
|
|
|
description = "Deluge daemon port";
|
|
|
|
default = 58846;
|
|
|
|
};
|
|
|
|
|
|
|
|
daemonListenPorts = lib.mkOption {
|
|
|
|
type = lib.types.listOf lib.types.int;
|
|
|
|
description = "Deluge daemon listen ports";
|
|
|
|
default = [ 6881 6889 ];
|
|
|
|
};
|
|
|
|
|
|
|
|
webPort = lib.mkOption {
|
|
|
|
type = lib.types.int;
|
|
|
|
description = "Deluge web port";
|
|
|
|
default = 8112;
|
|
|
|
};
|
|
|
|
|
|
|
|
proxyPort = lib.mkOption {
|
2023-11-30 21:06:41 +01:00
|
|
|
description = "If not null, sets up a deluge to forward all traffic to the Proxy listening at that port.";
|
2023-09-22 22:58:22 +02:00
|
|
|
type = lib.types.nullOr lib.types.int;
|
|
|
|
default = null;
|
|
|
|
};
|
|
|
|
|
2023-10-19 04:52:35 +02:00
|
|
|
outgoingInterface = lib.mkOption {
|
2023-11-30 21:06:41 +01:00
|
|
|
description = "If not null, sets up a deluge to bind all outgoing traffic to the given interface.";
|
2023-10-19 04:52:35 +02:00
|
|
|
type = lib.types.nullOr lib.types.str;
|
|
|
|
default = null;
|
|
|
|
};
|
|
|
|
|
2023-09-22 22:58:22 +02:00
|
|
|
downloadLocation = lib.mkOption {
|
|
|
|
type = lib.types.str;
|
|
|
|
description = "Folder where torrents gets downloaded";
|
|
|
|
example = "/srv/torrents";
|
|
|
|
};
|
|
|
|
|
2023-11-30 21:48:57 +01:00
|
|
|
authEndpoint = lib.mkOption {
|
2023-09-22 22:58:22 +02:00
|
|
|
type = lib.types.str;
|
|
|
|
description = "OIDC endpoint for SSO";
|
|
|
|
example = "https://authelia.example.com";
|
|
|
|
};
|
|
|
|
|
|
|
|
sopsFile = lib.mkOption {
|
|
|
|
type = lib.types.path;
|
|
|
|
description = "Sops file location.";
|
|
|
|
example = "secrets/torrent.yaml";
|
|
|
|
};
|
|
|
|
|
2023-10-13 07:34:00 +02:00
|
|
|
enabledPlugins = lib.mkOption {
|
|
|
|
type = lib.types.listOf lib.types.str;
|
|
|
|
description = "Plugins to enable, can include those from additionalPlugins.";
|
|
|
|
example = ["Label"];
|
|
|
|
default = [];
|
|
|
|
};
|
|
|
|
|
2023-09-22 22:58:22 +02:00
|
|
|
additionalPlugins = lib.mkOption {
|
2023-11-16 21:03:11 +01:00
|
|
|
type = lib.types.listOf lib.types.path;
|
|
|
|
description = "Location of additional plugins. Each item in the list must be the path to the directory containing the plugin .egg file.";
|
|
|
|
default = [];
|
2023-09-22 22:58:22 +02:00
|
|
|
};
|
2023-10-14 06:17:24 +02:00
|
|
|
|
|
|
|
logLevel = lib.mkOption {
|
|
|
|
type = lib.types.nullOr (lib.types.enum ["critical" "error" "warning" "info" "debug"]);
|
|
|
|
description = "Enable logging.";
|
|
|
|
default = false;
|
|
|
|
example = true;
|
|
|
|
};
|
2023-09-22 22:58:22 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
config = lib.mkIf cfg.enable {
|
|
|
|
services.deluge = {
|
|
|
|
enable = true;
|
|
|
|
declarative = true;
|
|
|
|
openFirewall = true;
|
|
|
|
config = {
|
|
|
|
download_location = cfg.downloadLocation;
|
|
|
|
allow_remote = true;
|
|
|
|
daemon_port = cfg.daemonPort;
|
|
|
|
listen_ports = cfg.daemonListenPorts;
|
|
|
|
proxy = lib.optionalAttrs (cfg.proxyPort != null) {
|
|
|
|
force_proxy = true;
|
|
|
|
hostname = "127.0.0.1";
|
|
|
|
port = cfg.proxyPort;
|
|
|
|
proxy_hostnames = true;
|
|
|
|
proxy_peer_connections = true;
|
|
|
|
proxy_tracker_connections = true;
|
|
|
|
type = 4; # HTTP
|
|
|
|
};
|
2023-10-19 04:52:35 +02:00
|
|
|
outgoing_interface = cfg.outgoingInterface;
|
2023-10-13 07:34:00 +02:00
|
|
|
|
2023-11-16 20:58:45 +01:00
|
|
|
enabled_plugins = cfg.enabledPlugins
|
|
|
|
++ lib.optional (lib.any (x: x.enable) [
|
|
|
|
config.shb.arr.radarr
|
|
|
|
config.shb.arr.sonarr
|
|
|
|
config.shb.arr.bazarr
|
|
|
|
config.shb.arr.readarr
|
|
|
|
config.shb.arr.lidarr
|
|
|
|
]) "Label";
|
2023-10-13 07:34:00 +02:00
|
|
|
|
2023-10-12 22:36:44 +02:00
|
|
|
# TODO: expose these
|
|
|
|
max_active_limit = 10000;
|
|
|
|
max_active_downloading = 30;
|
|
|
|
max_active_seeding = 10000;
|
|
|
|
max_connections_global = 1000;
|
|
|
|
max_connections_per_torrent = 50;
|
|
|
|
|
|
|
|
max_download_speed = 1000;
|
|
|
|
max_download_speed_per_torrent = -1;
|
|
|
|
|
|
|
|
max_upload_slots_global = 100;
|
|
|
|
max_upload_slots_per_torrent = 4;
|
|
|
|
max_upload_speed = 200;
|
|
|
|
max_upload_speed_per_torrent = 50;
|
|
|
|
|
|
|
|
dont_count_slow_torrents = true;
|
|
|
|
new_release_check = false;
|
2023-09-22 22:58:22 +02:00
|
|
|
};
|
2023-10-12 22:36:44 +02:00
|
|
|
authFile = config.sops.secrets."deluge/auth".path;
|
2023-09-22 22:58:22 +02:00
|
|
|
|
|
|
|
web.enable = true;
|
|
|
|
web.port = cfg.webPort;
|
|
|
|
};
|
|
|
|
|
2023-11-16 21:03:11 +01:00
|
|
|
systemd.services.deluged.serviceConfig.ExecStart = lib.mkForce (lib.concatStringsSep " \\\n " ([
|
|
|
|
"${config.services.deluge.package}/bin/deluged"
|
|
|
|
"--do-not-daemonize"
|
|
|
|
"--config ${config.services.deluge.dataDir}/.config/deluge"
|
|
|
|
] ++ (lib.optional (!(isNull cfg.logLevel)) "-L ${cfg.logLevel}")
|
|
|
|
));
|
2023-09-22 22:58:22 +02:00
|
|
|
|
2023-11-16 21:03:11 +01:00
|
|
|
systemd.tmpfiles.rules =
|
|
|
|
let
|
|
|
|
plugins = pkgs.symlinkJoin {
|
|
|
|
name = "deluge-plugins";
|
|
|
|
paths = cfg.additionalPlugins;
|
|
|
|
};
|
|
|
|
in
|
|
|
|
[
|
|
|
|
"L+ ${config.services.deluge.dataDir}/.config/deluge/plugins - - - - ${plugins}"
|
|
|
|
];
|
2023-09-22 22:58:22 +02:00
|
|
|
|
|
|
|
sops.secrets."deluge/auth" = {
|
|
|
|
inherit (cfg) sopsFile;
|
|
|
|
mode = "0440";
|
|
|
|
owner = config.services.deluge.user;
|
|
|
|
group = config.services.deluge.group;
|
|
|
|
restartUnits = [ "deluged.service" "delugeweb.service" ];
|
|
|
|
};
|
|
|
|
|
2023-09-24 20:04:59 +02:00
|
|
|
shb.nginx.autheliaProtect = [
|
2023-09-22 22:58:22 +02:00
|
|
|
{
|
2023-11-30 21:48:57 +01:00
|
|
|
inherit (cfg) subdomain domain authEndpoint;
|
2023-09-24 20:04:59 +02:00
|
|
|
upstream = "http://127.0.0.1:${toString config.services.deluge.web.port}";
|
2023-09-27 05:13:08 +02:00
|
|
|
autheliaRules = [{
|
2023-09-24 20:04:59 +02:00
|
|
|
domain = fqdn;
|
|
|
|
policy = "two_factor";
|
|
|
|
subject = ["group:deluge_user"];
|
2023-09-27 05:13:08 +02:00
|
|
|
}];
|
2023-09-22 22:58:22 +02:00
|
|
|
}
|
|
|
|
];
|
|
|
|
|
2023-12-11 06:30:19 +01:00
|
|
|
# We want deluge to create files in the media group and to make those files group readable.
|
2023-10-19 04:52:10 +02:00
|
|
|
users.users.deluge = {
|
|
|
|
extraGroups = [ "media" ];
|
|
|
|
};
|
2023-12-11 06:30:19 +01:00
|
|
|
systemd.services.deluged.serviceConfig.Group = lib.mkForce "media";
|
|
|
|
systemd.services.deluged.serviceConfig.UMask = lib.mkForce "0027";
|
2023-10-19 04:52:10 +02:00
|
|
|
|
2023-12-11 06:30:19 +01:00
|
|
|
# We backup the whole deluge directory and set permissions for the backup user accordingly.
|
|
|
|
users.groups.deluge.members = [ "backup" ];
|
|
|
|
users.groups.media.members = [ "backup" ];
|
2023-09-22 22:58:22 +02:00
|
|
|
shb.backup.instances.deluge = {
|
|
|
|
sourceDirectories = [
|
|
|
|
config.services.deluge.dataDir
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|