snowfield/modules/deluge/default.nix

60 lines
1.4 KiB
Nix
Raw Permalink Normal View History

2024-03-30 20:18:12 +01:00
{ lib, config, ... }:
2022-02-19 22:02:37 +01:00
with lib;
let
cfg = config.luj.deluge;
port = 8112;
in
{
options.luj.deluge = {
enable = mkEnableOption "activate deluge service";
user = mkOption {
type = types.str;
default = "deluge";
description = "User account under which deluge runs.";
};
group = mkOption {
type = types.str;
default = "deluge";
description = "Group under which deluge runs.";
};
2024-05-25 19:07:53 +02:00
interface = mkOption {
type = types.str;
description = "Interface deluge will use.";
};
2022-02-19 22:02:37 +01:00
nginx.enable = mkEnableOption "activate nginx";
2024-05-09 00:48:35 +02:00
nginx.subdomain = mkOption { type = types.str; };
2022-02-19 22:02:37 +01:00
};
2024-05-09 00:48:35 +02:00
config = mkIf cfg.enable (mkMerge [
{
2022-02-19 22:02:37 +01:00
2024-05-09 00:48:35 +02:00
age.secrets.deluge-webui-password = {
2022-02-19 22:02:37 +01:00
owner = cfg.user;
2024-05-09 00:48:35 +02:00
file = ../../secrets/deluge-webui-password.age;
2022-02-19 22:02:37 +01:00
};
services.deluge = {
enable = true;
2024-03-30 20:58:04 +01:00
inherit (cfg) user group;
2022-02-19 22:02:37 +01:00
openFirewall = true;
declarative = true;
2024-05-09 00:48:35 +02:00
authFile = "/run/agenix/deluge-webui-password";
2022-02-19 22:02:37 +01:00
web.enable = true;
config = {
2024-05-25 19:07:53 +02:00
download_location = "${config.users.users.${cfg.user}.home}/downloads/";
2022-02-19 22:02:37 +01:00
allow_remote = true;
2024-05-25 19:07:53 +02:00
outgoing_interface = cfg.interface;
listen_interface = cfg.interface;
2022-02-19 22:02:37 +01:00
};
};
}
2024-05-09 00:48:35 +02:00
(mkIf cfg.nginx.enable (mkVPNSubdomain cfg.nginx.subdomain port))
]);
2022-02-19 22:02:37 +01:00
}