nixos/services/qbittorrent-nox.nix

63 lines
1.9 KiB
Nix

{ config, pkgs, lib, ... }:
{
config = lib.mkIf (config.networking.hostName == "FredOS-Mediaserver") {
environment.systemPackages = with pkgs; [
qbittorrent-nox
];
# Create qbittorrent user with media group
users.users.qbittorrent = {
isSystemUser = true;
group = "media";
extraGroups = [ "media" ];
home = "/var/lib/qbittorrent";
createHome = true;
};
# Create media group (shared with sonarr/radarr)
users.groups.media = {
gid = 3000;
};
systemd.tmpfiles.rules = [
# qbittorrent app data
"d /var/lib/qbittorrent 0755 qbittorrent media -"
"d /var/lib/qbittorrent/.config 0755 qbittorrent media -"
"d /var/lib/qbittorrent/.config/qBittorrent 0755 qbittorrent media -"
"d /var/lib/qbittorrent/.local 0755 qbittorrent media -"
"d /var/lib/qbittorrent/.local/share 0755 qbittorrent media -"
"d /var/lib/qbittorrent/.local/share/qBittorrent 0755 qbittorrent media -"
# Storage - qbittorrent downloads here
"d /mnt/storage/torrents/downloads 2775 qbittorrent media -"
"Z /mnt/storage/torrents/downloads 2775 qbittorrent media -"
];
systemd.services.qbittorrent-nox = {
description = "qBittorrent-nox service";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "simple";
User = "qbittorrent";
Group = "media";
ExecStart = "${pkgs.qbittorrent-nox}/bin/qbittorrent-nox --confirm-legal-notice";
Restart = "on-failure";
# Security hardening - FIXED
NoNewPrivileges = true;
PrivateTmp = true;
ProtectSystem = "strict";
ProtectHome = false; # Changed to false so it can write to /var/lib/qbittorrent
ReadWritePaths = [
"/var/lib/qbittorrent"
"/mnt/storage/torrents"
];
# Set proper working directory
WorkingDirectory = "/var/lib/qbittorrent";
};
};
users.users.fred.extraGroups = [ "media" ];
};
}