diff options
Diffstat (limited to 'nixos/kanata/configuration.nix')
-rw-r--r-- | nixos/kanata/configuration.nix | 10 |
1 files changed, 10 insertions, 0 deletions
diff --git a/nixos/kanata/configuration.nix b/nixos/kanata/configuration.nix index 6ad4735..b927a86 100644 --- a/nixos/kanata/configuration.nix +++ b/nixos/kanata/configuration.nix @@ -103,6 +103,7 @@ in sops.secrets.attic-credentials = { }; # TODO: insecure? sops.secrets.invidious-hmac = { mode = "0444"; }; + sops.secrets.transmission-extra-config = { owner = "transmission"; }; boot.kernel.sysctl."net.ipv4.ip_forward" = 1; boot.kernel.sysctl."net.ipv6.conf.all.forwarding" = 1; @@ -156,6 +157,7 @@ in "invidious.kusanari.network".to = "http://localhost:4003"; "hydra.kusanari.network".to = "http://localhost:4004"; "cache.kusanari.network".to = "http://localhost:4005"; + "torrent.kusanari.network".to = "http://localhost:4006"; # Nginx pre-configured routes "nextcloud.kusanari.network" = { @@ -192,6 +194,7 @@ in "invidious" "hydra" "cache" + "torrent" ]; }; }; @@ -262,6 +265,13 @@ in secrets.attic-credentials = config.sops.secrets.attic-credentials.path; }; + + services.transmission = { + enable = true; + home = "/smol/sandbox/torrent"; + + secrets.transmission-extra-config = config.sops.secrets.transmission-extra-config.path; + }; }; containers.v-interlink = { |