3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/nixos/modules/services/torrent/deluge.nix
2018-04-13 10:07:09 +02:00

69 lines
1.7 KiB
Nix

{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.deluge;
cfg_web = config.services.deluge.web;
openFilesLimit = 4096;
in {
options = {
services = {
deluge = {
enable = mkEnableOption "Deluge daemon";
openFilesLimit = mkOption {
default = openFilesLimit;
example = 8192;
description = ''
Number of files to allow deluged to open.
'';
};
};
deluge.web.enable = mkEnableOption "Deluge Web daemon";
};
};
config = mkIf cfg.enable {
systemd.services.deluged = {
after = [ "network.target" ];
description = "Deluge BitTorrent Daemon";
wantedBy = [ "multi-user.target" ];
path = [ pkgs.deluge ];
serviceConfig = {
ExecStart = "${pkgs.deluge}/bin/deluged -d";
# To prevent "Quit & shutdown daemon" from working; we want systemd to manage it!
Restart = "on-success";
User = "deluge";
Group = "deluge";
LimitNOFILE = cfg.openFilesLimit;
};
};
systemd.services.delugeweb = mkIf cfg_web.enable {
after = [ "network.target" ];
description = "Deluge BitTorrent WebUI";
wantedBy = [ "multi-user.target" ];
path = [ pkgs.deluge ];
serviceConfig.ExecStart = "${pkgs.deluge}/bin/deluge --ui web";
serviceConfig.User = "deluge";
serviceConfig.Group = "deluge";
};
environment.systemPackages = [ pkgs.deluge ];
users.extraUsers.deluge = {
group = "deluge";
uid = config.ids.uids.deluge;
home = "/var/lib/deluge/";
createHome = true;
description = "Deluge Daemon user";
};
users.extraGroups.deluge.gid = config.ids.gids.deluge;
};
}