Fix group and open firewall
This commit is contained in:
parent
a0119935a5
commit
7fdcfba3c5
|
@ -39,10 +39,14 @@
|
||||||
# Torrent client
|
# Torrent client
|
||||||
services.deluge = {
|
services.deluge = {
|
||||||
enable = true;
|
enable = true;
|
||||||
web.enable = true;
|
web = {
|
||||||
|
enable = true;
|
||||||
|
openFirewall = true;
|
||||||
|
};
|
||||||
group = "media";
|
group = "media";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
systemd.services.delugedweb.requires = ["deluged-proxy.service"];
|
||||||
systemd.services.deluged.bindsTo = [ "wireguard-wg1.service" ];
|
systemd.services.deluged.bindsTo = [ "wireguard-wg1.service" ];
|
||||||
systemd.services.deluged.requires = [ "network-online.target" ];
|
systemd.services.deluged.requires = [ "network-online.target" ];
|
||||||
systemd.services.deluged.serviceConfig.NetworkNamespacePath = "/var/run/netns/wg1ns";
|
systemd.services.deluged.serviceConfig.NetworkNamespacePath = "/var/run/netns/wg1ns";
|
||||||
|
@ -61,7 +65,7 @@
|
||||||
unitConfig.JoinsNamespaceOf = "deluged.service";
|
unitConfig.JoinsNamespaceOf = "deluged.service";
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
User = "deluge";
|
User = "deluge";
|
||||||
Group = "deluge";
|
Group = "media";
|
||||||
ExecStart = "${pkgs.systemd}/lib/systemd/systemd-socket-proxyd 127.0.0.1:58846";
|
ExecStart = "${pkgs.systemd}/lib/systemd/systemd-socket-proxyd 127.0.0.1:58846";
|
||||||
PrivateNetwork = true;
|
PrivateNetwork = true;
|
||||||
};
|
};
|
||||||
|
|
Loading…
Reference in a new issue