Compare commits
2 Commits
2409d1b01b
...
dfc1b48b4f
| Author | SHA1 | Date | |
|---|---|---|---|
|
dfc1b48b4f
|
|||
|
834f28f898
|
@@ -22,19 +22,20 @@
|
|||||||
deps = [ "agenix" ];
|
deps = [ "agenix" ];
|
||||||
text = ''
|
text = ''
|
||||||
#!/bin/sh
|
#!/bin/sh
|
||||||
|
(
|
||||||
|
umask 077
|
||||||
# Check if keys already exist (e.g., from disko-install)
|
# Check if keys already exist (e.g., from disko-install)
|
||||||
if [[ -d ${config.boot.lanzaboote.pkiBundle} && -f ${config.boot.lanzaboote.pkiBundle}/db.key ]]; then
|
if [[ -d ${config.boot.lanzaboote.pkiBundle} && -f ${config.boot.lanzaboote.pkiBundle}/db.key ]]; then
|
||||||
echo "Secureboot keys already present, skipping extraction"
|
echo "Secureboot keys already present, skipping extraction"
|
||||||
chown -R root:wheel ${config.boot.lanzaboote.pkiBundle}
|
|
||||||
chmod -R 500 ${config.boot.lanzaboote.pkiBundle}
|
|
||||||
else
|
else
|
||||||
echo "Extracting secureboot keys from agenix"
|
echo "Extracting secureboot keys from agenix"
|
||||||
rm -fr ${config.boot.lanzaboote.pkiBundle} || true
|
rm -fr ${config.boot.lanzaboote.pkiBundle} || true
|
||||||
mkdir -p ${config.boot.lanzaboote.pkiBundle}
|
install -d -o root -g wheel -m 0500 ${config.boot.lanzaboote.pkiBundle}
|
||||||
${pkgs.gnutar}/bin/tar xf ${config.age.secrets.secureboot-tar.path} -C ${config.boot.lanzaboote.pkiBundle}
|
${pkgs.gnutar}/bin/tar xf ${config.age.secrets.secureboot-tar.path} -C ${config.boot.lanzaboote.pkiBundle}
|
||||||
|
fi
|
||||||
chown -R root:wheel ${config.boot.lanzaboote.pkiBundle}
|
chown -R root:wheel ${config.boot.lanzaboote.pkiBundle}
|
||||||
chmod -R 500 ${config.boot.lanzaboote.pkiBundle}
|
chmod -R 500 ${config.boot.lanzaboote.pkiBundle}
|
||||||
fi
|
)
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -19,7 +19,7 @@
|
|||||||
# 0770: group (media) needs write to delete files during upgrades —
|
# 0770: group (media) needs write to delete files during upgrades —
|
||||||
# Radarr/Sonarr must unlink the old file before placing the new one.
|
# Radarr/Sonarr must unlink the old file before placing the new one.
|
||||||
"Z ${config.services.qbittorrent.serverConfig.Preferences.Downloads.SavePath} 0770 ${config.services.qbittorrent.user} ${service_configs.media_group}"
|
"Z ${config.services.qbittorrent.serverConfig.Preferences.Downloads.SavePath} 0770 ${config.services.qbittorrent.user} ${service_configs.media_group}"
|
||||||
"Z ${config.services.qbittorrent.serverConfig.Preferences.Downloads.TempPath} 0700 ${config.services.qbittorrent.user} ${config.services.qbittorrent.group}"
|
"z ${config.services.qbittorrent.serverConfig.Preferences.Downloads.TempPath} 0700 ${config.services.qbittorrent.user} ${config.services.qbittorrent.group}"
|
||||||
"Z ${config.services.qbittorrent.profileDir} 0700 ${config.services.qbittorrent.user} ${config.services.qbittorrent.group}"
|
"Z ${config.services.qbittorrent.profileDir} 0700 ${config.services.qbittorrent.user} ${config.services.qbittorrent.group}"
|
||||||
])
|
])
|
||||||
];
|
];
|
||||||
@@ -127,7 +127,13 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
systemd.services.qbittorrent.serviceConfig.TimeoutStopSec = lib.mkForce 10;
|
systemd.services.qbittorrent.serviceConfig = {
|
||||||
|
TimeoutStopSec = lib.mkForce 10;
|
||||||
|
# Default UMask=0022 creates files as 0644 (group read-only). With 0007,
|
||||||
|
# new files get 0660/0770 so the media group has read+write immediately
|
||||||
|
# instead of relying on the tmpfiles Z rule to fix permissions at restart.
|
||||||
|
UMask = lib.mkForce "0007";
|
||||||
|
};
|
||||||
|
|
||||||
services.caddy.virtualHosts."torrent.${service_configs.https.domain}".extraConfig = ''
|
services.caddy.virtualHosts."torrent.${service_configs.https.domain}".extraConfig = ''
|
||||||
import ${config.age.secrets.caddy_auth.path}
|
import ${config.age.secrets.caddy_auth.path}
|
||||||
|
|||||||
Reference in New Issue
Block a user