docker-transmission-openvpn
docker-transmission-openvpn copied to clipboard
Memory continues to be used until crash
Is there a pinned issue for this?
- [x] I have read the pinned issues and could not find my issue
Is there an existing or similar issue/discussion for this?
- [x] I have searched the existing issues
- [x] I have searched the existing discussions
Is there any comment in the documentation for this?
- [x] I have read the documentation, especially the FAQ and Troubleshooting parts
Is this related to a provider?
- [x] I have checked the provider repo for issues
- [x] My issue is NOT related to a provider
Are you using the latest release?
- [x] I am using the latest release
Have you tried using the dev branch latest?
- [x] I have tried using dev branch
Docker run config used
transmission-openvpn: image: haugene/transmission-openvpn:latest container_name: transmissionvpn restart: unless-stopped cap_add: - NET_ADMIN volumes: - /media/plex:/data - ~/config/transmission-openvpn:/config - ./protonvpn/:/etc/openvpn/custom environment: - OPENVPN_PROVIDER=custom - OPENVPN_CONFIG=ca.protonvpn.udp - OPENVPN_USERNAME=xxx+pmp - OPENVPN_PASSWORD=xxx - LOCAL_NETWORK=192.168.1.0/24 - TZ=America/New_York - TRANSMISSION_DOWNLOAD_DIR=xxx - PUID=1000 - PGID=1000 - TRANSMISSION_WEB_UI=flood-for-transmission - DEBUG=true logging: driver: json-file options: max-size: 10m ports: - 9091:9091
Current Behavior
While using the application, memory continues to grow in transmission-daemon until all memory is occupied, then uses swap until device is unresponsive from full CPU usage for swap. Restarting container does not seem to slow down the continuous memory usage, only complete reboot of machine. On Ubuntu server 24.02.1 LTS and transmission-openvpn:latest.
Expected Behavior
Expect memory usage to be dependent on number of torrents uploading/downloading, continues growing regardless of number of torrents.
How have you tried to solve the problem?
tried multiple release builds, dev/edge/latest/4.5.3
Log output
- [[ -n 07f5a2b9aea5028c9bb75438c1552708e91dde71 ]]
- echo 'Starting container with revision: 07f5a2b9aea5028c9bb75438c1552708e91dde71' Starting container with revision: 07f5a2b9aea5028c9bb75438c1552708e91dde71
- echo 'TRANSMISSION_HOME is currently set to: /config/transmission-home' TRANSMISSION_HOME is currently set to: /config/transmission-home
- [[ /config != /\c\o\n\f\i\g ]]
- '[' -d /data/transmission-home ']'
- [[ -x /scripts/openvpn-pre-start.sh ]]
- compgen -e
- grep -q OVERRIDE_DNS
- nslookup google.com Creating TUN device /dev/net/tun
- [[ true == \t\r\u\e ]]
- echo 'Creating TUN device /dev/net/tun'
- rm -f /dev/net/tun
- mkdir -p /dev/net
- mknod /dev/net/tun c 10 200
- chmod 0666 /dev/net/tun
- VPN_PROVIDER=custom
- export VPN_PROVIDER=custom
- VPN_PROVIDER=custom
- export VPN_PROVIDER_HOME=/etc/openvpn/custom
- VPN_PROVIDER_HOME=/etc/openvpn/custom
- mkdir -p /etc/openvpn/custom
- [[ -z '' ]]
- [[ custom == **\N\o\n\e** ]]
- [[ -z custom ]] Using OpenVPN provider: CUSTOM
- echo 'Using OpenVPN provider: CUSTOM'
- [[ custom == \c\u\s\t\o\m ]]
- [[ -f /etc/openvpn/custom/default.ovpn ]]
- [[ -z '' ]]
- VPN_CONFIG_SOURCE=auto
- VPN_CONFIG_SOURCE=auto Running with VPN_CONFIG_SOURCE auto
- echo 'Running with VPN_CONFIG_SOURCE auto'
- [[ auto == \a\u\t\o ]]
- [[ -f /etc/openvpn/custom/configure-openvpn.sh ]]
- [[ custom == \c\u\s\t\o\m ]]
- echo 'CUSTOM provider specified but not using default.ovpn, will try to find a valid config mounted to /etc/openvpn/custom'
- VPN_CONFIG_SOURCE=custom CUSTOM provider specified but not using default.ovpn, will try to find a valid config mounted to /etc/openvpn/custom
- [[ custom == \e\x\t\e\r\n\a\l ]]
- [[ -f /etc/openvpn/custom/configure-openvpn.sh ]]
- [[ -z '' ]]
- [[ -n ca.protonvpn.udp ]]
- '[' -e /data/openvpn/OPENVPN_CONFIG ']'
- readarray -t OPENVPN_CONFIG_ARRAY
- for i in "${!OPENVPN_CONFIG_ARRAY[@]}"
- OPENVPN_CONFIG_ARRAY[${i}]=ca.protonvpn.udp
- OPENVPN_CONFIG_ARRAY[${i}]=ca.protonvpn.udp
- (( 1 > 1 ))
- [[ -f /etc/openvpn/custom/ca.protonvpn.udp.ovpn ]]
- echo 'Starting OpenVPN using config ca.protonvpn.udp.ovpn' Starting OpenVPN using config ca.protonvpn.udp.ovpn
- CHOSEN_OPENVPN_CONFIG=/etc/openvpn/custom/ca.protonvpn.udp.ovpn
- mountpoint -q /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- MODIFY_CHOSEN_CONFIG=true
- [[ true == \t\r\u\e ]]
- /etc/openvpn/modify-openvpn-config.sh /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- '[' 1 -ne 1 ']'
- CONFIG=/etc/openvpn/custom/ca.protonvpn.udp.ovpn
- echo 'Modifying /etc/openvpn/custom/ca.protonvpn.udp.ovpn for best behaviour in this container' Modifying /etc/openvpn/custom/ca.protonvpn.udp.ovpn for best behaviour in this container
- CONFIG_MOD_USERPASS=1
- CONFIG_MOD_CA_CERTS=1
- CONFIG_MOD_PING=1
- CONFIG_MOD_RESOLV_RETRY=1
- CONFIG_MOD_TLS_CERTS=1
- CONFIG_MOD_VERBOSITY=3
- CONFIG_MOD_REMAP_USR1=1
- CONFIG_MOD_FAILURE_SCRIPT=1
- [[ 1 == \1 ]]
- echo 'Modification: Point auth-user-pass option to the username/password file' Modification: Point auth-user-pass option to the username/password file
- sed -i 's#auth-user-pass.*#auth-user-pass /config/openvpn-credentials.txt#g' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- [[ 1 == \1 ]]
- echo 'Modification: Change ca certificate path' Modification: Change ca certificate path ++ dirname /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- config_directory=/etc/openvpn/custom
- sed -i -E 's#ca\s+(./)#ca /etc/openvpn/custom/#g' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- [[ 1 == \1 ]]
- echo 'Modification: Change ping options' Modification: Change ping options
- sed -i '/^inactive.*$/d' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- sed -i '/^ping.*$/d' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- sed -i '/^keepalive.*$/d' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- sed -i '$q' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- echo 'inactive 3600'
- echo 'ping 10'
- echo 'ping-exit 60'
- [[ 1 == \1 ]] Modification: Update/set resolv-retry to 15 seconds
- echo 'Modification: Update/set resolv-retry to 15 seconds'
- sed -i '/^resolv-retry.*$/d' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- sed -i '$q' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- echo 'resolv-retry 15'
- [[ 1 == \1 ]]
- echo 'Modification: Change tls-crypt keyfile path' Modification: Change tls-crypt keyfile path ++ dirname /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- config_directory=/etc/openvpn/custom
- sed -i -E 's#tls-crypt\s+(./)#tls-crypt /etc/openvpn/custom/#g' /etc/openvpn/custom/ca.protonvpn.udp.ovpn Modification: Set output verbosity to 3
- [[ 3 -gt 0 ]]
- [[ 3 -gt 9 ]]
- echo 'Modification: Set output verbosity to 3'
- sed -i '/^verb.*$/d' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- sed -i '$q' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- echo 'verb 3'
- [[ 1 == \1 ]]
- echo 'Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop' Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop
- sed -i '/^remap-usr1.*$/d' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- sed -i '$q' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- echo 'remap-usr1 SIGTERM'
- [[ 1 == \1 ]] Modification: Updating status for config failure detection
- echo 'Modification: Updating status for config failure detection' ++ sed -n 's/^; status (.*)/\1/p' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- CONFIG_STATUS=failure
- [[ failure == \u\n\k\n\o\w\n ]]
- [[ failure != \f\a\i\l\u\r\e ]]
- sed -i '/^; status.*$/d' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- sed -i '$q' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- echo '; status failure'
- [[ failure == \f\a\i\l\u\r\e ]] ++ dirname /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- CONFIG_DIRECTORY=/etc/openvpn/custom
- CONFIG_FAILURE_SCRIPT=/etc/openvpn/custom/config-failure.sh
- [[ -x /etc/openvpn/custom/config-failure.sh ]]
- [[ -x /scripts/openvpn-post-config.sh ]]
- mkdir -p /config
- [[ -f /run/secrets/openvpn_creds ]]
- [[ EqvxIOA7fZUhTkgF+pmp == **\N\o\n\e** ]]
- [[ gsDLBAD3J02Ya5t5FcAZHhrvIVoHhZM7 == **\N\o\n\e** ]]
- echo 'Setting OpenVPN credentials...' Setting OpenVPN credentials...
- echo -e 'EqvxIOA7fZUhTkgF+pmp\ngsDLBAD3J02Ya5t5FcAZHhrvIVoHhZM7'
- chmod 600 /config/openvpn-credentials.txt
- [[ -f /run/secrets/rpc_creds ]]
- echo ''
- echo ''
- export CONFIG=/etc/openvpn/custom/ca.protonvpn.udp.ovpn
- CONFIG=/etc/openvpn/custom/ca.protonvpn.udp.ovpn
- python3 /etc/openvpn/persistEnvironment.py /etc/transmission/environment-variables.sh
- TRANSMISSION_CONTROL_OPTS='--script-security 2 --route-up /etc/openvpn/tunnelUp.sh --route-pre-down /etc/openvpn/tunnelDown.sh'
- [[ false == \t\r\u\e ]]
- [[ -n 192.168.1.0/24 ]] ++ /sbin/ip route list match 0.0.0.0 ++ awk '{if($5!="tun0"){print "GW="$3"\nINT="$5; exit}}'
- eval GW=172.18.0.1 INT=eth0 ++ GW=172.18.0.1 ++ INT=eth0
- [[ false == \t\r\u\e ]]
- [[ false == \t\r\u\e ]]
- [[ -n 192.168.1.0/24 ]]
- [[ -n 172.18.0.1 ]]
- [[ -n eth0 ]]
- for localNet in ${LOCAL_NETWORK//,/ }
- echo 'adding route to local network 192.168.1.0/24 via 172.18.0.1 dev eth0' adding route to local network 192.168.1.0/24 via 172.18.0.1 dev eth0
- /sbin/ip route replace 192.168.1.0/24 via 172.18.0.1 dev eth0
- [[ false == \t\r\u\e ]]
- [[ -x /scripts/routes-post-start.sh ]]
- [[ false != \f\a\l\s\e ]]
- exec openvpn --script-security 2 --route-up /etc/openvpn/tunnelUp.sh --route-pre-down /etc/openvpn/tunnelDown.sh --mute-replay-warnings --config /etc/openvpn/custom/ca.protonvpn.udp.ovpn 2025-02-04 02:46:11 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 2025-02-04 02:46:11 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 2025-02-04 02:46:11 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 2025-02-04 02:46:11 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 2025-02-04 02:46:11 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 2025-02-04 02:46:11 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 2025-02-04 02:46:11 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 2025-02-04 02:46:11 TCP/UDP: Preserving recently used remote address: [AF_INET]149.22.81.28:1194 2025-02-04 02:46:11 Socket Buffers: R=[212992->212992] S=[212992->212992] 2025-02-04 02:46:11 UDP link local: (not bound) 2025-02-04 02:46:11 UDP link remote: [AF_INET]149.22.81.28:1194 2025-02-04 02:46:11 TLS: Initial packet from [AF_INET]149.22.81.28:1194, sid=e17b232d 98aa59ec 2025-02-04 02:46:11 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this 2025-02-04 02:46:12 VERIFY OK: depth=2, C=CH, O=Proton Technologies AG, OU=ProtonVPN, CN=ProtonVPN Root CA 2025-02-04 02:46:12 VERIFY OK: depth=1, C=CH, O=ProtonVPN AG, CN=ProtonVPN Intermediate CA 1 2025-02-04 02:46:12 VERIFY KU OK 2025-02-04 02:46:12 Validating certificate extended key usage 2025-02-04 02:46:12 ++ Certificate has EKU (str) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication 2025-02-04 02:46:12 ++ Certificate has EKU (oid) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication 2025-02-04 02:46:12 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 2025-02-04 02:46:12 VERIFY EKU OK 2025-02-04 02:46:12 VERIFY OK: depth=0, CN=node-ca-33.protonvpn.net 2025-02-04 02:46:12 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1549', remote='link-mtu 1541' 2025-02-04 02:46:12 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1' 2025-02-04 02:46:12 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' 2025-02-04 02:46:12 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256 2025-02-04 02:46:12 [node-ca-33.protonvpn.net] Peer Connection Initiated with [AF_INET]149.22.81.28:1194 2025-02-04 02:46:13 SENT CONTROL [node-ca-33.protonvpn.net]: 'PUSH_REQUEST' (status=1) 2025-02-04 02:46:13 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,explicit-exit-notify,dhcp-option DNS 10.96.0.1,sndbuf 524288,rcvbuf 524288,route-gateway 10.96.0.1,topology subnet,ping 10,ping-restart 60,socket-flags TCP_NODELAY,ifconfig 10.96.0.44 255.255.0.0,peer-id 786477,cipher AES-256-GCM' 2025-02-04 02:46:13 OPTIONS IMPORT: timers and/or timeouts modified 2025-02-04 02:46:13 OPTIONS IMPORT: explicit notify parm(s) modified 2025-02-04 02:46:13 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified 2025-02-04 02:46:13 Socket Buffers: R=[212992->425984] S=[212992->425984] 2025-02-04 02:46:13 OPTIONS IMPORT: --socket-flags option modified 2025-02-04 02:46:13 NOTE: setsockopt TCP_NODELAY=1 failed 2025-02-04 02:46:13 OPTIONS IMPORT: --ifconfig/up options modified 2025-02-04 02:46:13 OPTIONS IMPORT: route options modified 2025-02-04 02:46:13 OPTIONS IMPORT: route-related options modified 2025-02-04 02:46:13 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified 2025-02-04 02:46:13 OPTIONS IMPORT: peer-id set 2025-02-04 02:46:13 OPTIONS IMPORT: adjusting link_mtu to 1624 2025-02-04 02:46:13 OPTIONS IMPORT: data channel crypto options modified 2025-02-04 02:46:13 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2025-02-04 02:46:13 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2025-02-04 02:46:13 net_route_v4_best_gw query: dst 0.0.0.0 2025-02-04 02:46:13 net_route_v4_best_gw result: via 172.18.0.1 dev eth0 2025-02-04 02:46:13 ROUTE_GATEWAY 172.18.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:12:00:0d 2025-02-04 02:46:13 TUN/TAP device tun0 opened 2025-02-04 02:46:13 net_iface_mtu_set: mtu 1500 for tun0 2025-02-04 02:46:13 net_iface_up: set tun0 up 2025-02-04 02:46:13 net_addr_v4_add: 10.96.0.44/16 dev tun0 2025-02-04 02:46:13 /etc/openvpn/update-resolv-conf tun0 1500 1624 10.96.0.44 255.255.0.0 init 2025-02-04 02:46:13 net_route_v4_add: 149.22.81.28/32 via 172.18.0.1 dev [NULL] table 0 metric -1 2025-02-04 02:46:13 net_route_v4_add: 0.0.0.0/1 via 10.96.0.1 dev [NULL] table 0 metric -1 2025-02-04 02:46:13 net_route_v4_add: 128.0.0.0/1 via 10.96.0.1 dev [NULL] table 0 metric -1 ++ sed -n 's/^; status (.*)/\1/p' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- CONFIG_STATUS=failure
- [[ -n failure ]]
- CONFIG_STATUS=success
- sed -i '/^; status.*$/d' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- sed -i '$q' /etc/openvpn/custom/ca.protonvpn.udp.ovpn
- echo '; status success'
- [[ true == \t\r\u\e ]]
- NS=
- NS_ROUTES=()
- DOMAIN=
- SEARCH=
- i=1
- true
- eval 'opt=$foreign_option_1' ++ opt='dhcp-option DNS 10.96.0.1'
- '[' -z 'dhcp-option DNS 10.96.0.1' ']'
- '[' 'dhcp-option DNS 10.96.0.1' '!=' 'dhcp-option DNS 10.96.0.1' ']'
- '[' 'dhcp-option DNS 10.96.0.1' '!=' 10.96.0.1 ']'
- new_ns=10.96.0.1
- NS_ROUTES+=("${new_ns}")
- NS='nameserver 10.96.0.1\n'
- i=2
- true
- eval 'opt=$foreign_option_2' ++ opt=
- '[' -z '' ']'
- break
- '[' -n 'nameserver 10.96.0.1\n' ']'
- [[ true == \t\r\u\e ]]
- for r in "${NS_ROUTES[@]}"
- ip route add 10.96.0.1 dev tun0
- DNS='# Generated by openvpn for interface tun0\n'
- '[' -n '' ']'
- '[' -n '' ']'
- DNS='# Generated by openvpn for interface tun0\nnameserver 10.96.0.1\n'
- '[' -x /sbin/resolvconf ']'
- '[' -e /etc/resolv.conf ']'
- cp /etc/resolv.conf /etc/resolv.conf-tun0.sv
- printf '# Generated by openvpn for interface tun0\nnameserver 10.96.0.1\n'
- chmod 644 /etc/resolv.conf
- /etc/transmission/start.sh
- . /etc/transmission/environment-variables.sh ++ export PUID=1000 ++ PUID=1000 ++ export PEER_DNS_PIN_ROUTES=true ++ PEER_DNS_PIN_ROUTES=true ++ export TZ=America/New_York ++ TZ=America/New_York ++ export TRANSMISSION_RPC_PASSWORD= ++ TRANSMISSION_RPC_PASSWORD= ++ export PEER_DNS=true ++ PEER_DNS=true ++ export ENABLE_UFW=false ++ ENABLE_UFW=false ++ export WEBPROXY_PASSWORD= ++ WEBPROXY_PASSWORD= ++ export PGID=1000 ++ PGID=1000 ++ export WEBPROXY_USERNAME= ++ WEBPROXY_USERNAME= ++ export DROP_DEFAULT_ROUTE= ++ DROP_DEFAULT_ROUTE= ++ export OPENVPN_PROVIDER=custom ++ OPENVPN_PROVIDER=custom ++ export TRANSMISSION_RPC_PORT=9091 ++ TRANSMISSION_RPC_PORT=9091 ++ export TRANSMISSION_WEB_UI=flood-for-transmission ++ TRANSMISSION_WEB_UI=flood-for-transmission ++ export TRANSMISSION_DOWNLOAD_DIR=/data/torrents ++ TRANSMISSION_DOWNLOAD_DIR=/data/torrents ++ export TRANSMISSION_RPC_USERNAME= ++ TRANSMISSION_RPC_USERNAME= ++ export LOG_TO_STDOUT=false ++ LOG_TO_STDOUT=false ++ export WEBPROXY_ENABLED=false ++ WEBPROXY_ENABLED=false ++ export TRANSMISSION_INCOMPLETE_DIR=/data/incomplete ++ TRANSMISSION_INCOMPLETE_DIR=/data/incomplete ++ export GLOBAL_APPLY_PERMISSIONS=true ++ GLOBAL_APPLY_PERMISSIONS=true ++ export CONFIG=/etc/openvpn/custom/ca.protonvpn.udp.ovpn ++ CONFIG=/etc/openvpn/custom/ca.protonvpn.udp.ovpn ++ export TRANSMISSION_HOME=/config/transmission-home ++ TRANSMISSION_HOME=/config/transmission-home ++ export DEBUG=true ++ DEBUG=true ++ export WEBPROXY_PORT=8118 ++ WEBPROXY_PORT=8118 ++ export TRANSMISSION_WATCH_DIR=/data/watch ++ TRANSMISSION_WATCH_DIR=/data/watch
- echo 'Up script executed with device=tun0 ifconfig_local=10.96.0.44' Up script executed with device=tun0 ifconfig_local=10.96.0.44
- [[ 10.96.0.44 = '' ]]
- USER_SCRIPT_ARGS=("$dev" "$tun_mtu" "$link_mtu" "$ifconfig_local" "$ifconfig_remote" "$script_context")
- [[ -x /scripts/transmission-pre-start.sh ]] Updating TRANSMISSION_BIND_ADDRESS_IPV4 to the ip of tun0 : 10.96.0.44
- echo 'Updating TRANSMISSION_BIND_ADDRESS_IPV4 to the ip of tun0 : 10.96.0.44'
- export TRANSMISSION_BIND_ADDRESS_IPV4=10.96.0.44
- TRANSMISSION_BIND_ADDRESS_IPV4=10.96.0.44
- sed -i /TRANSMISSION_BIND_ADDRESS_IPV4/d /etc/transmission/environment-variables.sh
- echo 'export TRANSMISSION_BIND_ADDRESS_IPV4=10.96.0.44'
- [[ combustion = \f\l\o\o\d-\f\o\r-\t\r\a\n\s\m\i\s\s\i\o\n ]]
- [[ kettu = \f\l\o\o\d-\f\o\r-\t\r\a\n\s\m\i\s\s\i\o\n ]]
- [[ transmission-web-control = \f\l\o\o\d-\f\o\r-\t\r\a\n\s\m\i\s\s\i\o\n ]]
- [[ flood-for-transmission = \f\l\o\o\d-\f\o\r-\t\r\a\n\s\m\i\s\s\i\o\n ]]
- echo 'Using Flood for Transmission UI, overriding TRANSMISSION_WEB_HOME'
- export TRANSMISSION_WEB_HOME=/opt/transmission-ui/flood-for-transmission Using Flood for Transmission UI, overriding TRANSMISSION_WEB_HOME
- TRANSMISSION_WEB_HOME=/opt/transmission-ui/flood-for-transmission
- [[ shift = \f\l\o\o\d-\f\o\r-\t\r\a\n\s\m\i\s\s\i\o\n ]]
- [[ transmissionic = \f\l\o\o\d-\f\o\r-\t\r\a\n\s\m\i\s\s\i\o\n ]]
- case ${TRANSMISSION_LOG_LEVEL,,} in
- export TRANSMISSION_LOGGING=
- TRANSMISSION_LOGGING=
- . /etc/transmission/userSetup.sh ++ source /etc/openvpn/utils.sh +++ DEBUG=true +++ [[ true != \f\a\l\s\e ]] +++ set -x ++ RUN_AS=root ++ '[' -n 1000 ']' +++ id -u root ++ '[' '!' 0 -eq 1000 ']' ++ RUN_AS=abc +++ id -u abc ++ '[' '!' 911 -eq 1000 ']' ++ usermod -o -u 1000 abc ++ '[' -n 1000 ']' +++ id -g abc ++ '[' '!' 1001 -eq 1000 ']' ++ groupmod -o -g 1000 abc ++ [[ true = \f\a\l\s\e ]] ++ mkdir -p /config /config/transmission-home /data/torrents /data/incomplete /data/watch ++ echo 'Enforcing ownership on transmission directories' Enforcing ownership on transmission directories ++ chown -R abc:abc /config /config/transmission-home Applying permissions to transmission directories ++ echo 'Applying permissions to transmission directories' ++ chmod -R go=rX,u=rwX /config /config/transmission-home Setting owner for transmission paths to 1000:1000 ++ '[' true = true ']' ++ echo 'Setting owner for transmission paths to 1000:1000' ++ chown -R abc:abc /data/torrents /data/incomplete /data/watch ++ echo 'Setting permissions for download and incomplete directories' ++ '[' -z '' ']' Setting permissions for download and incomplete directories +++ jq .umask /config/transmission-home/settings.json +++ tr -d '"' ++ TRANSMISSION_UMASK=000 +++ printf '%o\n' 000 ++ TRANSMISSION_UMASK_OCTAL=0 +++ printf '%o\n' 511 ++ DIR_PERMS=777 +++ printf '%o\n' 438 umask: 0 ++ FILE_PERMS=666 ++ echo 'umask: 0' ++ echo 'Directories: 777' ++ echo 'Files: 666' ++ find /data/torrents /data/incomplete -type d -exec chmod 777 '{}' + Directories: 777 Files: 666 ++ find /data/torrents /data/incomplete -type f -exec chmod 666 '{}' + ++ echo 'Setting permission for watch directory (775) and its files (664)' ++ chmod -R o=rX,ug=rwX /data/watch Setting permission for watch directory (775) and its files (664) +++ id -u abc +++ id -g abc ++ echo '
Transmission will run as
User name: abc User uid: 1000 User gid: 1000
' ++ export PUID ++ export PGID ++ export RUN_AS
Transmission will run as
User name: abc User uid: 1000 User gid: 1000
- echo 'Updating Transmission settings.json with values from env variables' Updating Transmission settings.json with values from env variables
- mkdir -p /config/transmission-home
- python3 /etc/transmission/updateSettings.py /etc/transmission/default-settings.json /config/transmission-home/settings.json Attempting to use existing settings.json for Transmission Successfully used existing settings.json /config/transmission-home/settings.json Overriding bind-address-ipv4 because TRANSMISSION_BIND_ADDRESS_IPV4 is set to 10.96.0.44 Overriding download-dir because TRANSMISSION_DOWNLOAD_DIR is set to /data/torrents Overriding incomplete-dir because TRANSMISSION_INCOMPLETE_DIR is set to /data/incomplete Overriding rpc-password because TRANSMISSION_RPC_PASSWORD is set to [REDACTED] Overriding rpc-port because TRANSMISSION_RPC_PORT is set to 9091 Overriding rpc-username because TRANSMISSION_RPC_USERNAME is set to Overriding watch-dir because TRANSMISSION_WATCH_DIR is set to /data/watch sed'ing True to true
- echo 'sed'''ing True to true'
- sed -i s/True/true/g /config/transmission-home/settings.json
- [[ ! -e /dev/random ]]
- [[ true = '' ]]
- [[ true = \f\a\l\s\e ]]
- LOGFILE=/config/transmission-home/transmission.log
- echo 'STARTING TRANSMISSION' STARTING TRANSMISSION
- [[ -f /etc/openvpn/custom/update-port.sh ]]
- [[ -z '' ]]
- echo 'Provider CUSTOM has a script for automatic port forwarding. Will run it now.' Provider CUSTOM has a script for automatic port forwarding. Will run it now. If you want to disable this, set environment variable DISABLE_PORT_UPDATER=true
- echo 'If you want to disable this, set environment variable DISABLE_PORT_UPDATER=true'
- exec su --preserve-environment abc -s /bin/bash -c '/usr/local/bin/transmission-daemon -g /config/transmission-home --logfile /config/transmission-home/transmission.log'
- [[ -x /scripts/transmission-post-start.sh ]] Transmission startup script complete.
- echo 'Transmission startup script complete.'
- exec /etc/openvpn/custom/update-port.sh
- [[ -f /opt/privoxy/start.sh ]]
- [[ -x /opt/privoxy/start.sh ]]
- /opt/privoxy/start.sh
- [[ false = \t\r\u\e ]]
- exit 0 2025-02-04 02:46:35 Initialization Sequence Completed /usr/bin/jq /usr/bin/natpmpc ╭───────────────────────────╮ │ ProtonVPN Port Forwarding │ ╰───────────────────────────╯ ╭──────────────────────────────╮ │ The Forwarded Port is: 38268 │ ╰──────────────────────────────╯
HW/SW Environment
- OS: Ubuntu Server 24.04.1 LTS
- Docker: Docker version 27.5.1, build 9f9e405
Anything else?
No response