Package Details: radarr 0.2.0.1120-1

Git Clone URL: https://aur.archlinux.org/radarr.git (read-only)
Package Base: radarr
Description: Movie download automation for usenet and torrents.
Upstream URL: https://github.com/Radarr/Radarr
Licenses: GPL3
Submitter: fryfrog
Maintainer: fryfrog (onedr0p)
Last Packager: fryfrog
Votes: 30
Popularity: 4.602372
First Submitted: 2016-12-29 18:44
Last Updated: 2018-09-09 21:50

Latest Comments

1 2 3 Next › Last »

fryfrog commented on 2018-09-09 21:51

@nicoulaj: Seems reasonable, updated this package and radarr-develop as well as a couple of the sonarr packages.

nicoulaj commented on 2018-09-09 16:11

I think the service starts too early at boot, I can see this stack trace with the sonarr package that uses the exact systemd service file:

Sep 09 17:53:29 storm sonarr[852]: [Error] TaskExtensions: Task Error
Sep 09 17:53:29 storm sonarr[852]: [v2.0.0.5228] System.Net.WebException: DNS Name Resolution Failure: 'services.sonarr.tv'
Sep 09 17:53:29 storm sonarr[852]:   at NzbDrone.Common.Http.Dispatchers.ManagedHttpDispatcher.GetResponse (NzbDrone.Common.Http.HttpRequest request, System.Net.CookieContainer cookies) [0x0015e] in <8faeb593f49341d6a7a6d2c3c281887c>:0
Sep 09 17:53:29 storm sonarr[852]:   at NzbDrone.Common.Http.Dispatchers.FallbackHttpDispatcher.GetResponse (NzbDrone.Common.Http.HttpRequest request, System.Net.CookieContainer cookies) [0x000b5] in <8faeb593f49341d6a7a6d2c3c281887c>:0
Sep 09 17:53:29 storm sonarr[852]:   at NzbDrone.Common.Http.HttpClient.ExecuteRequest (NzbDrone.Common.Http.HttpRequest request, System.Net.CookieContainer cookieContainer) [0x0007e] in <8faeb593f49341d6a7a6d2c3c281887c>:0
Sep 09 17:53:29 storm sonarr[852]:   at NzbDrone.Common.Http.HttpClient.Execute (NzbDrone.Common.Http.HttpRequest request) [0x00008] in <8faeb593f49341d6a7a6d2c3c281887c>:0
Sep 09 17:53:29 storm sonarr[852]:   at NzbDrone.Common.Http.HttpClient.Get (NzbDrone.Common.Http.HttpRequest request) [0x00007] in <8faeb593f49341d6a7a6d2c3c281887c>:0
Sep 09 17:53:29 storm sonarr[852]:   at NzbDrone.Common.Http.HttpClient.Get[T] (NzbDrone.Common.Http.HttpRequest request) [0x00000] in <8faeb593f49341d6a7a6d2c3c281887c>:0
Sep 09 17:53:29 storm sonarr[852]:   at NzbDrone.Core.Update.UpdatePackageProvider.GetLatestUpdate (System.String branch, System.Version currentVersion) [0x0006c] in <f8c4a2c9e6194b509efc6018724d76df>:0
Sep 09 17:53:29 storm sonarr[852]:   at NzbDrone.Core.Update.CheckUpdateService.AvailableUpdate () [0x00016] in <f8c4a2c9e6194b509efc6018724d76df>:0
Sep 09 17:53:29 storm sonarr[852]:   at NzbDrone.Core.HealthCheck.Checks.UpdateCheck.Check () [0x000f7] in <f8c4a2c9e6194b509efc6018724d76df>:0
Sep 09 17:53:29 storm sonarr[852]:   at NzbDrone.Core.HealthCheck.HealthCheckService+<>c.<PerformHealthCheck>b__11_0 (NzbDrone.Core.HealthCheck.IProvideHealthCheck c) [0x00000] in <f8c4a2c9e6194b509efc6018724d76df>:0
Sep 09 17:53:29 storm sonarr[852]:   at System.Linq.Enumerable+SelectArrayIterator`2[TSource,TResult].ToList () [0x00014] in <55cb1ea97846413983036e5d2581cc09>:0
Sep 09 17:53:29 storm sonarr[852]:   at System.Linq.Enumerable.ToList[TSource] (System.Collections.Generic.IEnumerable`1[T] source) [0x0001f] in <55cb1ea97846413983036e5d2581cc09>:0
Sep 09 17:53:29 storm sonarr[852]:   at NzbDrone.Core.HealthCheck.HealthCheckService.PerformHealthCheck (NzbDrone.Core.HealthCheck.IProvideHealthCheck[] healthChecks) [0x00025] in <f8c4a2c9e6194b509efc6018724d76df>:0
Sep 09 17:53:29 storm sonarr[852]:   at NzbDrone.Core.HealthCheck.HealthCheckService.HandleAsync (NzbDrone.Core.Lifecycle.ApplicationStartedEvent message) [0x00000] in <f8c4a2c9e6194b509efc6018724d76df>:0
Sep 09 17:53:29 storm sonarr[852]:   at NzbDrone.Core.Messaging.Events.EventAggregator+<>c__DisplayClass6_2`1[TEvent].<PublishEvent>b__1 () [0x00035] in <f8c4a2c9e6194b509efc6018724d76df>:0
Sep 09 17:53:29 storm sonarr[852]:   at System.Threading.Tasks.Task.InnerInvoke () [0x0000f] in <815942dd495d4ccc954b977c1d4bee11>:0
Sep 09 17:53:29 storm sonarr[852]:   at System.Threading.Tasks.Task.Execute () [0x00000] in <815942dd495d4ccc954b977c1d4bee11>:0

It is followed by NetworkManager startup traces. I think the correct way is:

Wants=network-online.target
After=network-online.target

fryfrog commented on 2018-05-28 21:46

@RenVilo: Are you... running Arch Linux on your QNAP?

RenVilo commented on 2018-05-28 21:41

I'm running a QNAP NAS with QMono, SABNZBD, Sonarr and Radarr. Everything boots up and is fine except that in Sonarr and Radarr I can't add an Indexer to www.nzbfinder.ws or any other provider. I've tested this from my PC's version and it works fine. I've read that you have to add "Environment=MONO_TLS_PROVIDER=legacy" but I have no idea how to do this and seems Mono vs QMono might have a different file structure. I can't find "sonarr.service" or the path "usr/lib/systemd/system"

Info on my versions:

Sonarr: V2.0.0.5163 QMono: V5.12.0.266 (of TS-X19 but have tried other previous releases of V5. No V4 available) OS: QNAP Version 4.3.3.0546

https://www.dropbox.com/s/xiwzpfgj87mbibx/sonarr.debug.txt?dl=0

https://www.dropbox.com/s/y09dkbz5yq2nw02/sonarr.trace.txt?dl=0

Please can someone assist.

fryfrog commented on 2018-04-29 21:41

@pezz: That is great! I'll add that as a #comment in the file, thanks for figuring it out, it is sure to help someone in the future. And it's okay that your idea of correct isn't correct! ;)

pezz commented on 2018-04-29 15:38

Heh, your idea of "more correct" is different to mine.

Anyway, I deleted my previous comment as I did some reading up on tmpfiles and anything in /etc/tmpfilles.d overrides anything the package puts in /usr/lib so I can easily make my own setup permanent.

So it's a non-issue now, apologies for the noise.

fryfrog commented on 2018-04-29 14:20

@pezz, I haven't forgot about your plight... but I still think it is better for most users to have the directories owned correctly. I'm trying to think of a good way to support your use case too. I tried simply modifying the tmpfiles.d file locally, but it gets over written. I could go back to some logic in the install file, but using tmpfiles really simplified all the packages I maintain. Have you considered just doing your install the more correct way? You could also just modify the tmpfile and make it immutable, but that is a poor solution. :/

Also, I can't see your most recently reply here. :/

fryfrog commented on 2018-04-19 14:53

True, Sonarr's AUR package doesn't and I don't see many instances of users w/ permissions issues.

That said, you totally can (and should) setup your environment so daemons run as their own users and files are owned the right way. You just use a shared group like media and a file permission of umask 002 which is 775 for folders and 664 for files. My Radarr runs as radarr, Sonarr as sonarr, NZBGet as nzbget, rTorrent as rtorrent and Plex as plex. I do use systemd unit over rides to change the group, they're all in a shared group, all setup to create files and folders w/ the right permissions. You need to start off w/ the right permissions, so a chown and chmod to get things sorted at the start. I use something like find /path -type f -exec chmod 664 '{}' ';' to fix files, d and 775 to fix folders.

pezz commented on 2018-04-19 14:08

I have Sonarr, Radarr, Kodi and some other things that all run as the same user so that they can interact with the media and storage directories.

Can't have 2 things (especially in the case of Sonarr and Radarr) run as 2 different users and expect them all to have a good time, I expect many people do the same.

Sonarr does not change the permissions of /var/lib/sonarr after a package update.

fryfrog commented on 2018-04-19 12:18

@pezz, I added the ownership of /usr/lib and /var/lib recently, mainly to fix most users setups. Though I think it still did it as part of post upgrade. Can you tell me a little about why you run as a different user? I'd like this package to work well for most people and I'm not sure which route would be better. Do more people bone their permissions and have issues or do more people run it as another user? :/