Merge pull request #288687 from nu-nu-ko/nixos-navidrome-cleanup

nixos/navidrome: add user/group options, ensure dirs exist/are valid & format changes
This commit is contained in:
éclairevoyant 2024-05-10 11:05:12 +00:00 committed by GitHub
commit 064fe27cf1
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
3 changed files with 108 additions and 57 deletions

View file

@ -1,11 +1,17 @@
{ config, lib, pkgs, ... }: {
config,
with lib; lib,
pkgs,
...
}:
let let
inherit (lib) mkEnableOption mkPackageOption mkOption maintainers;
inherit (lib.types) bool str;
cfg = config.services.navidrome; cfg = config.services.navidrome;
settingsFormat = pkgs.formats.json {}; settingsFormat = pkgs.formats.json { };
in { in
{
options = { options = {
services.navidrome = { services.navidrome = {
@ -13,9 +19,8 @@ in {
package = mkPackageOption pkgs "navidrome" { }; package = mkPackageOption pkgs "navidrome" { };
settings = mkOption rec { settings = mkOption {
type = settingsFormat.type; type = settingsFormat.type;
apply = recursiveUpdate default;
default = { default = {
Address = "127.0.0.1"; Address = "127.0.0.1";
Port = 4533; Port = 4533;
@ -23,45 +28,78 @@ in {
example = { example = {
MusicFolder = "/mnt/music"; MusicFolder = "/mnt/music";
}; };
description = '' description = "Configuration for Navidrome, see <https://www.navidrome.org/docs/usage/configuration-options/> for supported values.";
Configuration for Navidrome, see <https://www.navidrome.org/docs/usage/configuration-options/> for supported values. };
'';
user = mkOption {
type = str;
default = "navidrome";
description = "User under which Navidrome runs.";
};
group = mkOption {
type = str;
default = "navidrome";
description = "Group under which Navidrome runs.";
}; };
openFirewall = mkOption { openFirewall = mkOption {
type = types.bool; type = bool;
default = false; default = false;
description = "Whether to open the TCP port in the firewall"; description = "Whether to open the TCP port in the firewall";
}; };
}; };
}; };
config = mkIf cfg.enable { config =
networking.firewall.allowedTCPPorts = mkIf cfg.openFirewall [cfg.settings.Port]; let
inherit (lib) mkIf optional getExe;
systemd.services.navidrome = { WorkingDirectory = "/var/lib/navidrome";
in
mkIf cfg.enable {
systemd = {
tmpfiles.settings.navidromeDirs = {
"${cfg.settings.DataFolder or WorkingDirectory}"."d" = {
mode = "700";
inherit (cfg) user group;
};
"${cfg.settings.CacheFolder or (WorkingDirectory + "/cache")}"."d" = {
mode = "700";
inherit (cfg) user group;
};
};
services.navidrome = {
description = "Navidrome Media Server"; description = "Navidrome Media Server";
after = [ "network.target" ]; after = [ "network.target" ];
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
serviceConfig = { serviceConfig = {
ExecStart = '' ExecStart = ''
${cfg.package}/bin/navidrome --configfile ${settingsFormat.generate "navidrome.json" cfg.settings} ${getExe cfg.package} --configfile ${settingsFormat.generate "navidrome.json" cfg.settings}
''; '';
DynamicUser = true; User = cfg.user;
Group = cfg.group;
StateDirectory = "navidrome"; StateDirectory = "navidrome";
WorkingDirectory = "/var/lib/navidrome"; inherit WorkingDirectory;
RuntimeDirectory = "navidrome"; RuntimeDirectory = "navidrome";
RootDirectory = "/run/navidrome"; RootDirectory = "/run/navidrome";
ReadWritePaths = ""; ReadWritePaths = "";
BindPaths = lib.optional (cfg.settings ? DataFolder) cfg.settings.DataFolder; BindPaths =
optional (cfg.settings ? DataFolder) cfg.settings.DataFolder
++ optional (cfg.settings ? CacheFolder) cfg.settings.CacheFolder;
BindReadOnlyPaths = [ BindReadOnlyPaths = [
# navidrome uses online services to download additional album metadata / covers # navidrome uses online services to download additional album metadata / covers
"${config.environment.etc."ssl/certs/ca-certificates.crt".source}:/etc/ssl/certs/ca-certificates.crt" "${
config.environment.etc."ssl/certs/ca-certificates.crt".source
}:/etc/ssl/certs/ca-certificates.crt"
builtins.storeDir builtins.storeDir
"/etc" "/etc"
] ++ lib.optional (cfg.settings ? MusicFolder) cfg.settings.MusicFolder; ] ++ optional (cfg.settings ? MusicFolder) cfg.settings.MusicFolder;
CapabilityBoundingSet = ""; CapabilityBoundingSet = "";
RestrictAddressFamilies = [ "AF_UNIX" "AF_INET" "AF_INET6" ]; RestrictAddressFamilies = [
"AF_UNIX"
"AF_INET"
"AF_INET6"
];
RestrictNamespaces = true; RestrictNamespaces = true;
PrivateDevices = true; PrivateDevices = true;
PrivateUsers = true; PrivateUsers = true;
@ -72,7 +110,10 @@ in {
ProtectKernelModules = true; ProtectKernelModules = true;
ProtectKernelTunables = true; ProtectKernelTunables = true;
SystemCallArchitectures = "native"; SystemCallArchitectures = "native";
SystemCallFilter = [ "@system-service" "~@privileged" ]; SystemCallFilter = [
"@system-service"
"~@privileged"
];
RestrictRealtime = true; RestrictRealtime = true;
LockPersonality = true; LockPersonality = true;
MemoryDenyWriteExecute = true; MemoryDenyWriteExecute = true;
@ -81,4 +122,17 @@ in {
}; };
}; };
}; };
users.users = mkIf (cfg.user == "navidrome") {
navidrome = {
inherit (cfg) group;
isSystemUser = true;
};
};
users.groups = mkIf (cfg.group == "navidrome") { navidrome = { }; };
networking.firewall.allowedTCPPorts = mkIf cfg.openFirewall [ cfg.settings.Port ];
};
meta.maintainers = with maintainers; [ nu-nu-ko ];
} }

View file

@ -10,7 +10,6 @@
, ffmpeg-headless , ffmpeg-headless
, taglib , taglib
, zlib , zlib
, makeWrapper
, nixosTests , nixosTests
, nix-update-script , nix-update-script
, ffmpegSupport ? true , ffmpegSupport ? true

View file

@ -40954,8 +40954,6 @@ with pkgs;
gpio-utils = callPackage ../os-specific/linux/kernel/gpio-utils.nix { }; gpio-utils = callPackage ../os-specific/linux/kernel/gpio-utils.nix { };
navidrome = callPackage ../servers/misc/navidrome { };
zalgo = callPackage ../tools/misc/zalgo { }; zalgo = callPackage ../tools/misc/zalgo { };
inherit (callPackage ../applications/misc/zettlr { }) zettlr; inherit (callPackage ../applications/misc/zettlr { }) zettlr;