nixpkgs/nixos/modules/services/networking/zeronet.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

138 lines
3 KiB
Nix
Raw Normal View History

2018-08-31 05:40:23 -05:00
{
config,
lib,
pkgs,
...
}:
let
inherit (lib)
generators
literalExpression
mkEnableOption
mkPackageOption
mkIf
mkOption
recursiveUpdate
types
;
2018-08-31 05:40:23 -05:00
cfg = config.services.zeronet;
dataDir = "/var/lib/zeronet";
configFile = pkgs.writeText "zeronet.conf" (
generators.toINI { } (recursiveUpdate defaultSettings cfg.settings)
);
defaultSettings = {
global = {
data_dir = dataDir;
log_dir = dataDir;
ui_port = cfg.port;
fileserver_port = cfg.fileserverPort;
tor =
if !cfg.tor then
"disable"
else if cfg.torAlways then
"always"
else
"enable";
};
2018-08-31 05:40:23 -05:00
};
in
with lib;
{
options.services.zeronet = {
enable = mkEnableOption "zeronet";
package = mkPackageOption pkgs "zeronet" { };
2022-05-21 17:06:28 +02:00
settings = mkOption {
2021-07-02 10:47:18 +00:00
type =
with types;
attrsOf (
attrsOf (oneOf [
str
int
bool
(listOf str)
])
);
default = { };
example = literalExpression "{ global.tor = enable; }";
2018-08-31 05:40:23 -05:00
description = ''
{file}`zeronet.conf` configuration. Refer to
<https://zeronet.readthedocs.io/en/latest/faq/#is-it-possible-to-use-a-configuration-file>
for details on supported values;
'';
2018-08-31 05:40:23 -05:00
};
port = mkOption {
2021-08-01 13:09:26 +02:00
type = types.port;
default = 43110;
description = "Optional zeronet web UI port.";
2018-08-31 05:40:23 -05:00
};
fileserverPort = mkOption {
# Not optional: when absent zeronet tries to write one to the
# read-only config file and crashes
2021-08-01 13:09:26 +02:00
type = types.port;
default = 12261;
description = "Zeronet fileserver port.";
};
2018-08-31 05:40:23 -05:00
tor = mkOption {
type = types.bool;
default = false;
description = "Use TOR for zeronet traffic where possible.";
};
torAlways = mkOption {
2018-08-31 05:40:23 -05:00
type = types.bool;
default = false;
description = "Use TOR for all zeronet traffic.";
};
};
config = mkIf cfg.enable {
services.tor = mkIf cfg.tor {
enable = true;
controlPort = 9051;
extraConfig = ''
CacheDirectoryGroupReadable 1
CookieAuthentication 1
CookieAuthFileGroupReadable 1
'';
2018-08-31 05:40:23 -05:00
};
2018-08-31 05:40:23 -05:00
systemd.services.zeronet = {
description = "zeronet";
2022-05-21 18:34:10 +02:00
after = [ "network.target" ] ++ optional cfg.tor "tor.service";
2018-08-31 05:40:23 -05:00
wantedBy = [ "multi-user.target" ];
serviceConfig = {
User = "zeronet";
DynamicUser = true;
StateDirectory = "zeronet";
SupplementaryGroups = mkIf cfg.tor [ "tor" ];
2022-05-21 17:06:28 +02:00
ExecStart = "${cfg.package}/bin/zeronet --config_file ${configFile}";
2018-08-31 05:40:23 -05:00
};
};
};
imports = [
(mkRemovedOptionModule [
"services"
"zeronet"
"dataDir"
] "Zeronet will store data by default in /var/lib/zeronet")
(mkRemovedOptionModule [
"services"
"zeronet"
"logDir"
] "Zeronet will log by default in /var/lib/zeronet")
];
meta.maintainers = with maintainers; [ Madouura ];
2018-08-31 05:40:23 -05:00
}