mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-06-10 19:55:41 +03:00
157 lines
4 KiB
Nix
157 lines
4 KiB
Nix
{
|
|
config,
|
|
lib,
|
|
pkgs,
|
|
utils,
|
|
...
|
|
}:
|
|
|
|
let
|
|
cfg = config.services.recyclarr;
|
|
format = pkgs.formats.yaml { };
|
|
stateDir = "/var/lib/recyclarr";
|
|
configPath = "${stateDir}/config.json";
|
|
in
|
|
{
|
|
options.services.recyclarr = {
|
|
enable = lib.mkEnableOption "recyclarr service";
|
|
|
|
package = lib.mkPackageOption pkgs "recyclarr" { };
|
|
|
|
configuration = lib.mkOption {
|
|
type = format.type;
|
|
default = { };
|
|
example = {
|
|
sonarr = [
|
|
{
|
|
instance_name = "main";
|
|
base_url = "http://localhost:8989";
|
|
api_key = {
|
|
_secret = "/run/credentials/recyclarr.service/sonarr-api_key";
|
|
};
|
|
}
|
|
];
|
|
radarr = [
|
|
{
|
|
instance_name = "main";
|
|
base_url = "http://localhost:7878";
|
|
api_key = {
|
|
_secret = "/run/credentials/recyclarr.service/radarr-api_key";
|
|
};
|
|
}
|
|
];
|
|
};
|
|
description = ''
|
|
Recyclarr YAML configuration as a Nix attribute set.
|
|
|
|
For detailed configuration options and examples, see the
|
|
[official configuration reference](https://recyclarr.dev/wiki/yaml/config-reference/).
|
|
|
|
The configuration is processed using [utils.genJqSecretsReplacementSnippet](https://github.com/NixOS/nixpkgs/blob/master/nixos/lib/utils.nix#L232-L331) to handle secret substitution.
|
|
|
|
To avoid permission issues, secrets should be provided via systemd's credential mechanism:
|
|
|
|
```nix
|
|
systemd.services.recyclarr.serviceConfig.LoadCredential = [
|
|
"radarr-api_key:''${config.sops.secrets.radarr-api_key.path}"
|
|
];
|
|
```
|
|
'';
|
|
};
|
|
|
|
schedule = lib.mkOption {
|
|
type = lib.types.str;
|
|
default = "daily";
|
|
description = "When to run recyclarr in systemd calendar format.";
|
|
};
|
|
|
|
command = lib.mkOption {
|
|
type = lib.types.str;
|
|
default = "sync";
|
|
description = "The recyclarr command to run (e.g., sync).";
|
|
};
|
|
|
|
user = lib.mkOption {
|
|
type = lib.types.str;
|
|
default = "recyclarr";
|
|
description = "User account under which recyclarr runs.";
|
|
};
|
|
|
|
group = lib.mkOption {
|
|
type = lib.types.str;
|
|
default = "recyclarr";
|
|
description = "Group under which recyclarr runs.";
|
|
};
|
|
};
|
|
|
|
config = lib.mkIf cfg.enable {
|
|
|
|
users.users = lib.mkIf (cfg.user == "recyclarr") {
|
|
recyclarr = {
|
|
isSystemUser = true;
|
|
description = "recyclarr user";
|
|
home = stateDir;
|
|
group = cfg.group;
|
|
};
|
|
};
|
|
|
|
users.groups = lib.mkIf (cfg.group == "recyclarr") {
|
|
${cfg.group} = { };
|
|
};
|
|
|
|
systemd.services.recyclarr = {
|
|
description = "Recyclarr Service";
|
|
|
|
# YAML is a JSON super-set
|
|
preStart = utils.genJqSecretsReplacementSnippet cfg.configuration configPath;
|
|
|
|
serviceConfig = {
|
|
Type = "oneshot";
|
|
User = cfg.user;
|
|
Group = cfg.group;
|
|
StateDirectory = "recyclarr";
|
|
ExecStart = "${lib.getExe cfg.package} ${cfg.command} --app-data ${stateDir} --config ${configPath}";
|
|
|
|
ProtectSystem = "strict";
|
|
ProtectHome = true;
|
|
PrivateTmp = true;
|
|
PrivateDevices = true;
|
|
ProtectHostname = true;
|
|
ProtectClock = true;
|
|
ProtectKernelTunables = true;
|
|
ProtectKernelModules = true;
|
|
ProtectKernelLogs = true;
|
|
ProtectControlGroups = true;
|
|
|
|
PrivateNetwork = false;
|
|
RestrictAddressFamilies = [
|
|
"AF_INET"
|
|
"AF_INET6"
|
|
];
|
|
|
|
NoNewPrivileges = true;
|
|
RestrictSUIDSGID = true;
|
|
RemoveIPC = true;
|
|
|
|
ReadWritePaths = [ stateDir ];
|
|
|
|
CapabilityBoundingSet = "";
|
|
|
|
LockPersonality = true;
|
|
RestrictRealtime = true;
|
|
};
|
|
};
|
|
|
|
systemd.timers.recyclarr = {
|
|
description = "Recyclarr Timer";
|
|
wantedBy = [ "timers.target" ];
|
|
partOf = [ "recyclarr.service" ];
|
|
|
|
timerConfig = {
|
|
OnCalendar = cfg.schedule;
|
|
Persistent = true;
|
|
RandomizedDelaySec = "5m";
|
|
};
|
|
};
|
|
};
|
|
}
|