mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-06-10 19:55:41 +03:00

Format all Nix files using the officially approved formatter,
making the CI check introduced in the previous commit succeed:
nix-build ci -A fmt.check
This is the next step of the of the [implementation](https://github.com/NixOS/nixfmt/issues/153)
of the accepted [RFC 166](https://github.com/NixOS/rfcs/pull/166).
This commit will lead to merge conflicts for a number of PRs,
up to an estimated ~1100 (~33%) among the PRs with activity in the past 2
months, but that should be lower than what it would be without the previous
[partial treewide format](https://github.com/NixOS/nixpkgs/pull/322537).
Merge conflicts caused by this commit can now automatically be resolved while rebasing using the
[auto-rebase script](8616af08d9/maintainers/scripts/auto-rebase
).
If you run into any problems regarding any of this, please reach out to the
[formatting team](https://nixos.org/community/teams/formatting/) by
pinging @NixOS/nix-formatting.
88 lines
1.8 KiB
Nix
88 lines
1.8 KiB
Nix
{
|
|
config,
|
|
lib,
|
|
pkgs,
|
|
...
|
|
}:
|
|
|
|
with lib;
|
|
|
|
let
|
|
|
|
cfg = config.services.sabnzbd;
|
|
inherit (pkgs) sabnzbd;
|
|
|
|
in
|
|
|
|
{
|
|
|
|
###### interface
|
|
|
|
options = {
|
|
services.sabnzbd = {
|
|
enable = mkEnableOption "the sabnzbd server";
|
|
|
|
package = mkPackageOption pkgs "sabnzbd" { };
|
|
|
|
configFile = mkOption {
|
|
type = types.path;
|
|
default = "/var/lib/sabnzbd/sabnzbd.ini";
|
|
description = "Path to config file.";
|
|
};
|
|
|
|
user = mkOption {
|
|
default = "sabnzbd";
|
|
type = types.str;
|
|
description = "User to run the service as";
|
|
};
|
|
|
|
group = mkOption {
|
|
type = types.str;
|
|
default = "sabnzbd";
|
|
description = "Group to run the service as";
|
|
};
|
|
|
|
openFirewall = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Open ports in the firewall for the sabnzbd web interface
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
###### implementation
|
|
|
|
config = mkIf cfg.enable {
|
|
users.users = mkIf (cfg.user == "sabnzbd") {
|
|
sabnzbd = {
|
|
uid = config.ids.uids.sabnzbd;
|
|
group = cfg.group;
|
|
description = "sabnzbd user";
|
|
};
|
|
};
|
|
|
|
users.groups = mkIf (cfg.group == "sabnzbd") {
|
|
sabnzbd.gid = config.ids.gids.sabnzbd;
|
|
};
|
|
|
|
systemd.services.sabnzbd = {
|
|
description = "sabnzbd server";
|
|
wantedBy = [ "multi-user.target" ];
|
|
after = [ "network.target" ];
|
|
serviceConfig = {
|
|
Type = "forking";
|
|
GuessMainPID = "no";
|
|
User = cfg.user;
|
|
Group = cfg.group;
|
|
StateDirectory = "sabnzbd";
|
|
ExecStart = "${lib.getBin cfg.package}/bin/sabnzbd -d -f ${cfg.configFile}";
|
|
};
|
|
};
|
|
|
|
networking.firewall = mkIf cfg.openFirewall {
|
|
allowedTCPPorts = [ 8080 ];
|
|
};
|
|
};
|
|
}
|