aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/nixos/modules/services/networking/zeronet.nix
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/nixos/modules/services/networking/zeronet.nix')
-rw-r--r--nixpkgs/nixos/modules/services/networking/zeronet.nix122
1 files changed, 122 insertions, 0 deletions
diff --git a/nixpkgs/nixos/modules/services/networking/zeronet.nix b/nixpkgs/nixos/modules/services/networking/zeronet.nix
new file mode 100644
index 00000000000..f4988a90268
--- /dev/null
+++ b/nixpkgs/nixos/modules/services/networking/zeronet.nix
@@ -0,0 +1,122 @@
+{ config, lib, pkgs, ... }:
+
+let
+ cfg = config.services.zeronet;
+
+ zConfFile = pkgs.writeTextFile {
+ name = "zeronet.conf";
+
+ text = ''
+ [global]
+ data_dir = ${cfg.dataDir}
+ log_dir = ${cfg.logDir}
+ '' + lib.optionalString (cfg.port != null) ''
+ ui_port = ${toString cfg.port}
+ '' + lib.optionalString (cfg.fileserverPort != null) ''
+ fileserver_port = ${toString cfg.fileserverPort}
+ '' + lib.optionalString (cfg.torAlways) ''
+ tor = always
+ '' + cfg.extraConfig;
+ };
+in with lib; {
+ options.services.zeronet = {
+ enable = mkEnableOption "zeronet";
+
+ dataDir = mkOption {
+ type = types.path;
+ default = "/var/lib/zeronet";
+ example = "/home/okina/zeronet";
+ description = "Path to the zeronet data directory.";
+ };
+
+ logDir = mkOption {
+ type = types.path;
+ default = "/var/log/zeronet";
+ example = "/home/okina/zeronet/log";
+ description = "Path to the zeronet log directory.";
+ };
+
+ port = mkOption {
+ type = types.nullOr types.int;
+ default = null;
+ example = 43110;
+ description = "Optional zeronet web UI port.";
+ };
+
+ fileserverPort = mkOption {
+ # Not optional: when absent zeronet tries to write one to the
+ # read-only config file and crashes
+ type = types.int;
+ default = 12261;
+ example = 12261;
+ description = "Zeronet fileserver port.";
+ };
+
+ tor = mkOption {
+ type = types.bool;
+ default = false;
+ description = "Use TOR for zeronet traffic where possible.";
+ };
+
+ torAlways = mkOption {
+ type = types.bool;
+ default = false;
+ description = "Use TOR for all zeronet traffic.";
+ };
+
+ extraConfig = mkOption {
+ type = types.lines;
+ default = "";
+
+ description = ''
+ Extra configuration. Contents will be added verbatim to the
+ configuration file at the end.
+ '';
+ };
+ };
+
+ config = mkIf cfg.enable {
+ services.tor = mkIf cfg.tor {
+ enable = true;
+ controlPort = 9051;
+ extraConfig = ''
+ CacheDirectoryGroupReadable 1
+ CookieAuthentication 1
+ CookieAuthFileGroupReadable 1
+ '';
+ };
+
+ systemd.tmpfiles.rules = [
+ "d '${cfg.dataDir}' 750 zeronet zeronet - -"
+ "d '${cfg.logDir}' 750 zeronet zeronet - -"
+ ];
+
+ systemd.services.zeronet = {
+ description = "zeronet";
+ after = [ "network.target" (optionalString cfg.tor "tor.service") ];
+ wantedBy = [ "multi-user.target" ];
+
+ serviceConfig = {
+ PrivateTmp = "yes";
+ User = "zeronet";
+ Group = "zeronet";
+ ExecStart = "${pkgs.zeronet}/bin/zeronet --config_file ${zConfFile}";
+ };
+ };
+
+ users = {
+ groups.zeronet.gid = config.ids.gids.zeronet;
+
+ users.zeronet = {
+ description = "zeronet service user";
+ home = cfg.dataDir;
+ createHome = true;
+ group = "zeronet";
+ extraGroups = mkIf cfg.tor [ "tor" ];
+ uid = config.ids.uids.zeronet;
+ };
+ };
+ };
+
+ meta.maintainers = with maintainers; [ chiiruno ];
+}