Added flake.nix for Nix and NixOS deployment

This commit is contained in:
Ben Wagner
2025-12-14 11:44:51 -05:00
parent 2dd0964f76
commit 2b0a910419
2 changed files with 292 additions and 0 deletions

82
flake.lock generated Normal file
View File

@@ -0,0 +1,82 @@
{
"nodes": {
"flake-utils": {
"inputs": {
"systems": "systems"
},
"locked": {
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"nixpkgs": {
"locked": {
"lastModified": 1765472234,
"narHash": "sha256-9VvC20PJPsleGMewwcWYKGzDIyjckEz8uWmT0vCDYK0=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "2fbfb1d73d239d2402a8fe03963e37aab15abe8b",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"root": {
"inputs": {
"flake-utils": "flake-utils",
"nixpkgs": "nixpkgs",
"rust-overlay": "rust-overlay"
}
},
"rust-overlay": {
"inputs": {
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1765680428,
"narHash": "sha256-fyPmRof9SZeI14ChPk5rVPOm7ISiiGkwGCunkhM+eUg=",
"owner": "oxalica",
"repo": "rust-overlay",
"rev": "eb3898d8ef143d4bf0f7f2229105fc51c7731b2f",
"type": "github"
},
"original": {
"owner": "oxalica",
"repo": "rust-overlay",
"type": "github"
}
},
"systems": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
}
},
"root": "root",
"version": 7
}

210
flake.nix Normal file
View File

@@ -0,0 +1,210 @@
{
description = "Jellyswarrm - Bring all your Jellyfin servers together";
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
flake-utils.url = "github:numtide/flake-utils";
rust-overlay = {
url = "github:oxalica/rust-overlay";
inputs.nixpkgs.follows = "nixpkgs";
};
};
outputs = { self, nixpkgs, flake-utils, rust-overlay }:
flake-utils.lib.eachDefaultSystem (system:
let
overlays = [ (import rust-overlay) ];
pkgs = import nixpkgs {
inherit system overlays;
};
# Import jellyfin-web from nixpkgs instead of building ui
jellyfinWeb = pkgs.jellyfin-web;
rustToolchain = pkgs.rust-bin.stable.latest.default.override {
extensions = [ "rust-src" ];
};
jellyswarrm = pkgs.rustPlatform.buildRustPackage rec{
pname = "jellyswarrm";
version = "0.2.0";
src = pkgs.fetchFromGitHub {
owner = "LLukas22";
repo = "Jellyswarrm";
rev = "v${version}";
# Hash must be updated upon new release of Jellyswarrm
sha256 = "sha256-UvHZ5u9mSzMc7OxJF+diQmaxmXt+wXsVA6bI23TW8vw=";
};
# Hash must be updated upon new release of Jellyswarrm
cargoHash = "sha256-aWMW/mACrdCQWCi+9+2jQXYYEE1e84xlFWexr+SzM2o=";
buildInputs = with pkgs; [
jellyfin-web
];
env = {
# Skip internal UI build since we are using the nix package for jellyfin-web
JELLYSWARRM_SKIP_UI = "1";
};
preBuild = ''
# Move the contents of pre-built jellyfin-web to the cargo
mkdir -p crates/jellyswarrm-proxy/static
cp -r ${jellyfinWeb}/share/jellyfin-web/* crates/jellyswarrm-proxy/static/
# ui-version.env is required for the cargo build
cat > crates/jellyswarrm-proxy/static/ui-version.env <<EOF
UI_VERSION=${jellyfinWeb.version}
UI_COMMIT=nix
EOF
'';
};
in
{
packages = {
default = jellyswarrm;
jellyswarrm = jellyswarrm;
};
}
) // {
# NixOS module for the service
nixosModules.default = { config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.jellyswarrm;
in
{
options.services.jellyswarrm = {
enable = mkEnableOption "Jellyswarrm reverse proxy for Jellyfin servers";
package = mkOption {
type = types.package;
default = self.packages.${pkgs.stdenv.hostPlatform.system}.jellyswarrm;
defaultText = literalExpression "self.packages.\${pkgs.stdenv.hostPlatform.system}.jellyswarrm";
description = "The Jellyswarrm package to use";
};
user = mkOption {
type = types.str;
default = "jellyswarrm";
description = "User account under which Jellyswarrm runs";
};
group = mkOption {
type = types.str;
default = "jellyswarrm";
description = "Group under which Jellyswarrm runs";
};
dataDir = mkOption {
type = types.path;
default = "/var/lib/jellyswarrm";
description = "Directory where Jellyswarrm stores its data";
};
host = mkOption {
type = types.str;
default = "0.0.0.0";
description = "Host address to bind to";
};
port = mkOption {
type = types.port;
default = 3000;
description = "Port to listen on";
};
username = mkOption {
type = types.str;
default = "admin";
description = "Admin username for Jellyswarrm UI";
};
passwordFile = mkOption {
type = types.nullOr types.path;
default = null;
description = ''
Path to a file containing the admin password.
If not set, defaults to "jellyswarrm" (insecure).
'';
};
openFirewall = mkOption {
type = types.bool;
default = false;
description = "Open the firewall for the Jellyswarrm port";
};
extraEnvironment = mkOption {
type = types.attrsOf types.str;
default = {};
description = "Extra environment variables to pass to Jellyswarrm";
example = {
RUST_LOG = "info";
};
};
};
config = mkIf cfg.enable {
users.users.${cfg.user} = {
isSystemUser = true;
group = cfg.group;
home = cfg.dataDir;
createHome = true;
description = "Jellyswarrm service user";
};
users.groups.${cfg.group} = {};
systemd.services.jellyswarrm = {
description = "Jellyswarrm Jellyfin reverse proxy";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "simple";
User = cfg.user;
Group = cfg.group;
ExecStart = "${cfg.package}/bin/jellyswarrm-proxy";
WorkingDirectory = cfg.dataDir;
Restart = "on-failure";
RestartSec = "5s";
# Security hardening
NoNewPrivileges = true;
PrivateTmp = true;
ProtectSystem = "strict";
ProtectHome = true;
ReadWritePaths = [ cfg.dataDir ];
ProtectKernelTunables = true;
ProtectKernelModules = true;
ProtectControlGroups = true;
RestrictAddressFamilies = [ "AF_INET" "AF_INET6" "AF_UNIX" ];
RestrictNamespaces = true;
LockPersonality = true;
RestrictRealtime = true;
RestrictSUIDSGID = true;
RemoveIPC = true;
PrivateMounts = true;
};
environment = {
JELLYSWARRM_HOST = cfg.host;
JELLYSWARRM_PORT = toString cfg.port;
JELLYSWARRM_USERNAME = cfg.username;
JELLYSWARRM_DATA_DIR = cfg.dataDir;
JELLYSWARRM_PASSWORD = if cfg.passwordFile != null
then builtins.readFile cfg.passwordFile
else "jellyswarrm";
} // cfg.extraEnvironment;
};
networking.firewall = mkIf cfg.openFirewall {
allowedTCPPorts = [ cfg.port ];
};
};
};
};
}