Files
Jellyswarrm/flake.nix
2025-12-15 20:29:08 -05:00

211 lines
6.8 KiB
Nix

{
description = "Jellyswarrm - Bring all your Jellyfin servers together";
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
flake-utils.url = "github:numtide/flake-utils";
rust-overlay = {
url = "github:oxalica/rust-overlay";
inputs.nixpkgs.follows = "nixpkgs";
};
};
outputs = { self, nixpkgs, flake-utils, rust-overlay }:
flake-utils.lib.eachDefaultSystem (system:
let
overlays = [ (import rust-overlay) ];
pkgs = import nixpkgs {
inherit system overlays;
};
# Import jellyfin-web from nixpkgs instead of building ui
jellyfinWeb = pkgs.jellyfin-web;
rustToolchain = pkgs.rust-bin.stable.latest.default.override {
extensions = [ "rust-src" ];
};
jellyswarrm = pkgs.rustPlatform.buildRustPackage rec{
pname = "jellyswarrm";
version = "0.2.0";
src = pkgs.fetchFromGitHub {
owner = "LLukas22";
repo = "Jellyswarrm";
rev = "v${version}";
# Hash must be updated upon new release of Jellyswarrm
sha256 = "sha256-UvHZ5u9mSzMc7OxJF+diQmaxmXt+wXsVA6bI23TW8vw=";
};
# Hash must be updated upon new release of Jellyswarrm
cargoHash = "sha256-aWMW/mACrdCQWCi+9+2jQXYYEE1e84xlFWexr+SzM2o=";
buildInputs = with pkgs; [
jellyfin-web
];
env = {
# Skip internal UI build since we are using the nix package for jellyfin-web
JELLYSWARRM_SKIP_UI = "1";
};
preBuild = ''
# Move the contents of pre-built jellyfin-web to the cargo
mkdir -p crates/jellyswarrm-proxy/static
cp -r ${jellyfinWeb}/share/jellyfin-web/* crates/jellyswarrm-proxy/static/
# ui-version.env is required for the cargo build
cat > crates/jellyswarrm-proxy/static/ui-version.env <<EOF
UI_VERSION=${jellyfinWeb.version}
UI_COMMIT=nix
EOF
'';
};
in
{
packages = {
default = jellyswarrm;
jellyswarrm = jellyswarrm;
};
}
) // {
# NixOS module for the service
nixosModules.default = { config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.jellyswarrm;
in
{
options.services.jellyswarrm = {
enable = mkEnableOption "Jellyswarrm reverse proxy for Jellyfin servers";
package = mkOption {
type = types.package;
default = self.packages.${pkgs.stdenv.hostPlatform.system}.jellyswarrm;
defaultText = literalExpression "self.packages.\${pkgs.stdenv.hostPlatform.system}.jellyswarrm";
description = "The Jellyswarrm package to use";
};
user = mkOption {
type = types.str;
default = "jellyswarrm";
description = "User account under which Jellyswarrm runs";
};
group = mkOption {
type = types.str;
default = "jellyswarrm";
description = "Group under which Jellyswarrm runs";
};
dataDir = mkOption {
type = types.path;
default = "/var/lib/jellyswarrm";
description = "Directory where Jellyswarrm stores its data";
};
host = mkOption {
type = types.str;
default = "0.0.0.0";
description = "Host address to bind to";
};
port = mkOption {
type = types.port;
default = 3000;
description = "Port to listen on";
};
username = mkOption {
type = types.str;
default = "admin";
description = "Admin username for Jellyswarrm UI";
};
passwordFile = mkOption {
type = types.nullOr types.path;
default = null;
description = ''
Path to a file containing the admin password.
If not set, defaults to "jellyswarrm" (insecure).
'';
};
openFirewall = mkOption {
type = types.bool;
default = false;
description = "Open the firewall for the Jellyswarrm port";
};
extraEnvironment = mkOption {
type = types.attrsOf types.str;
default = {};
description = "Extra environment variables to pass to Jellyswarrm";
example = {
RUST_LOG = "info";
};
};
};
config = mkIf cfg.enable {
users.users.${cfg.user} = {
isSystemUser = true;
group = cfg.group;
home = cfg.dataDir;
createHome = true;
description = "Jellyswarrm service user";
};
users.groups.${cfg.group} = {};
systemd.services.jellyswarrm = {
description = "Jellyswarrm Jellyfin reverse proxy";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "simple";
User = cfg.user;
Group = cfg.group;
ExecStart = "${cfg.package}/bin/jellyswarrm-proxy";
WorkingDirectory = cfg.dataDir;
Restart = "on-failure";
RestartSec = "5s";
# Security hardening
NoNewPrivileges = true;
PrivateTmp = true;
ProtectSystem = "strict";
ProtectHome = true;
ReadWritePaths = [ cfg.dataDir ];
ProtectKernelTunables = true;
ProtectKernelModules = true;
ProtectControlGroups = true;
RestrictAddressFamilies = [ "AF_INET" "AF_INET6" "AF_UNIX" ];
RestrictNamespaces = true;
LockPersonality = true;
RestrictRealtime = true;
RestrictSUIDSGID = true;
RemoveIPC = true;
PrivateMounts = true;
};
environment = {
JELLYSWARRM_HOST = cfg.host;
JELLYSWARRM_PORT = toString cfg.port;
JELLYSWARRM_USERNAME = cfg.username;
JELLYSWARRM_DATA_DIR = cfg.dataDir;
JELLYSWARRM_PASSWORD = if cfg.passwordFile != null
then builtins.readFile cfg.passwordFile
else "jellyswarrm";
} // cfg.extraEnvironment;
};
networking.firewall = mkIf cfg.openFirewall {
allowedTCPPorts = [ cfg.port ];
};
};
};
};
}