diff options
Diffstat (limited to 'nixos/modules')
-rw-r--r-- | nixos/modules/module-list.nix | 1 | ||||
-rw-r--r-- | nixos/modules/services/helix-directory.nix | 57 |
2 files changed, 58 insertions, 0 deletions
diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index 2ae236d..68174a4 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -6,6 +6,7 @@ ./programs/dwm.nix ./services/catbus-bridge-snapcast.nix ./services/dlnatoad.nix + ./services/helix-directory.nix ./services/helix-player.nix ./services/mosquitto.nix ./services/snapclient.nix diff --git a/nixos/modules/services/helix-directory.nix b/nixos/modules/services/helix-directory.nix new file mode 100644 index 0000000..4601dea --- /dev/null +++ b/nixos/modules/services/helix-directory.nix @@ -0,0 +1,57 @@ +{ config, lib, pkgs, ... }: +with lib; + +let + cfg = config.eth.services.helix-directory; + +in { + + options.eth.services.helix-directory = { + + enable = mkEnableOption "Whether to enable helix-directory"; + + friendlyName = mkOption { + type = types.str; + default = "Helix (${config.networking.hostName})"; + description = "Human-readable name to broadcast"; + example = "My Media Server"; + }; + + directory = mkOption { + type = types.str; + default = ""; + description = "Directory to serve"; + example = "/mnt/md0/media"; + }; + }; + + + config = mkIf cfg.enable { + assertions = [ + { + assertion = cfg.directory != ""; + message = "must set config.eth.services.helix-directory.directory"; + } + ]; + + systemd.services.helix-directory = { + enable = true; + description = "Helix UPnP ContentDirectory server"; + wants = [ "network.target" ]; + after = [ "network.target" ]; + wantedBy = [ "multi-user.target" ]; + serviceConfig = { + DynamicUser = true; + + ExecStart = "${pkgs.eth.helix}/bin/helix-directory -friendly-name ${escapeShellArg cfg.friendlyName} -path ${escapeShellArg cfg.directory}"; + + NoNewPrivileges = true; + ProtectHome = true; + ProtectKernelTunables = true; + ProtectControlGroups = true; + ProtectKernelModules = true; + }; + }; + }; + +} |