2019-04-14 12:10:50 +01:00
|
|
|
{ config, pkgs, lib, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
cfg = config.services.jellyfin;
|
|
|
|
in
|
|
|
|
{
|
|
|
|
options = {
|
|
|
|
services.jellyfin = {
|
|
|
|
enable = mkEnableOption "Jellyfin Media Server";
|
|
|
|
|
|
|
|
user = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "jellyfin";
|
|
|
|
description = "User account under which Jellyfin runs.";
|
|
|
|
};
|
|
|
|
|
2020-08-16 16:41:41 +01:00
|
|
|
package = mkOption {
|
|
|
|
type = types.package;
|
2021-04-24 13:01:47 +01:00
|
|
|
default = pkgs.jellyfin;
|
2020-08-16 16:41:41 +01:00
|
|
|
example = literalExample "pkgs.jellyfin";
|
|
|
|
description = ''
|
|
|
|
Jellyfin package to use.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2019-04-14 12:10:50 +01:00
|
|
|
group = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "jellyfin";
|
|
|
|
description = "Group under which jellyfin runs.";
|
|
|
|
};
|
2020-12-29 20:46:54 +00:00
|
|
|
|
|
|
|
openFirewall = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description = ''
|
|
|
|
Open the default ports in the firewall for the media server. The
|
|
|
|
HTTP/HTTPS ports can be changed in the Web UI, so this option should
|
|
|
|
only be used if they are unchanged.
|
|
|
|
'';
|
|
|
|
};
|
2019-04-14 12:10:50 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
systemd.services.jellyfin = {
|
|
|
|
description = "Jellyfin Media Server";
|
|
|
|
after = [ "network.target" ];
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
|
|
|
|
serviceConfig = rec {
|
|
|
|
User = cfg.user;
|
|
|
|
Group = cfg.group;
|
|
|
|
StateDirectory = "jellyfin";
|
|
|
|
CacheDirectory = "jellyfin";
|
2020-08-16 16:41:41 +01:00
|
|
|
ExecStart = "${cfg.package}/bin/jellyfin --datadir '/var/lib/${StateDirectory}' --cachedir '/var/cache/${CacheDirectory}'";
|
2019-04-14 12:10:50 +01:00
|
|
|
Restart = "on-failure";
|
2020-09-17 20:10:44 +01:00
|
|
|
|
|
|
|
# Security options:
|
|
|
|
|
|
|
|
NoNewPrivileges = true;
|
|
|
|
|
|
|
|
AmbientCapabilities = "";
|
|
|
|
CapabilityBoundingSet = "";
|
|
|
|
|
|
|
|
# ProtectClock= adds DeviceAllow=char-rtc r
|
|
|
|
DeviceAllow = "";
|
|
|
|
|
|
|
|
LockPersonality = true;
|
|
|
|
|
|
|
|
PrivateTmp = true;
|
|
|
|
PrivateDevices = true;
|
|
|
|
PrivateUsers = true;
|
|
|
|
|
|
|
|
ProtectClock = true;
|
|
|
|
ProtectControlGroups = true;
|
|
|
|
ProtectHostname = true;
|
|
|
|
ProtectKernelLogs = true;
|
|
|
|
ProtectKernelModules = true;
|
|
|
|
ProtectKernelTunables = true;
|
|
|
|
|
|
|
|
RemoveIPC = true;
|
|
|
|
|
|
|
|
RestrictNamespaces = true;
|
|
|
|
# AF_NETLINK needed because Jellyfin monitors the network connection
|
|
|
|
RestrictAddressFamilies = [ "AF_NETLINK" "AF_INET" "AF_INET6" ];
|
|
|
|
RestrictRealtime = true;
|
|
|
|
RestrictSUIDSGID = true;
|
|
|
|
|
|
|
|
SystemCallArchitectures = "native";
|
|
|
|
SystemCallErrorNumber = "EPERM";
|
|
|
|
SystemCallFilter = [
|
|
|
|
"@system-service"
|
2021-05-13 13:29:25 +01:00
|
|
|
"~@cpu-emulation" "~@debug" "~@keyring" "~@memlock" "~@obsolete" "~@privileged" "~@setuid"
|
2020-09-17 20:10:44 +01:00
|
|
|
];
|
2019-04-14 12:10:50 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
users.users = mkIf (cfg.user == "jellyfin") {
|
2019-10-12 21:25:28 +01:00
|
|
|
jellyfin = {
|
|
|
|
group = cfg.group;
|
|
|
|
isSystemUser = true;
|
|
|
|
};
|
2019-04-14 12:10:50 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
users.groups = mkIf (cfg.group == "jellyfin") {
|
|
|
|
jellyfin = {};
|
|
|
|
};
|
|
|
|
|
2020-12-29 20:46:54 +00:00
|
|
|
networking.firewall = mkIf cfg.openFirewall {
|
|
|
|
# from https://jellyfin.org/docs/general/networking/index.html
|
|
|
|
allowedTCPPorts = [ 8096 8920 ];
|
|
|
|
allowedUDPPorts = [ 1900 7359 ];
|
|
|
|
};
|
|
|
|
|
2019-04-14 12:10:50 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
meta.maintainers = with lib.maintainers; [ minijackson ];
|
|
|
|
}
|