3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/nixos/modules/services/misc/languagetool.nix
2022-10-29 18:05:53 +02:00

79 lines
2.2 KiB
Nix

{ config, lib, options, pkgs, ... }:
with lib;
let
cfg = config.services.languagetool;
settingsFormat = pkgs.formats.javaProperties {};
in {
options.services.languagetool = {
enable = mkEnableOption (mdDoc "the LanguageTool server");
port = mkOption {
type = types.port;
default = 8081;
example = 8081;
description = mdDoc ''
Port on which LanguageTool listens.
'';
};
public = mkEnableOption (mdDoc "access from anywhere (rather than just localhost)");
allowOrigin = mkOption {
type = types.nullOr types.str;
default = null;
example = "https://my-website.org";
description = mdDoc ''
Set the Access-Control-Allow-Origin header in the HTTP response,
used for direct (non-proxy) JavaScript-based access from browsers.
`null` to allow access from all sites.
'';
};
settings = lib.mkOption {
type = types.submodule {
freeformType = settingsFormat.type;
options.cacheSize = mkOption {
type = types.ints.unsigned;
default = 1000;
apply = toString;
description = mdDoc "Number of sentences cached.";
};
};
default = {};
description = mdDoc ''
Configuration file options for LanguageTool, see
'languagetool-http-server --help'
for supported settings.
'';
};
};
config = mkIf cfg.enable {
systemd.services.languagetool = {
description = "LanguageTool HTTP server";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
DynamicUser = true;
User = "languagetool";
Group = "languagetool";
CapabilityBoundingSet = [ "" ];
RestrictNamespaces = [ "" ];
SystemCallFilter = [ "@system-service" "~ @privileged" ];
ProtectHome = "yes";
ExecStart = ''
${pkgs.languagetool}/bin/languagetool-http-server \
--port ${toString cfg.port} \
${optionalString cfg.public "--public"} \
${optionalString (cfg.allowOrigin != null) "--allow-origin ${cfg.allowOrigin}"} \
"--config" ${settingsFormat.generate "languagetool.conf" cfg.settings}
'';
};
};
};
}