{ config, lib, pkgs, ... }: with lib; let cfg = config.services.shiori; in { options = { services.shiori = { enable = mkEnableOption "Shiori simple bookmarks manager"; package = mkPackageOption pkgs "shiori" { }; address = mkOption { type = types.str; default = ""; description = '' The IP address on which Shiori will listen. If empty, listens on all interfaces. ''; }; port = mkOption { type = types.port; default = 8080; description = "The port of the Shiori web application"; }; webRoot = mkOption { type = types.str; default = "/"; example = "/shiori"; description = "The root of the Shiori web application"; }; httpSecretKey = mkOption { type = types.str; example = "SuperSecretPassword"; description = "When empty all sessions will be invalidated on server restart"; }; databaseUrl = mkOption { type = types.str; default = ""; example = "postgresql:///shiori?host=/run/postgresql"; description = "The connection URL to connect to MySQL or PostgreSQL"; }; }; }; config = mkIf cfg.enable { systemd.services.shiori = with cfg; { description = "Shiori simple bookmarks manager"; wantedBy = [ "multi-user.target" ]; environment = { SHIORI_DIR = "/var/lib/shiori"; } // lib.optionalAttrs (cfg.databaseUrl != "") { SHIORI_DATABASE_URL = cfg.databaseUrl; } // lib.optionalAttrs (cfg.httpSecretKey != "") { SHIORI_HTTP_SECRET_KEY = cfg.httpSecretKey; }; serviceConfig = { ExecStart = "${package}/bin/shiori server --address '${address}' --port '${ toString port }' --webroot '${webRoot}'"; DynamicUser = true; StateDirectory = "shiori"; # As the RootDirectory RuntimeDirectory = "shiori"; # Security options BindReadOnlyPaths = [ "/nix/store" # For SSL certificates, and the resolv.conf "/etc" ] ++ lib.optional (lib.strings.hasInfix "postgres" cfg.databaseUrl) "/run/postgresql" ++ lib.optional (lib.strings.hasInfix "mysql" cfg.databaseUrl) "/var/run/mysqld"; CapabilityBoundingSet = ""; AmbientCapabilities = "CAP_NET_BIND_SERVICE"; DeviceAllow = ""; LockPersonality = true; MemoryDenyWriteExecute = true; PrivateDevices = true; PrivateUsers = true; ProtectClock = true; ProtectControlGroups = true; ProtectHome = true; ProtectHostname = true; ProtectKernelLogs = true; ProtectKernelModules = true; ProtectKernelTunables = true; RestrictNamespaces = true; RestrictAddressFamilies = [ "AF_INET" "AF_INET6" "AF_UNIX" ]; RestrictRealtime = true; RestrictSUIDSGID = true; RootDirectory = "/run/shiori"; SystemCallArchitectures = "native"; SystemCallErrorNumber = "EPERM"; SystemCallFilter = [ "@system-service" "~@cpu-emulation" "~@debug" "~@keyring" "~@memlock" "~@obsolete" "~@privileged" "~@setuid" ]; }; }; }; meta.maintainers = with maintainers; [ minijackson CaptainJawZ ]; }