nixos/jellyseerr: init

genesis cab32f0f 76d58a2f

Changed files
+65
nixos
doc
manual
release-notes
modules
+2
nixos/doc/manual/release-notes/rl-2305.section.md
···
- [ulogd](https://www.netfilter.org/projects/ulogd/index.html), a userspace logging daemon for netfilter/iptables related logging. Available as [services.ulogd](options.html#opt-services.ulogd.enable).
+
- [jellyseerr](https://github.com/Fallenbagel/jellyseerr), a web-based requests manager for Jellyfin, forked from Overseerr. Available as [services.jellyseerr](#opt-services.jellyseerr.enable).
+
- [photoprism](https://photoprism.app/), a AI-Powered Photos App for the Decentralized Web. Available as [services.photoprism](options.html#opt-services.photoprism.enable).
- [autosuspend](https://github.com/languitar/autosuspend), a python daemon that suspends a system if certain conditions are met, or not met.
+1
nixos/modules/module-list.nix
···
./services/misc/irkerd.nix
./services/misc/jackett.nix
./services/misc/jellyfin.nix
+
./services/misc/jellyseerr.nix
./services/misc/klipper.nix
./services/misc/languagetool.nix
./services/misc/leaps.nix
+62
nixos/modules/services/misc/jellyseerr.nix
···
+
{ config, pkgs, lib, ... }:
+
+
with lib;
+
let
+
cfg = config.services.jellyseerr;
+
in
+
{
+
meta.maintainers = [ maintainers.camillemndn ];
+
+
options.services.jellyseerr = {
+
enable = mkEnableOption (mdDoc ''Jellyseerr, a requests manager for Jellyfin'');
+
+
openFirewall = mkOption {
+
type = types.bool;
+
default = false;
+
description = mdDoc ''Open port in the firewall for the Jellyseerr web interface.'';
+
};
+
+
port = mkOption {
+
type = types.port;
+
default = 5055;
+
description = mdDoc ''The port which the Jellyseerr web UI should listen to.'';
+
};
+
};
+
+
config = mkIf cfg.enable {
+
systemd.services.jellyseerr = {
+
description = "Jellyseerr, a requests manager for Jellyfin";
+
after = [ "network.target" ];
+
wantedBy = [ "multi-user.target" ];
+
environment.PORT = toString cfg.port;
+
serviceConfig = {
+
Type = "exec";
+
StateDirectory = "jellyseerr";
+
WorkingDirectory = "${pkgs.jellyseerr}/libexec/jellyseerr/deps/jellyseerr";
+
DynamicUser = true;
+
ExecStart = "${pkgs.jellyseerr}/bin/jellyseerr";
+
BindPaths = [ "/var/lib/jellyseerr/:${pkgs.jellyseerr}/libexec/jellyseerr/deps/jellyseerr/config/" ];
+
Restart = "on-failure";
+
ProtectHome = true;
+
ProtectSystem = "strict";
+
PrivateTmp = true;
+
PrivateDevices = true;
+
ProtectHostname = true;
+
ProtectClock = true;
+
ProtectKernelTunables = true;
+
ProtectKernelModules = true;
+
ProtectKernelLogs = true;
+
ProtectControlGroups = true;
+
NoNewPrivileges = true;
+
RestrictRealtime = true;
+
RestrictSUIDSGID = true;
+
RemoveIPC = true;
+
PrivateMounts = true;
+
};
+
};
+
+
networking.firewall = mkIf cfg.openFirewall {
+
allowedTCPPorts = [ cfg.port ];
+
};
+
};
+
}