summaryrefslogtreecommitdiffstats
path: root/nixos/modules/services/misc/anki-sync-server.nix
diff options
context:
space:
mode:
Diffstat (limited to 'nixos/modules/services/misc/anki-sync-server.nix')
-rw-r--r--nixos/modules/services/misc/anki-sync-server.nix140
1 files changed, 140 insertions, 0 deletions
diff --git a/nixos/modules/services/misc/anki-sync-server.nix b/nixos/modules/services/misc/anki-sync-server.nix
new file mode 100644
index 000000000000..a65382009417
--- /dev/null
+++ b/nixos/modules/services/misc/anki-sync-server.nix
@@ -0,0 +1,140 @@
+{
+ config,
+ lib,
+ pkgs,
+ ...
+}:
+with lib; let
+ cfg = config.services.anki-sync-server;
+ name = "anki-sync-server";
+ specEscape = replaceStrings ["%"] ["%%"];
+ usersWithIndexes =
+ lists.imap1 (i: user: {
+ i = i;
+ user = user;
+ })
+ cfg.users;
+ usersWithIndexesFile = filter (x: x.user.passwordFile != null) usersWithIndexes;
+ usersWithIndexesNoFile = filter (x: x.user.passwordFile == null && x.user.password != null) usersWithIndexes;
+ anki-sync-server-run = pkgs.writeShellScriptBin "anki-sync-server-run" ''
+ # When services.anki-sync-server.users.passwordFile is set,
+ # each password file is passed as a systemd credential, which is mounted in
+ # a file system exposed to the service. Here we read the passwords from
+ # the credential files to pass them as environment variables to the Anki
+ # sync server.
+ ${
+ concatMapStringsSep
+ "\n"
+ (x: ''export SYNC_USER${toString x.i}=${escapeShellArg x.user.username}:"''$(cat "''${CREDENTIALS_DIRECTORY}/"${escapeShellArg x.user.username})"'')
+ usersWithIndexesFile
+ }
+ # For users where services.anki-sync-server.users.password isn't set,
+ # export passwords in environment variables in plaintext.
+ ${
+ concatMapStringsSep
+ "\n"
+ (x: ''export SYNC_USER${toString x.i}=${escapeShellArg x.user.username}:${escapeShellArg x.user.password}'')
+ usersWithIndexesNoFile
+ }
+ exec ${cfg.package}/bin/anki-sync-server
+ '';
+in {
+ options.services.anki-sync-server = {
+ enable = mkEnableOption "anki-sync-server";
+
+ package = mkPackageOption pkgs "anki-sync-server" { };
+
+ address = mkOption {
+ type = types.str;
+ default = "::1";
+ description = ''
+ IP address anki-sync-server listens to.
+ Note host names are not resolved.
+ '';
+ };
+
+ port = mkOption {
+ type = types.port;
+ default = 27701;
+ description = "Port number anki-sync-server listens to.";
+ };
+
+ openFirewall = mkOption {
+ default = false;
+ type = types.bool;
+ description = "Whether to open the firewall for the specified port.";
+ };
+
+ users = mkOption {
+ type = with types;
+ listOf (submodule {
+ options = {
+ username = mkOption {
+ type = str;
+ description = "User name accepted by anki-sync-server.";
+ };
+ password = mkOption {
+ type = nullOr str;
+ default = null;
+ description = ''
+ Password accepted by anki-sync-server for the associated username.
+ **WARNING**: This option is **not secure**. This password will
+ be stored in *plaintext* and will be visible to *all users*.
+ See {option}`services.anki-sync-server.users.passwordFile` for
+ a more secure option.
+ '';
+ };
+ passwordFile = mkOption {
+ type = nullOr path;
+ default = null;
+ description = ''
+ File containing the password accepted by anki-sync-server for
+ the associated username. Make sure to make readable only by
+ root.
+ '';
+ };
+ };
+ });
+ description = "List of user-password pairs to provide to the sync server.";
+ };
+ };
+
+ config = mkIf cfg.enable {
+ assertions = [
+ {
+ assertion = (builtins.length usersWithIndexesFile) + (builtins.length usersWithIndexesNoFile) > 0;
+ message = "At least one username-password pair must be set.";
+ }
+ ];
+ networking.firewall.allowedTCPPorts = mkIf cfg.openFirewall [cfg.port];
+
+ systemd.services.anki-sync-server = {
+ description = "anki-sync-server: Anki sync server built into Anki";
+ after = ["network.target"];
+ wantedBy = ["multi-user.target"];
+ path = [cfg.package];
+ environment = {
+ SYNC_BASE = "%S/%N";
+ SYNC_HOST = specEscape cfg.address;
+ SYNC_PORT = toString cfg.port;
+ };
+
+ serviceConfig = {
+ Type = "simple";
+ DynamicUser = true;
+ StateDirectory = name;
+ ExecStart = "${anki-sync-server-run}/bin/anki-sync-server-run";
+ Restart = "always";
+ LoadCredential =
+ map
+ (x: "${specEscape x.user.username}:${specEscape (toString x.user.passwordFile)}")
+ usersWithIndexesFile;
+ };
+ };
+ };
+
+ meta = {
+ maintainers = with maintainers; [telotortium];
+ doc = ./anki-sync-server.md;
+ };
+}