Skip to content

Commit

Permalink
nixos: static ids for jackett, radarr, sonarr
Browse files Browse the repository at this point in the history
  • Loading branch information
edwtjo committed Apr 25, 2017
1 parent d25f7c9 commit 45470c6
Show file tree
Hide file tree
Showing 4 changed files with 21 additions and 6 deletions.
6 changes: 6 additions & 0 deletions nixos/modules/misc/ids.nix
Expand Up @@ -289,6 +289,9 @@
rpc = 271;
geoip = 272;
fcron = 273;
sonarr = 274;
radarr = 275;
jackett = 276;

# When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399!

Expand Down Expand Up @@ -547,6 +550,9 @@
#rpc = 271; # unused
#geoip = 272; # unused
fcron = 273;
sonarr = 274;
radarr = 275;
jackett = 276;

# When adding a gid, make sure it doesn't match an existing
# uid. Users and groups with the same name should have equal
Expand Down
7 changes: 5 additions & 2 deletions nixos/modules/services/misc/jackett.nix
Expand Up @@ -22,23 +22,26 @@ in
echo "Creating jackett data directory in /var/lib/jackett/"
mkdir -p /var/lib/jackett/
}
chown -R jackett /var/lib/jackett/
chown -R jackett:jackett /var/lib/jackett/

This comment has been minimized.

Copy link
@Mic92

Mic92 Apr 25, 2017

Member

What is the purpose of static ids, when all files are chowned on startup?

This comment has been minimized.

Copy link
@edwtjo

edwtjo Apr 26, 2017

Author Member

Well I was planning on removing the chown:ing, now they're kept around for the transition. Personally I prefer static ids but I'll admit that I might have missed some discussion on this.

chmod 0700 /var/lib/jackett/
'';

serviceConfig = {
Type = "simple";
User = "jackett";
Group = "nogroup";
Group = "jackett";
PermissionsStartOnly = "true";
ExecStart = "${pkgs.jackett}/bin/Jackett";
Restart = "on-failure";
};
};

users.extraUsers.jackett = {
uid = config.ids.uids.jackett;
home = "/var/lib/jackett";
group = "jackett";
};
users.extraGroups.jackett.gid = config.ids.gids.jackett;

};
}
7 changes: 5 additions & 2 deletions nixos/modules/services/misc/radarr.nix
Expand Up @@ -22,23 +22,26 @@ in
echo "Creating radarr data directory in /var/lib/radarr/"
mkdir -p /var/lib/radarr/
}
chown -R radarr /var/lib/radarr/
chown -R radarr:radarr /var/lib/radarr/
chmod 0700 /var/lib/radarr/
'';

serviceConfig = {
Type = "simple";
User = "radarr";
Group = "nogroup";
Group = "radarr";
PermissionsStartOnly = "true";
ExecStart = "${pkgs.radarr}/bin/Radarr";
Restart = "on-failure";
};
};

users.extraUsers.radarr = {
uid = config.ids.uids.radarr;
home = "/var/lib/radarr";
group = "radarr";
};
users.extraGroups.radarr.gid = config.ids.gids.radarr;

};
}
7 changes: 5 additions & 2 deletions nixos/modules/services/misc/sonarr.nix
Expand Up @@ -22,23 +22,26 @@ in
echo "Creating sonarr data directory in /var/lib/sonarr/"
mkdir -p /var/lib/sonarr/
}
chown -R sonarr /var/lib/sonarr/
chown -R sonarr:sonarr /var/lib/sonarr/
chmod 0700 /var/lib/sonarr/
'';

serviceConfig = {
Type = "simple";
User = "sonarr";
Group = "nogroup";
Group = "sonarr";
PermissionsStartOnly = "true";
ExecStart = "${pkgs.sonarr}/bin/NzbDrone --no-browser";
Restart = "on-failure";
};
};

users.extraUsers.sonarr = {
uid = config.ids.uids.sonarr;
home = "/var/lib/sonarr";
group = "sonarr";
};
users.extraGroups.sonarr.gid = config.ids.gids.sonarr;

};
}

0 comments on commit 45470c6

Please sign in to comment.