{ config, pkgs, lib, ... }: with lib; let dataDir = "/var/lib/mautrix-telegram"; registrationFile = config.secrets."services/mautrix/telegram.yaml".path; cfg = config.services.mautrix-telegram-2; settingsFormat = pkgs.formats.yaml {}; settingsFileUnsubstituted = settingsFormat.generate "mautrix-telegram-config-unsubstituted.yaml" cfg.settings; settingsFile = "${dataDir}/config.yaml"; in { options = { services.mautrix-telegram-2 = { enable = mkEnableOption "mautrix-telegram, a Matrix-telegram hybrid puppeting/relaybot bridge"; settings = mkOption rec { apply = recursiveUpdate default; inherit (settingsFormat) type; default = { appservice = { address = "http://localhost:29328"; hostname = "0.0.0.0"; port = 29328; database = "sqlite:///${dataDir}/mautrix-telegram.db"; as_token = "$AS_TOKEN"; hs_token = "$HS_TOKEN"; }; logging = { version = 1; formatters.precise.format = "[%(levelname)s@%(name)s] %(message)s"; handlers.console = { class = "logging.StreamHandler"; formatter = "precise"; }; loggers = { mau.level = "INFO"; telethon.level = "INFO"; # prevent tokens from leaking in the logs: # https://github.com/tulir/mautrix-telegram/issues/351 aiohttp.level = "WARNING"; }; # log to console/systemd instead of file root = { level = "INFO"; handlers = ["console"]; }; }; }; }; environmentFile = mkOption { type = types.nullOr types.path; default = null; description = '' File containing environment variables to be passed to the mautrix-telegram service, in which secret tokens can be specified securely by defining values for MAUTRIX_TELEGRAM_APPSERVICE_AS_TOKEN, MAUTRIX_TELEGRAM_APPSERVICE_HS_TOKEN, MAUTRIX_TELEGRAM_TELEGRAM_API_ID, MAUTRIX_TELEGRAM_TELEGRAM_API_HASH and optionally MAUTRIX_TELEGRAM_TELEGRAM_BOT_TOKEN. ''; }; }; }; config = mkIf cfg.enable { systemd.services.mautrix-telegram-genregistration = { description = "mautrix-telegram Registration"; script = '' # Not all secrets can be passed as environment variable (yet) # https://github.com/tulir/mautrix-telegram/issues/584 [ -f ${settingsFile} ] && rm -f ${settingsFile} export AS_TOKEN=$(${pkgs.yq}/bin/yq -r '.as_token' ${registrationFile}) export HS_TOKEN=$(${pkgs.yq}/bin/yq -r '.hs_token' ${registrationFile}) umask 0177 ${pkgs.envsubst}/bin/envsubst \ -o ${settingsFile} \ -i ${settingsFileUnsubstituted} ''; serviceConfig = { Type = "oneshot"; RemainAfterExit = true; ProtectSystem = "strict"; ProtectHome = true; ProtectKernelTunables = true; ProtectKernelModules = true; ProtectControlGroups = true; WorkingDirectory = dataDir; StateDirectory = baseNameOf dataDir; UMask = 0117; User = "mautrix-telegram"; Group = "mautrix-telegram"; EnvironmentFile = cfg.environmentFile; }; restartTriggers = [settingsFileUnsubstituted cfg.environmentFile]; }; systemd.services.mautrix-telegram = { description = "mautrix-telegram"; wantedBy = ["multi-user.target"]; wants = ["matrix-synapse.service" "mautrix-telegram-genregistration.service"]; after = ["matrix-synapse.service" "mautrix-telegram-genregistration.service"]; serviceConfig = { Type = "simple"; Restart = "always"; WorkingDirectory = dataDir; User = "mautrix-telegram"; Group = "mautrix-telegram"; EnvironmentFile = cfg.environmentFile; ExecStart = '' ${pkgs.mautrix-telegram}/bin/mautrix-telegram \ --config='${settingsFile}' ''; }; restartTriggers = [cfg.environmentFile]; }; users.users.mautrix-telegram = { description = "Mautrix telegram bridge"; home = "${dataDir}"; useDefaultShell = true; group = "mautrix-telegram"; isSystemUser = true; }; users.groups.mautrix-telegram = {}; sops.secrets."services/mautrix/telegram.yaml".owner = "mautrix-telegram"; }; }