{ system, config, pkgs, lib, ... }: with lib; let dataDir = "/var/lib/mautrix-discord"; registrationFile = config.sops.secrets."services/mautrix/discord.yaml".path; cfg = config.services.mautrix-discord; settingsFormat = pkgs.formats.yaml {}; settingsFileUnsubstituted = settingsFormat.generate "mautrix-discord-config-unsubstituted.yaml" cfg.settings; settingsFile = "${dataDir}/config.yaml"; inherit (pkgs) mautrix-discord; in { options = { services.mautrix-discord = { enable = mkEnableOption "Mautrix-Whatsapp, a Matrix-Whatsapp hybrid puppeting/relaybot bridge"; settings = mkOption rec { apply = recursiveUpdate default; inherit (settingsFormat) type; default = { appservice = { address = "http://mautrix-discord.int.chir.rs:29320"; hostname = "0.0.0.0"; port = 29320; database = { type = "sqlite"; uri = "sqlite:///${dataDir}/mautrix-telegram.db"; }; as_token = "$AS_TOKEN"; hs_token = "$HS_TOKEN"; }; logging = { file_name_format = null; }; }; }; environmentFile = mkOption { type = types.nullOr types.path; default = null; description = '' File containing environment variables to be passed to the mautrix-telegram service, in which secret tokens can be specified securely by defining values for MAUTRIX_TELEGRAM_APPSERVICE_AS_TOKEN, MAUTRIX_TELEGRAM_APPSERVICE_HS_TOKEN, MAUTRIX_TELEGRAM_TELEGRAM_API_ID, MAUTRIX_TELEGRAM_TELEGRAM_API_HASH and optionally MAUTRIX_TELEGRAM_TELEGRAM_BOT_TOKEN. ''; }; }; }; config = mkIf cfg.enable { systemd.services.mautrix-discord-genregistration = { description = "Mautrix-Discord Registration"; script = '' # Not all secrets can be passed as environment variable (yet) # https://github.com/tulir/mautrix-telegram/issues/584 [ -f ${settingsFile} ] && rm -f ${settingsFile} export AS_TOKEN=$(${pkgs.yq}/bin/yq -r '.as_token' ${registrationFile}) export HS_TOKEN=$(${pkgs.yq}/bin/yq -r '.hs_token' ${registrationFile}) umask 0177 ${pkgs.envsubst}/bin/envsubst \ -o ${settingsFile} \ -i ${settingsFileUnsubstituted} ''; serviceConfig = { Type = "oneshot"; RemainAfterExit = true; ReadWritePaths = baseNameOf dataDir; NoNewPrivileges = true; MemoryDenyWriteExecute = true; PrivateDevices = true; PrivateTmp = true; ProtectHome = true; ProtectSystem = "strict"; ProtectControlGroups = true; RestrictSUIDSGID = true; RestrictRealtime = true; LockPersonality = true; ProtectKernelLogs = true; ProtectKernelTunables = true; ProtectHostname = true; ProtectKernelModules = true; ProtectClock = true; SystemCallArchitectures = "native"; SystemCallErrorNumber = "EPERM"; SystemCallFilter = "@system-service"; WorkingDirectory = dataDir; StateDirectory = baseNameOf dataDir; UMask = 0117; User = "mautrix-discord"; Group = "mautrix-discord"; EnvironmentFile = cfg.environmentFile; }; restartTriggers = [settingsFileUnsubstituted cfg.environmentFile]; }; systemd.services.mautrix-discord = { description = "Mautrix-Discord"; path = with pkgs; [ffmpeg lottieconverter]; wantedBy = ["multi-user.target"]; wants = ["mautrix-discord-genregistration.service"]; after = ["mautrix-discord-genregistration.service"]; serviceConfig = { Type = "simple"; Restart = "always"; ReadWritePaths = baseNameOf dataDir; NoNewPrivileges = true; MemoryDenyWriteExecute = true; PrivateDevices = true; PrivateTmp = true; ProtectHome = true; ProtectSystem = "strict"; ProtectControlGroups = true; RestrictSUIDSGID = true; RestrictRealtime = true; LockPersonality = true; ProtectKernelLogs = true; ProtectKernelTunables = true; ProtectHostname = true; ProtectKernelModules = true; ProtectClock = true; SystemCallArchitectures = "native"; SystemCallErrorNumber = "EPERM"; SystemCallFilter = "@system-service"; WorkingDirectory = dataDir; StateDirectory = baseNameOf dataDir; UMask = 0117; User = "mautrix-discord"; Group = "mautrix-discord"; EnvironmentFile = cfg.environmentFile; ExecStart = '' ${mautrix-discord}/bin/mautrix-discord \ --config='${settingsFile}' ''; }; restartTriggers = [cfg.environmentFile]; }; users.users.mautrix-discord = { description = "Mautrix Whatsapp bridge"; home = "${dataDir}"; useDefaultShell = true; group = "mautrix-discord"; isSystemUser = true; }; users.groups.mautrix-discord = {}; sops.secrets."services/mautrix/discord.yaml".owner = "mautrix-discord"; }; }