about summary refs log tree commit diff
path: root/nixos
diff options
context:
space:
mode:
authorFelix Buehler2024-08-24 22:05:52 +0200
committerFelix Buehler2024-08-30 23:00:55 +0200
commit0846124d8b7d92f75128c0d651b01004011e6bf6 (patch)
tree9186ebae17300890c68ec3713846866eb0207d4d /nixos
parent20496ce388a69eed95627abd8eb37f3da57b53bc (diff)
nixos/services.owncast: remove `with lib;`
Diffstat (limited to 'nixos')
-rw-r--r--nixos/modules/services/misc/owncast.nix43
1 files changed, 21 insertions, 22 deletions
diff --git a/nixos/modules/services/misc/owncast.nix b/nixos/modules/services/misc/owncast.nix
index 94f0f4e998c4..debbd90d42a7 100644
--- a/nixos/modules/services/misc/owncast.nix
+++ b/nixos/modules/services/misc/owncast.nix
@@ -1,57 +1,56 @@
 { lib, pkgs, config, ... }:
-with lib;
 let cfg = config.services.owncast;
 in {
 
   options.services.owncast = {
 
-    enable = mkEnableOption "owncast, a video live streaming solution";
+    enable = lib.mkEnableOption "owncast, a video live streaming solution";
 
-    dataDir = mkOption {
-      type = types.str;
+    dataDir = lib.mkOption {
+      type = lib.types.str;
       default = "/var/lib/owncast";
       description = ''
         The directory where owncast stores its data files. If left as the default value this directory will automatically be created before the owncast server starts, otherwise the sysadmin is responsible for ensuring the directory exists with appropriate ownership and permissions.
       '';
     };
 
-    openFirewall = mkOption {
-      type = types.bool;
+    openFirewall = lib.mkOption {
+      type = lib.types.bool;
       default = false;
       description = ''
         Open the appropriate ports in the firewall for owncast.
       '';
     };
 
-    user = mkOption {
-      type = types.str;
+    user = lib.mkOption {
+      type = lib.types.str;
       default = "owncast";
       description = "User account under which owncast runs.";
     };
 
-    group = mkOption {
-      type = types.str;
+    group = lib.mkOption {
+      type = lib.types.str;
       default = "owncast";
       description = "Group under which owncast runs.";
     };
 
-    listen = mkOption {
-      type = types.str;
+    listen = lib.mkOption {
+      type = lib.types.str;
       default = "127.0.0.1";
       example = "0.0.0.0";
       description = "The IP address to bind the owncast web server to.";
     };
 
-    port = mkOption {
-      type = types.port;
+    port = lib.mkOption {
+      type = lib.types.port;
       default = 8080;
       description = ''
         TCP port where owncast web-gui listens.
       '';
     };
 
-    rtmp-port = mkOption {
-      type = types.port;
+    rtmp-port = lib.mkOption {
+      type = lib.types.port;
       default = 1935;
       description = ''
         TCP port where owncast rtmp service listens.
@@ -60,13 +59,13 @@ in {
 
   };
 
-  config = mkIf cfg.enable {
+  config = lib.mkIf cfg.enable {
 
     systemd.services.owncast = {
       description = "A self-hosted live video and web chat server";
       wantedBy = [ "multi-user.target" ];
 
-      serviceConfig = mkMerge [
+      serviceConfig = lib.mkMerge [
         {
           User = cfg.user;
           Group = cfg.group;
@@ -74,13 +73,13 @@ in {
           ExecStart = "${pkgs.owncast}/bin/owncast -webserverport ${toString cfg.port} -rtmpport ${toString cfg.rtmp-port} -webserverip ${cfg.listen}";
           Restart = "on-failure";
         }
-        (mkIf (cfg.dataDir == "/var/lib/owncast") {
+        (lib.mkIf (cfg.dataDir == "/var/lib/owncast") {
           StateDirectory = "owncast";
         })
       ];
     };
 
-    users.users = mkIf (cfg.user == "owncast") {
+    users.users = lib.mkIf (cfg.user == "owncast") {
       owncast = {
         isSystemUser = true;
         group = cfg.group;
@@ -88,10 +87,10 @@ in {
       };
     };
 
-    users.groups = mkIf (cfg.group == "owncast") { owncast = { }; };
+    users.groups = lib.mkIf (cfg.group == "owncast") { owncast = { }; };
 
     networking.firewall =
-      mkIf cfg.openFirewall { allowedTCPPorts = [ cfg.rtmp-port ] ++ optional (cfg.listen != "127.0.0.1") cfg.port; };
+      lib.mkIf cfg.openFirewall { allowedTCPPorts = [ cfg.rtmp-port ] ++ lib.optional (cfg.listen != "127.0.0.1") cfg.port; };
 
   };
   meta = { maintainers = with lib.maintainers; [ MayNiklas ]; };