pantheon/modules/nixos/server/librechat/default.nix

146 lines
4.8 KiB
Nix

{
config,
lib,
pkgs,
...
}:
let
cfg = config.server.librechat;
configFile = pkgs.writeTextFile {
name = "librechat.yaml";
text = lib.generators.toYAML { } cfg.settings;
};
# Thanks to https://github.com/nix-community/home-manager/blob/60e4624302d956fe94d3f7d96a560d14d70591b9/modules/lib/shell.nix :)
export = n: v: ''export ${n}="${builtins.toString v}"'';
exportAll = vars: lib.concatStringsSep "\n" (lib.mapAttrsToList export vars);
environmentVariablesFile = pkgs.writeTextFile {
name = "librechat-env-variables.sh";
text = # sh
''
# Thanks to https://github.com/nix-community/home-manager/blob/release-25.05/modules/home-environment.nix :)
# Only source this once.
if [ -n "$__LC_ENV_VARS_SOURCED" ]; then return; fi
export __LC_ENV_VARS_SOURCED=1
export CONFIG_PATH=${configFile}
${exportAll cfg.env}
'';
};
allowedPorts =
if cfg.openFirewall then (if cfg.env ? PORT then [ cfg.env.port ] else [ 3080 ]) else [ ];
in
{
options.server.librechat = {
enable = lib.mkEnableOption "Whether to enable the LibreChat server.";
openFirewall = lib.mkEnableOption "Whether to open the port in the firewall.";
path = lib.mkOption {
type = lib.types.str;
default = "/var/lib/librechat";
description = "Absolute path for where the LibreChat server will use as its working directory.";
};
user = lib.mkOption {
type = lib.types.str;
default = "librechat";
description = "The user to run the service as.";
};
group = lib.mkOption {
type = lib.types.str;
default = "librechat";
description = "The group to run the service as.";
};
credentials = lib.mkOption {
type = lib.types.lazyAttrsOf lib.types.path;
default = { };
example = {
CREDS_KEY = /run/secrets/creds_key;
};
description = "Environment variables that will be loaded in from files at runtime. See https://www.librechat.ai/docs/configuration/dotenv for a full list.";
};
env = lib.mkOption {
type =
with lib.types;
lazyAttrsOf (oneOf [
str
path
int
float
]);
example = {
ALLOW_REGISTRATION = "true";
HOST = "0.0.0.0";
CONSOLE_JSON_STRING_LENGTH = 255;
};
default = { };
description = "Environment variables that will be set for the service. See https://www.librechat.ai/docs/configuration/dotenv for a full list.";
};
settings = lib.mkOption {
type = lib.types.attrs;
default = { };
example = # nix
''
{
version = "1.0.8";
cache = true;
interface = {
privacyPolicy = {
externalUrl = "https://librechat.ai/privacy-policy";
openNewTab = true;
};
};
endpoints = {
custom = [
{
name = "OpenRouter";
# Note that the following $ should be escaped with a backslash, not '''
apiKey = "''${OPENROUTER_KEY}";
baseURL = "https://openrouter.ai/api/v1";
models = {
default = ["meta-llama/llama-3-70b-instruct"];
fetch = true;
};
titleConvo = true;
titleModule = "meta-llama/llama-3-70b-instruct";
dropParams = ["stop"];
modelDisplayLabel = "OpenRouter";
}
];
};
}
'';
description = "A free-form attribute set that will be written to librechat.yaml.";
};
};
config = lib.mkIf cfg.enable {
networking.firewall.allowedTCPPorts = allowedPorts;
systemd.services.librechat = {
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
description = "Open-source app for all your AI conversations, fully customizable and compatible with any AI provider";
serviceConfig = {
Type = "simple"; # FIXME
User = cfg.user;
Group = cfg.group;
PermissionsStartOnly = "true"; # run mkdir as root
ExecStartPre = [
"${pkgs.coreutils}/bin/mkdir -p ${cfg.path}"
"${pkgs.coreutils}/bin/chown -R ${cfg.user}:${cfg.group} ${cfg.path}"
];
LoadCredential = [ ];
};
script = # sh
''
source ${environmentVariablesFile}
cd ${cfg.path}
${pkgs.librechat}/bin/librechat-server
'';
};
users.users.librechat = lib.mkIf (cfg.user == "librechat") {
name = "librechat";
isSystemUser = true;
group = "librechat";
description = "LibreChat server user";
};
users.groups.librechat = lib.mkIf (cfg.user == "librechat") { };
};
}