{ config, lib, pkgs, ... }: with lib; let pkg = config.hardware.sane.backends-package.override { scanSnapDriversUnfree = config.hardware.sane.drivers.scanSnap.enable; scanSnapDriversPackage = config.hardware.sane.drivers.scanSnap.package; }; sanedConf = pkgs.writeTextFile { name = "saned.conf"; destination = "/etc/sane.d/saned.conf"; text = '' localhost ${config.services.saned.extraConfig} ''; }; netConf = pkgs.writeTextFile { name = "net.conf"; destination = "/etc/sane.d/net.conf"; text = '' ${lib.optionalString config.services.saned.enable "localhost"} ${config.hardware.sane.netConf} ''; }; env = { SANE_CONFIG_DIR = "/etc/sane-config"; LD_LIBRARY_PATH = [ "/etc/sane-libs" ]; }; backends = [ pkg netConf ] ++ optional config.services.saned.enable sanedConf ++ config.hardware.sane.extraBackends; saneConfig = pkgs.mkSaneConfig { paths = backends; inherit (config.hardware.sane) disabledDefaultBackends; }; enabled = config.hardware.sane.enable || config.services.saned.enable; in { ###### interface options = { hardware.sane.enable = mkOption { type = types.bool; default = false; description = '' Enable support for SANE scanners. ::: {.note} Users in the "scanner" group will gain access to the scanner, or the "lp" group if it's also a printer. ::: ''; }; hardware.sane.backends-package = mkOption { type = types.package; default = pkgs.sane-backends; defaultText = literalExpression "pkgs.sane-backends"; description = "Backends driver package to use."; }; hardware.sane.snapshot = mkOption { type = types.bool; default = false; description = "Use a development snapshot of SANE scanner drivers."; }; hardware.sane.extraBackends = mkOption { type = types.listOf types.path; default = []; description = '' Packages providing extra SANE backends to enable. ::: {.note} The example contains the package for HP scanners, and the package for Apple AirScan and Microsoft WSD support (supports many vendors/devices). ::: ''; example = literalExpression "[ pkgs.hplipWithPlugin pkgs.sane-airscan ]"; }; hardware.sane.disabledDefaultBackends = mkOption { type = types.listOf types.str; default = []; example = [ "v4l" ]; description = '' Names of backends which are enabled by default but should be disabled. See `$SANE_CONFIG_DIR/dll.conf` for the list of possible names. ''; }; hardware.sane.configDir = mkOption { type = types.str; internal = true; description = "The value of SANE_CONFIG_DIR."; }; hardware.sane.netConf = mkOption { type = types.lines; default = ""; example = "192.168.0.16"; description = '' Network hosts that should be probed for remote scanners. ''; }; hardware.sane.drivers.scanSnap.enable = mkOption { type = types.bool; default = false; example = true; description = '' Whether to enable drivers for the Fujitsu ScanSnap scanners. The driver files are unfree and extracted from the Windows driver image. ''; }; hardware.sane.drivers.scanSnap.package = mkPackageOption pkgs [ "sane-drivers" "epjitsu" ] { extraDescription = '' Useful if you want to extract the driver files yourself. The process is described in the {file}`/etc/sane.d/epjitsu.conf` file in the `sane-backends` package. ''; }; hardware.sane.openFirewall = mkOption { type = types.bool; default = false; description = '' Open ports needed for discovery of scanners on the local network, e.g. needed for Canon scanners (BJNP protocol). ''; }; services.saned.enable = mkOption { type = types.bool; default = false; description = '' Enable saned network daemon for remote connection to scanners. saned would be run from `scanner` user; to allow access to hardware that doesn't have `scanner` group you should add needed groups to this user. ''; }; services.saned.extraConfig = mkOption { type = types.lines; default = ""; example = "192.168.0.0/24"; description = '' Extra saned configuration lines. ''; }; }; ###### implementation config = mkMerge [ (mkIf enabled { hardware.sane.configDir = mkDefault "${saneConfig}/etc/sane.d"; environment.systemPackages = backends; environment.sessionVariables = env; environment.etc."sane-config".source = config.hardware.sane.configDir; environment.etc."sane-libs".source = "${saneConfig}/lib/sane"; services.udev.packages = backends; users.groups.scanner.gid = config.ids.gids.scanner; networking.firewall.allowedUDPPorts = mkIf config.hardware.sane.openFirewall [ 8612 ]; systemd.tmpfiles.rules = [ "d /var/lock/sane 0770 root scanner - -" ]; }) (mkIf config.services.saned.enable { networking.firewall.connectionTrackingModules = [ "sane" ]; systemd.services."saned@" = { description = "Scanner Service"; environment = mapAttrs (name: val: toString val) env; serviceConfig = { User = "scanner"; Group = "scanner"; ExecStart = "${pkg}/bin/saned"; }; }; systemd.sockets.saned = { description = "saned incoming socket"; wantedBy = [ "sockets.target" ]; listenStreams = [ "0.0.0.0:6566" "[::]:6566" ]; socketConfig = { # saned needs to distinguish between IPv4 and IPv6 to open matching data sockets. BindIPv6Only = "ipv6-only"; Accept = true; MaxConnections = 64; }; }; users.users.scanner = { uid = config.ids.uids.scanner; group = "scanner"; extraGroups = [ "lp" ] ++ optionals config.services.avahi.enable [ "avahi" ]; }; }) ]; }