2023-06-28 23:58:15 +02:00
|
|
|
{ config, options, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
cfg = config.services.ssh-agent;
|
|
|
|
|
|
|
|
in {
|
2024-06-23 23:03:18 +02:00
|
|
|
meta.maintainers = [ lib.hm.maintainers.lheckemann ];
|
2023-06-28 23:58:15 +02:00
|
|
|
|
|
|
|
options = {
|
|
|
|
services.ssh-agent = {
|
|
|
|
enable = lib.mkEnableOption "OpenSSH private key agent";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
config = lib.mkIf cfg.enable {
|
2023-07-10 16:37:49 +02:00
|
|
|
assertions = [
|
|
|
|
(lib.hm.assertions.assertPlatform "services.ssh-agent" pkgs
|
|
|
|
lib.platforms.linux)
|
|
|
|
];
|
|
|
|
|
2023-06-28 23:58:15 +02:00
|
|
|
home.sessionVariablesExtra = ''
|
2024-09-20 09:38:42 +02:00
|
|
|
if [ -z "$SSH_AUTH_SOCK" ]; then
|
2023-06-28 23:58:15 +02:00
|
|
|
export SSH_AUTH_SOCK=$XDG_RUNTIME_DIR/ssh-agent
|
|
|
|
fi
|
|
|
|
'';
|
|
|
|
|
|
|
|
systemd.user.services.ssh-agent = {
|
|
|
|
Install.WantedBy = [ "default.target" ];
|
|
|
|
|
|
|
|
Unit = {
|
|
|
|
Description = "SSH authentication agent";
|
|
|
|
Documentation = "man:ssh-agent(1)";
|
|
|
|
};
|
|
|
|
|
|
|
|
Service = {
|
|
|
|
ExecStart = "${pkgs.openssh}/bin/ssh-agent -D -a %t/ssh-agent";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|