1
0
Fork 0
mirror of https://github.com/nix-community/home-manager synced 2024-11-05 02:39:45 +01:00
home-manager/modules/services/cachix-agent.nix

85 lines
2.1 KiB
Nix
Raw Normal View History

2022-10-27 19:08:14 +02:00
{ config, pkgs, lib, ... }:
with lib;
let
cfg = config.services.cachix-agent;
in {
meta.maintainers = [ maintainers.rycee ];
options.services.cachix-agent = {
enable = mkEnableOption ''
Cachix Deploy Agent: <link xlink:href="https://docs.cachix.org/deploy/"/>'';
name = mkOption {
type = types.str;
description = "The unique agent name.";
};
verbose = mkEnableOption "verbose output";
profile = mkOption {
type = types.str;
default = "home-manager";
description = ''
The Nix profile name.
'';
};
host = mkOption {
type = types.nullOr types.str;
default = null;
description = "Cachix URI to use.";
};
package = mkPackageOption pkgs "cachix" { };
credentialsFile = mkOption {
type = types.path;
default = "${config.xdg.configHome}/cachix-agent.token";
defaultText =
literalExpression ''"''${config.xdg.configHome}/cachix-agent.token"'';
description = ''
Required file that needs to contain
<literal>CACHIX_AGENT_TOKEN=...</literal>.
'';
};
};
config = mkIf cfg.enable {
assertions = [
(lib.hm.assertions.assertPlatform "services.cachix-agent" pkgs
lib.platforms.linux)
];
systemd.user.services.cachix-agent = {
Unit.Description = "Cachix Deploy Agent";
Service = {
Environment = [
"PATH=${
if config.nix.enable && config.nix.package != null then
config.nix.package
else
pkgs.nix
}/bin"
];
EnvironmentFile = cfg.credentialsFile;
# We don't want to kill children processes as those are deployments.
KillMode = "process";
Restart = "on-failure";
ExecStart = escapeShellArgs ([ "${cfg.package}/bin/cachix" ]
++ optional cfg.verbose "--verbose"
++ optional (cfg.host != null) "--host ${cfg.host}"
++ [ "deploy" "agent" cfg.name ]
++ optional (cfg.profile != null) cfg.profile);
};
Install.WantedBy = [ "default.target" ];
};
};
}