2017-01-07 19:16:26 +01:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
cfg = config.services.gpg-agent;
|
|
|
|
|
2017-08-21 15:01:36 +02:00
|
|
|
gpgInitStr = ''
|
|
|
|
GPG_TTY="$(tty)"
|
|
|
|
export GPG_TTY
|
|
|
|
gpg-connect-agent updatestartuptty /bye > /dev/null
|
|
|
|
'';
|
|
|
|
|
2017-01-07 19:16:26 +01:00
|
|
|
in
|
|
|
|
|
|
|
|
{
|
|
|
|
options = {
|
|
|
|
services.gpg-agent = {
|
|
|
|
enable = mkEnableOption "GnuPG private key agent";
|
|
|
|
|
|
|
|
defaultCacheTtl = mkOption {
|
|
|
|
type = types.nullOr types.int;
|
|
|
|
default = null;
|
|
|
|
description = ''
|
|
|
|
Set the time a cache entry is valid to the given number of seconds.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
enableSshSupport = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description = "Whether to use the GnuPG key agent for SSH keys.";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2017-06-29 23:33:28 +02:00
|
|
|
config = mkIf cfg.enable (mkMerge [
|
|
|
|
{
|
|
|
|
home.file.".gnupg/gpg-agent.conf".text = concatStringsSep "\n" (
|
|
|
|
optional cfg.enableSshSupport
|
|
|
|
"enable-ssh-support"
|
|
|
|
++
|
|
|
|
optional (cfg.defaultCacheTtl != null)
|
|
|
|
"default-cache-ttl ${toString cfg.defaultCacheTtl}"
|
|
|
|
);
|
|
|
|
|
|
|
|
home.sessionVariables =
|
|
|
|
optionalAttrs cfg.enableSshSupport {
|
|
|
|
SSH_AUTH_SOCK = "\${XDG_RUNTIME_DIR}/gnupg/S.gpg-agent.ssh";
|
|
|
|
};
|
|
|
|
|
2017-08-21 15:01:36 +02:00
|
|
|
programs.bash.initExtra = gpgInitStr;
|
|
|
|
programs.zsh.initExtra = gpgInitStr;
|
2017-06-29 23:33:28 +02:00
|
|
|
}
|
2017-01-07 19:16:26 +01:00
|
|
|
|
2017-06-29 23:33:28 +02:00
|
|
|
# The systemd units below are direct translations of the
|
|
|
|
# descriptions in the
|
|
|
|
#
|
|
|
|
# ${pkgs.gnupg}/share/doc/gnupg/examples/systemd-user
|
|
|
|
#
|
|
|
|
# directory.
|
|
|
|
{
|
|
|
|
systemd.user.services.gpg-agent = {
|
|
|
|
Unit = {
|
|
|
|
Description = "GnuPG cryptographic agent and passphrase cache";
|
|
|
|
Documentation = "man:gpg-agent(1)";
|
|
|
|
Requires = "gpg-agent.socket";
|
|
|
|
After = "gpg-agent.socket";
|
|
|
|
# This is a socket-activated service:
|
|
|
|
RefuseManualStart = true;
|
|
|
|
};
|
2017-01-07 19:16:26 +01:00
|
|
|
|
2017-06-29 23:33:28 +02:00
|
|
|
Service = {
|
|
|
|
ExecStart = "${pkgs.gnupg}/bin/gpg-agent --supervised";
|
|
|
|
ExecReload = "${pkgs.gnupg}/bin/gpgconf --reload gpg-agent";
|
|
|
|
};
|
2017-01-07 19:16:26 +01:00
|
|
|
};
|
|
|
|
|
2017-06-29 23:33:28 +02:00
|
|
|
systemd.user.sockets.gpg-agent = {
|
|
|
|
Unit = {
|
|
|
|
Description = "GnuPG cryptographic agent and passphrase cache";
|
|
|
|
Documentation = "man:gpg-agent(1)";
|
|
|
|
};
|
|
|
|
|
|
|
|
Socket = {
|
|
|
|
ListenStream = "%t/gnupg/S.gpg-agent";
|
|
|
|
FileDescriptorName = "std";
|
|
|
|
SocketMode = "0600";
|
|
|
|
DirectoryMode = "0700";
|
|
|
|
};
|
|
|
|
|
|
|
|
Install = {
|
|
|
|
WantedBy = [ "sockets.target" ];
|
|
|
|
};
|
2017-01-07 19:16:26 +01:00
|
|
|
};
|
2017-06-29 23:33:28 +02:00
|
|
|
}
|
2017-01-07 19:16:26 +01:00
|
|
|
|
2017-06-29 23:33:28 +02:00
|
|
|
(mkIf cfg.enableSshSupport {
|
|
|
|
systemd.user.sockets.gpg-agent-ssh = {
|
|
|
|
Unit = {
|
|
|
|
Description = "GnuPG cryptographic agent (ssh-agent emulation)";
|
|
|
|
Documentation = "man:gpg-agent(1) man:ssh-add(1) man:ssh-agent(1) man:ssh(1)";
|
|
|
|
};
|
|
|
|
|
|
|
|
Socket = {
|
|
|
|
ListenStream = "%t/gnupg/S.gpg-agent.ssh";
|
|
|
|
FileDescriptorName = "ssh";
|
|
|
|
Service = "gpg-agent.service";
|
|
|
|
SocketMode = "0600";
|
|
|
|
DirectoryMode = "0700";
|
|
|
|
};
|
|
|
|
|
|
|
|
Install = {
|
|
|
|
WantedBy = [ "sockets.target" ];
|
|
|
|
};
|
2017-01-07 19:16:26 +01:00
|
|
|
};
|
2017-06-29 23:33:28 +02:00
|
|
|
})
|
|
|
|
]);
|
2017-01-07 19:16:26 +01:00
|
|
|
}
|