1
0
Fork 0
mirror of https://github.com/nix-community/home-manager synced 2024-11-01 08:49:44 +01:00
home-manager/modules/services/gnome-keyring.nix

60 lines
1.5 KiB
Nix
Raw Normal View History

2017-01-07 19:16:26 +01:00
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.gnome-keyring;
2020-02-02 00:39:17 +01:00
in {
meta.maintainers = [ maintainers.rycee ];
2017-01-07 19:16:26 +01:00
options = {
services.gnome-keyring = {
enable = mkEnableOption "GNOME Keyring";
components = mkOption {
2020-02-02 00:39:17 +01:00
type = types.listOf (types.enum [ "pkcs11" "secrets" "ssh" ]);
default = [ ];
2017-01-07 19:16:26 +01:00
description = ''
The GNOME keyring components to start. If empty then the
default set of components will be started.
'';
};
};
};
config = mkIf cfg.enable {
assertions = [
(lib.hm.assertions.assertPlatform "services.gnome-keyring" pkgs
lib.platforms.linux)
{
assertion = !config.services.pass-secret-service.enable;
message = ''
Only one secrets service per user can be enabled at a time.
Other services enabled:
- pass-secret-service
'';
}
];
2017-01-07 19:16:26 +01:00
systemd.user.services.gnome-keyring = {
Unit = {
Description = "GNOME Keyring";
PartOf = [ "graphical-session-pre.target" ];
2017-01-07 19:16:26 +01:00
};
Service = {
2020-02-02 00:39:17 +01:00
ExecStart = let
args = concatStringsSep " " ([ "--start" "--foreground" ]
++ optional (cfg.components != [ ])
("--components=" + concatStringsSep "," cfg.components));
in "${pkgs.gnome-keyring}/bin/gnome-keyring-daemon ${args}";
2017-01-07 19:16:26 +01:00
Restart = "on-abort";
};
2020-02-02 00:39:17 +01:00
Install = { WantedBy = [ "graphical-session-pre.target" ]; };
2017-01-07 19:16:26 +01:00
};
};
}