2017-01-07 19:16:26 +01:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
|
2017-05-15 23:53:49 +02:00
|
|
|
cfg = config.systemd.user;
|
|
|
|
|
2017-12-02 19:15:13 +01:00
|
|
|
dag = config.lib.dag;
|
|
|
|
|
2017-06-29 01:06:08 +02:00
|
|
|
enabled = cfg.services != {}
|
|
|
|
|| cfg.sockets != {}
|
|
|
|
|| cfg.targets != {}
|
2018-06-29 12:14:35 +02:00
|
|
|
|| cfg.timers != {}
|
2019-03-22 12:47:49 +01:00
|
|
|
|| cfg.paths != {}
|
|
|
|
|| cfg.sessionVariables != {};
|
2017-05-15 23:53:49 +02:00
|
|
|
|
2017-09-21 13:18:33 +02:00
|
|
|
toSystemdIni = generators.toINI {
|
2017-01-07 19:16:26 +01:00
|
|
|
mkKeyValue = key: value:
|
|
|
|
let
|
|
|
|
value' =
|
|
|
|
if isBool value then (if value then "true" else "false")
|
|
|
|
else toString value;
|
|
|
|
in
|
|
|
|
"${key}=${value'}";
|
|
|
|
};
|
|
|
|
|
|
|
|
buildService = style: name: serviceCfg:
|
|
|
|
let
|
2017-12-02 22:52:35 +01:00
|
|
|
filename = "${name}.${style}";
|
2019-02-19 08:10:04 +01:00
|
|
|
pathSafeName = lib.replaceChars ["@" ":" "\\" "[" "]"]
|
|
|
|
["-" "-" "-" "" "" ]
|
|
|
|
filename;
|
2017-12-02 22:52:35 +01:00
|
|
|
|
|
|
|
# Needed because systemd derives unit names from the ultimate
|
|
|
|
# link target.
|
2019-02-19 08:10:04 +01:00
|
|
|
source = pkgs.writeTextFile {
|
|
|
|
name = pathSafeName;
|
|
|
|
text = toSystemdIni serviceCfg;
|
|
|
|
destination = "/${filename}";
|
|
|
|
} + "/${filename}";
|
2017-01-07 19:16:26 +01:00
|
|
|
|
|
|
|
wantedBy = target:
|
|
|
|
{
|
2017-12-02 22:52:35 +01:00
|
|
|
name = "systemd/user/${target}.wants/${filename}";
|
2017-11-12 00:49:36 +01:00
|
|
|
value = { inherit source; };
|
2017-01-07 19:16:26 +01:00
|
|
|
};
|
|
|
|
in
|
|
|
|
singleton {
|
2017-12-02 22:52:35 +01:00
|
|
|
name = "systemd/user/${filename}";
|
2017-11-12 00:49:36 +01:00
|
|
|
value = { inherit source; };
|
2017-01-07 19:16:26 +01:00
|
|
|
}
|
|
|
|
++
|
|
|
|
map wantedBy (serviceCfg.Install.WantedBy or []);
|
|
|
|
|
|
|
|
buildServices = style: serviceCfgs:
|
|
|
|
concatLists (mapAttrsToList (buildService style) serviceCfgs);
|
|
|
|
|
2017-12-04 11:17:46 +01:00
|
|
|
servicesStartTimeoutMs = builtins.toString cfg.servicesStartTimeoutMs;
|
|
|
|
|
2019-04-10 00:40:45 +02:00
|
|
|
unitType = unitKind: with types;
|
|
|
|
let
|
|
|
|
primitive = either bool (either int str);
|
|
|
|
in
|
|
|
|
attrsOf (attrsOf (attrsOf (either primitive (listOf primitive))))
|
|
|
|
// {
|
|
|
|
description = "systemd ${unitKind} unit configuration";
|
|
|
|
};
|
2018-05-09 15:22:34 +02:00
|
|
|
|
2018-10-18 06:30:36 +02:00
|
|
|
unitDescription = type: ''
|
|
|
|
Definition of systemd per-user ${type} units. Attributes are
|
|
|
|
merged recursively.
|
|
|
|
</para><para>
|
|
|
|
Note that the attributes follow the capitalization and naming used
|
|
|
|
by systemd. More details can be found in
|
|
|
|
<citerefentry>
|
|
|
|
<refentrytitle>systemd.${type}</refentrytitle>
|
|
|
|
<manvolnum>5</manvolnum>
|
|
|
|
</citerefentry>.
|
|
|
|
'';
|
|
|
|
|
|
|
|
unitExample = type: literalExample ''
|
|
|
|
{
|
2019-08-29 19:12:39 +02:00
|
|
|
${toLower type}-name = {
|
|
|
|
Unit = {
|
|
|
|
Description = "Example description";
|
|
|
|
Documentation = [ "man:example(1)" "man:example(5)" ];
|
|
|
|
};
|
2018-10-18 06:30:36 +02:00
|
|
|
|
2019-08-29 19:12:39 +02:00
|
|
|
${type} = {
|
|
|
|
…
|
|
|
|
};
|
|
|
|
}
|
|
|
|
};
|
2018-10-18 06:30:36 +02:00
|
|
|
'';
|
|
|
|
|
2019-03-22 12:47:49 +01:00
|
|
|
sessionVariables = mkIf (cfg.sessionVariables != {}) {
|
|
|
|
"environment.d/10-home-manager.conf".text =
|
|
|
|
concatStringsSep "\n" (
|
|
|
|
mapAttrsToList (n: v: "${n}=${toString v}") cfg.sessionVariables
|
|
|
|
) + "\n";
|
|
|
|
};
|
|
|
|
|
2017-01-07 19:16:26 +01:00
|
|
|
in
|
|
|
|
|
|
|
|
{
|
2017-09-26 23:40:31 +02:00
|
|
|
meta.maintainers = [ maintainers.rycee ];
|
|
|
|
|
2017-01-07 19:16:26 +01:00
|
|
|
options = {
|
|
|
|
systemd.user = {
|
2017-10-20 14:02:05 +02:00
|
|
|
systemctlPath = mkOption {
|
|
|
|
default = "${pkgs.systemd}/bin/systemctl";
|
|
|
|
defaultText = "\${pkgs.systemd}/bin/systemctl";
|
|
|
|
type = types.str;
|
|
|
|
description = ''
|
|
|
|
Absolute path to the <command>systemctl</command> tool. This
|
|
|
|
option may need to be set if running Home Manager on a
|
|
|
|
non-NixOS distribution.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2017-01-07 19:16:26 +01:00
|
|
|
services = mkOption {
|
|
|
|
default = {};
|
2019-04-10 00:40:45 +02:00
|
|
|
type = unitType "service";
|
2018-10-18 06:30:36 +02:00
|
|
|
description = unitDescription "service";
|
|
|
|
example = unitExample "Service";
|
2017-01-07 19:16:26 +01:00
|
|
|
};
|
|
|
|
|
2017-06-29 01:06:08 +02:00
|
|
|
sockets = mkOption {
|
|
|
|
default = {};
|
2019-04-10 00:40:45 +02:00
|
|
|
type = unitType "socket";
|
2018-10-18 06:30:36 +02:00
|
|
|
description = unitDescription "socket";
|
|
|
|
example = unitExample "Socket";
|
2017-06-29 01:06:08 +02:00
|
|
|
};
|
|
|
|
|
2017-01-09 22:48:53 +01:00
|
|
|
targets = mkOption {
|
|
|
|
default = {};
|
2019-04-10 00:40:45 +02:00
|
|
|
type = unitType "target";
|
2018-10-18 06:30:36 +02:00
|
|
|
description = unitDescription "target";
|
|
|
|
example = unitExample "Target";
|
2017-01-09 22:48:53 +01:00
|
|
|
};
|
|
|
|
|
2017-01-07 19:16:26 +01:00
|
|
|
timers = mkOption {
|
|
|
|
default = {};
|
2019-04-10 00:40:45 +02:00
|
|
|
type = unitType "timer";
|
2018-10-18 06:30:36 +02:00
|
|
|
description = unitDescription "timer";
|
|
|
|
example = unitExample "Timer";
|
2017-01-07 19:16:26 +01:00
|
|
|
};
|
2017-12-04 11:17:46 +01:00
|
|
|
|
2018-06-29 12:14:35 +02:00
|
|
|
paths = mkOption {
|
|
|
|
default = {};
|
2019-04-10 00:40:45 +02:00
|
|
|
type = unitType "path";
|
2018-10-18 06:30:36 +02:00
|
|
|
description = unitDescription "path";
|
|
|
|
example = unitExample "Path";
|
2018-06-29 12:14:35 +02:00
|
|
|
};
|
|
|
|
|
2017-12-04 11:17:46 +01:00
|
|
|
startServices = mkOption {
|
|
|
|
default = false;
|
|
|
|
type = types.bool;
|
|
|
|
description = ''
|
|
|
|
Start all services that are wanted by active targets.
|
|
|
|
Additionally, stop obsolete services from the previous
|
|
|
|
generation.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
servicesStartTimeoutMs = mkOption {
|
|
|
|
default = 0;
|
|
|
|
type = types.int;
|
|
|
|
description = ''
|
|
|
|
How long to wait for started services to fail until their
|
|
|
|
start is considered successful.
|
|
|
|
'';
|
|
|
|
};
|
2019-03-22 12:47:49 +01:00
|
|
|
|
|
|
|
sessionVariables = mkOption {
|
|
|
|
default = {};
|
|
|
|
type = with types; attrsOf (either int str);
|
|
|
|
example = { EDITOR = "vim"; };
|
|
|
|
description = ''
|
|
|
|
Environment variables that will be set for the user session.
|
|
|
|
The variable values must be as described in
|
|
|
|
<citerefentry>
|
|
|
|
<refentrytitle>environment.d</refentrytitle>
|
|
|
|
<manvolnum>5</manvolnum>
|
|
|
|
</citerefentry>.
|
|
|
|
'';
|
|
|
|
};
|
2017-01-07 19:16:26 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2017-05-15 23:53:49 +02:00
|
|
|
config = mkMerge [
|
|
|
|
{
|
|
|
|
assertions = [
|
|
|
|
{
|
|
|
|
assertion = enabled -> pkgs.stdenv.isLinux;
|
|
|
|
message =
|
|
|
|
let
|
|
|
|
names = concatStringsSep ", " (
|
2017-06-29 01:06:08 +02:00
|
|
|
attrNames (
|
2019-03-22 12:47:49 +01:00
|
|
|
cfg.services // cfg.sockets // cfg.targets // cfg.timers // cfg.paths // cfg.sessionVariables
|
2017-06-29 01:06:08 +02:00
|
|
|
)
|
2017-05-15 23:53:49 +02:00
|
|
|
);
|
|
|
|
in
|
|
|
|
"Must use Linux for modules that require systemd: " + names;
|
|
|
|
}
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
# If we run under a Linux system we assume that systemd is
|
|
|
|
# available, in particular we assume that systemctl is in PATH.
|
|
|
|
(mkIf pkgs.stdenv.isLinux {
|
2019-03-22 12:47:49 +01:00
|
|
|
xdg.configFile = mkMerge [
|
|
|
|
(listToAttrs (
|
2017-05-15 23:53:49 +02:00
|
|
|
(buildServices "service" cfg.services)
|
|
|
|
++
|
2017-06-29 01:06:08 +02:00
|
|
|
(buildServices "socket" cfg.sockets)
|
|
|
|
++
|
2017-05-15 23:53:49 +02:00
|
|
|
(buildServices "target" cfg.targets)
|
|
|
|
++
|
|
|
|
(buildServices "timer" cfg.timers)
|
2018-06-29 12:14:35 +02:00
|
|
|
++
|
|
|
|
(buildServices "path" cfg.paths)
|
2019-03-22 12:47:49 +01:00
|
|
|
))
|
|
|
|
|
|
|
|
sessionVariables
|
|
|
|
];
|
2017-05-15 23:53:49 +02:00
|
|
|
|
2017-10-14 20:56:02 +02:00
|
|
|
# Run systemd service reload if user is logged in. If we're
|
|
|
|
# running this from the NixOS module then XDG_RUNTIME_DIR is not
|
|
|
|
# set and systemd commands will fail. We'll therefore have to
|
|
|
|
# set it ourselves in that case.
|
2017-12-02 19:15:13 +01:00
|
|
|
home.activation.reloadSystemD = dag.entryAfter ["linkGeneration"] (
|
2017-10-14 20:56:02 +02:00
|
|
|
let
|
|
|
|
autoReloadCmd = ''
|
|
|
|
${pkgs.ruby}/bin/ruby ${./systemd-activate.rb} \
|
|
|
|
"''${oldGenPath=}" "$newGenPath" "${servicesStartTimeoutMs}"
|
|
|
|
'';
|
|
|
|
|
|
|
|
legacyReloadCmd = ''
|
|
|
|
bash ${./systemd-activate.sh} "''${oldGenPath=}" "$newGenPath"
|
|
|
|
'';
|
2018-02-18 16:39:28 +01:00
|
|
|
|
|
|
|
ensureRuntimeDir = "XDG_RUNTIME_DIR=\${XDG_RUNTIME_DIR:-/run/user/$(id -u)}";
|
2019-11-17 21:16:28 +01:00
|
|
|
|
|
|
|
systemctl = "${ensureRuntimeDir} ${cfg.systemctlPath}";
|
2017-10-14 20:56:02 +02:00
|
|
|
in
|
2017-12-04 11:17:46 +01:00
|
|
|
''
|
2019-11-17 21:16:28 +01:00
|
|
|
systemdStatus=$(${systemctl} --user is-system-running 2>&1 || true)
|
|
|
|
|
|
|
|
if [[ $systemdStatus == 'running' || $systemdStatus == 'degraded' ]]; then
|
|
|
|
if [[ $systemdStatus == 'degraded' ]]; then
|
|
|
|
warnEcho "The user systemd session is degraded:"
|
2019-12-15 23:58:43 +01:00
|
|
|
${systemctl} --user --state=failed
|
2019-11-17 21:16:28 +01:00
|
|
|
warnEcho "Attempting to reload services anyway..."
|
|
|
|
fi
|
|
|
|
|
2018-02-18 16:39:28 +01:00
|
|
|
${ensureRuntimeDir} \
|
2017-10-14 20:56:02 +02:00
|
|
|
PATH=${dirOf cfg.systemctlPath}:$PATH \
|
|
|
|
${if cfg.startServices then autoReloadCmd else legacyReloadCmd}
|
|
|
|
else
|
2018-02-18 16:39:28 +01:00
|
|
|
echo "User systemd daemon not running. Skipping reload."
|
2017-10-14 20:56:02 +02:00
|
|
|
fi
|
2019-11-17 21:16:28 +01:00
|
|
|
|
|
|
|
unset systemdStatus
|
2017-12-04 11:17:46 +01:00
|
|
|
''
|
|
|
|
);
|
2017-05-15 23:53:49 +02:00
|
|
|
})
|
|
|
|
];
|
2017-01-07 19:16:26 +01:00
|
|
|
}
|