diff options
author | pennae <82953136+pennae@users.noreply.github.com> | 2022-01-18 17:06:39 +0000 |
---|---|---|
committer | GitHub <noreply@github.com> | 2022-01-18 17:06:39 +0000 |
commit | 54fcd869d80fa551078018a69e2c2fe28c6435aa (patch) | |
tree | 118d9ead70b37512184188647f3c1f515e1a180e /nixos | |
parent | d8c194e03d14f44842ddc7a1e46e6c98b44f5b92 (diff) | |
parent | 91cc0cf63bc9959f9cdcc60ab15cf2eae6d870b1 (diff) | |
download | nixlib-54fcd869d80fa551078018a69e2c2fe28c6435aa.tar nixlib-54fcd869d80fa551078018a69e2c2fe28c6435aa.tar.gz nixlib-54fcd869d80fa551078018a69e2c2fe28c6435aa.tar.bz2 nixlib-54fcd869d80fa551078018a69e2c2fe28c6435aa.tar.lz nixlib-54fcd869d80fa551078018a69e2c2fe28c6435aa.tar.xz nixlib-54fcd869d80fa551078018a69e2c2fe28c6435aa.tar.zst nixlib-54fcd869d80fa551078018a69e2c2fe28c6435aa.zip |
Merge pull request #155009 from domenkozar/cachix-agent
nixos: add cachix-agent service
Diffstat (limited to 'nixos')
-rw-r--r-- | nixos/modules/module-list.nix | 1 | ||||
-rw-r--r-- | nixos/modules/services/system/cachix-agent/default.nix | 57 |
2 files changed, 58 insertions, 0 deletions
diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index c931f6b32f58..fdf93f2e17c5 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -968,6 +968,7 @@ ./services/security/vault.nix ./services/security/vaultwarden/default.nix ./services/security/yubikey-agent.nix + ./services/system/cachix-agent/default.nix ./services/system/cloud-init.nix ./services/system/dbus.nix ./services/system/earlyoom.nix diff --git a/nixos/modules/services/system/cachix-agent/default.nix b/nixos/modules/services/system/cachix-agent/default.nix new file mode 100644 index 000000000000..496e0b90355b --- /dev/null +++ b/nixos/modules/services/system/cachix-agent/default.nix @@ -0,0 +1,57 @@ +{ config, pkgs, lib, ... }: + +with lib; + +let + cfg = config.services.cachix-agent; +in { + meta.maintainers = [ lib.maintainers.domenkozar ]; + + options.services.cachix-agent = { + enable = mkEnableOption "Cachix Deploy Agent: https://docs.cachix.org/deploy/"; + + name = mkOption { + type = types.str; + description = "Agent name, usually same as the hostname"; + default = config.networking.hostName; + defaultText = "config.networking.hostName"; + }; + + profile = mkOption { + type = types.nullOr types.str; + default = null; + description = "Profile name, defaults to 'system' (NixOS)."; + }; + + package = mkOption { + type = types.package; + default = pkgs.cachix; + defaultText = literalExpression "pkgs.cachix"; + description = "Cachix Client package to use."; + }; + + credentialsFile = mkOption { + type = types.path; + default = "/etc/cachix-agent.token"; + description = '' + Required file that needs to contain CACHIX_AGENT_TOKEN=... + ''; + }; + }; + + config = mkIf cfg.enable { + systemd.services.cachix-agent = { + description = "Cachix Deploy Agent"; + after = ["network-online.target"]; + path = [ config.nix.package ]; + wantedBy = [ "multi-user.target" ]; + # don't restart while changing + reloadIfChanged = true; + serviceConfig = { + Restart = "on-failure"; + EnvironmentFile = cfg.credentialsFile; + ExecStart = "${cfg.package}/bin/cachix deploy agent ${cfg.name} ${if cfg.profile != null then profile else ""}"; + }; + }; + }; +} |