mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-06-12 12:45:27 +03:00

Format all Nix files using the officially approved formatter,
making the CI check introduced in the previous commit succeed:
nix-build ci -A fmt.check
This is the next step of the of the [implementation](https://github.com/NixOS/nixfmt/issues/153)
of the accepted [RFC 166](https://github.com/NixOS/rfcs/pull/166).
This commit will lead to merge conflicts for a number of PRs,
up to an estimated ~1100 (~33%) among the PRs with activity in the past 2
months, but that should be lower than what it would be without the previous
[partial treewide format](https://github.com/NixOS/nixpkgs/pull/322537).
Merge conflicts caused by this commit can now automatically be resolved while rebasing using the
[auto-rebase script](8616af08d9/maintainers/scripts/auto-rebase
).
If you run into any problems regarding any of this, please reach out to the
[formatting team](https://nixos.org/community/teams/formatting/) by
pinging @NixOS/nix-formatting.
104 lines
2.4 KiB
Nix
104 lines
2.4 KiB
Nix
{
|
|
config,
|
|
lib,
|
|
pkgs,
|
|
...
|
|
}:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.shellhub-agent;
|
|
in
|
|
{
|
|
###### interface
|
|
|
|
options = {
|
|
|
|
services.shellhub-agent = {
|
|
|
|
enable = mkEnableOption "ShellHub Agent daemon";
|
|
|
|
package = mkPackageOption pkgs "shellhub-agent" { };
|
|
|
|
preferredHostname = mkOption {
|
|
type = types.str;
|
|
default = "";
|
|
description = ''
|
|
Set the device preferred hostname. This provides a hint to
|
|
the server to use this as hostname if it is available.
|
|
'';
|
|
};
|
|
|
|
keepAliveInterval = mkOption {
|
|
type = types.int;
|
|
default = 30;
|
|
description = ''
|
|
Determine the interval to send the keep alive message to
|
|
the server. This has a direct impact of the bandwidth
|
|
used by the device.
|
|
'';
|
|
};
|
|
|
|
tenantId = mkOption {
|
|
type = types.str;
|
|
example = "ba0a880c-2ada-11eb-a35e-17266ef329d6";
|
|
description = ''
|
|
The tenant ID to use when connecting to the ShellHub
|
|
Gateway.
|
|
'';
|
|
};
|
|
|
|
server = mkOption {
|
|
type = types.str;
|
|
default = "https://cloud.shellhub.io";
|
|
description = ''
|
|
Server address of ShellHub Gateway to connect.
|
|
'';
|
|
};
|
|
|
|
privateKey = mkOption {
|
|
type = types.path;
|
|
default = "/var/lib/shellhub-agent/private.key";
|
|
description = ''
|
|
Location where to store the ShellHub Agent private
|
|
key.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
###### implementation
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
systemd.services.shellhub-agent = {
|
|
description = "ShellHub Agent";
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
requires = [ "local-fs.target" ];
|
|
wants = [ "network-online.target" ];
|
|
after = [
|
|
"local-fs.target"
|
|
"network.target"
|
|
"network-online.target"
|
|
"time-sync.target"
|
|
];
|
|
|
|
environment = {
|
|
SHELLHUB_SERVER_ADDRESS = cfg.server;
|
|
SHELLHUB_PRIVATE_KEY = cfg.privateKey;
|
|
SHELLHUB_TENANT_ID = cfg.tenantId;
|
|
SHELLHUB_KEEPALIVE_INTERVAL = toString cfg.keepAliveInterval;
|
|
SHELLHUB_PREFERRED_HOSTNAME = cfg.preferredHostname;
|
|
};
|
|
|
|
serviceConfig = {
|
|
# The service starts sessions for different users.
|
|
User = "root";
|
|
Restart = "on-failure";
|
|
ExecStart = "${cfg.package}/bin/agent";
|
|
};
|
|
};
|
|
};
|
|
}
|