A centralized list for these renames is not good because: - It breaks disabledModules for modules that have a rename defined - Adding/removing renames for a module means having to find them in the central file - Merge conflicts due to multiple people editing the central file
		
			
				
	
	
		
			91 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			91 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
{ config, lib, pkgs, ... }:
 | 
						|
 | 
						|
with lib;
 | 
						|
 | 
						|
let
 | 
						|
  cfg = config.services.pykms;
 | 
						|
  libDir = "/var/lib/pykms";
 | 
						|
 | 
						|
in {
 | 
						|
  meta.maintainers = with lib.maintainers; [ peterhoeg ];
 | 
						|
 | 
						|
  imports = [
 | 
						|
    (mkRemovedOptionModule [ "services" "pykms" "verbose" ] "Use services.pykms.logLevel instead")
 | 
						|
  ];
 | 
						|
 | 
						|
  options = {
 | 
						|
    services.pykms = {
 | 
						|
      enable = mkOption {
 | 
						|
        type = types.bool;
 | 
						|
        default = false;
 | 
						|
        description = "Whether to enable the PyKMS service.";
 | 
						|
      };
 | 
						|
 | 
						|
      listenAddress = mkOption {
 | 
						|
        type = types.str;
 | 
						|
        default = "0.0.0.0";
 | 
						|
        description = "The IP address on which to listen.";
 | 
						|
      };
 | 
						|
 | 
						|
      port = mkOption {
 | 
						|
        type = types.int;
 | 
						|
        default = 1688;
 | 
						|
        description = "The port on which to listen.";
 | 
						|
      };
 | 
						|
 | 
						|
      openFirewallPort = mkOption {
 | 
						|
        type = types.bool;
 | 
						|
        default = false;
 | 
						|
        description = "Whether the listening port should be opened automatically.";
 | 
						|
      };
 | 
						|
 | 
						|
      memoryLimit = mkOption {
 | 
						|
        type = types.str;
 | 
						|
        default = "64M";
 | 
						|
        description = "How much memory to use at most.";
 | 
						|
      };
 | 
						|
 | 
						|
      logLevel = mkOption {
 | 
						|
        type = types.enum [ "CRITICAL" "ERROR" "WARNING" "INFO" "DEBUG" "MINI" ];
 | 
						|
        default = "INFO";
 | 
						|
        description = "How much to log";
 | 
						|
      };
 | 
						|
 | 
						|
      extraArgs = mkOption {
 | 
						|
        type = types.listOf types.str;
 | 
						|
        default = [];
 | 
						|
        description = "Additional arguments";
 | 
						|
      };
 | 
						|
    };
 | 
						|
  };
 | 
						|
 | 
						|
  config = mkIf cfg.enable {
 | 
						|
    networking.firewall.allowedTCPPorts = lib.mkIf cfg.openFirewallPort [ cfg.port ];
 | 
						|
 | 
						|
    systemd.services.pykms = {
 | 
						|
      description = "Python KMS";
 | 
						|
      after = [ "network.target" ];
 | 
						|
      wantedBy = [ "multi-user.target" ];
 | 
						|
      # python programs with DynamicUser = true require HOME to be set
 | 
						|
      environment.HOME = libDir;
 | 
						|
      serviceConfig = with pkgs; {
 | 
						|
        DynamicUser = true;
 | 
						|
        StateDirectory = baseNameOf libDir;
 | 
						|
        ExecStartPre = "${getBin pykms}/libexec/create_pykms_db.sh ${libDir}/clients.db";
 | 
						|
        ExecStart = lib.concatStringsSep " " ([
 | 
						|
          "${getBin pykms}/bin/server"
 | 
						|
          "--logfile STDOUT"
 | 
						|
          "--loglevel ${cfg.logLevel}"
 | 
						|
        ] ++ cfg.extraArgs ++ [
 | 
						|
          cfg.listenAddress
 | 
						|
          (toString cfg.port)
 | 
						|
        ]);
 | 
						|
        ProtectHome = "tmpfs";
 | 
						|
        WorkingDirectory = libDir;
 | 
						|
        Restart = "on-failure";
 | 
						|
        MemoryLimit = cfg.memoryLimit;
 | 
						|
      };
 | 
						|
    };
 | 
						|
  };
 | 
						|
}
 |