3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/nixos/modules/services/networking/gateone.nix

60 lines
1.8 KiB
Nix
Raw Normal View History

2015-07-31 05:22:44 +01:00
{ config, lib, pkgs, ...}:
with lib;
let
cfg = config.services.gateone;
in
{
options = {
services.gateone = {
enable = mkEnableOption "GateOne server";
pidDir = mkOption {
default = "/run/gateone";
type = types.path;
description = "Path of pid files for GateOne.";
2015-07-31 05:22:44 +01:00
};
settingsDir = mkOption {
default = "/var/lib/gateone";
type = types.path;
description = "Path of configuration files for GateOne.";
2015-07-31 05:22:44 +01:00
};
};
};
config = mkIf cfg.enable {
environment.systemPackages = with pkgs.pythonPackages; [
2015-12-17 18:17:49 +00:00
gateone pkgs.openssh pkgs.procps pkgs.coreutils pkgs.cacert];
2015-07-31 05:22:44 +01:00
users.users.gateone = {
2015-07-31 05:22:44 +01:00
description = "GateOne privilege separation user";
uid = config.ids.uids.gateone;
home = cfg.settingsDir;
};
users.groups.gateone.gid = config.ids.gids.gateone;
2015-07-31 05:22:44 +01:00
systemd.services.gateone = with pkgs; {
description = "GateOne web-based terminal";
path = [ pythonPackages.gateone nix openssh procps coreutils ];
preStart = ''
if [ ! -d ${cfg.settingsDir} ] ; then
mkdir -m 0750 -p ${cfg.settingsDir}
chown -R gateone.gateone ${cfg.settingsDir}
2015-08-07 05:43:29 +01:00
fi
if [ ! -d ${cfg.pidDir} ] ; then
mkdir -m 0750 -p ${cfg.pidDir}
2015-07-31 05:22:44 +01:00
chown -R gateone.gateone ${cfg.pidDir}
fi
'';
#unitConfig.RequiresMountsFor = "${cfg.settingsDir}";
serviceConfig = {
ExecStart = ''${pythonPackages.gateone}/bin/gateone --settings_dir=${cfg.settingsDir} --pid_file=${cfg.pidDir}/gateone.pid --gid=${toString config.ids.gids.gateone} --uid=${toString config.ids.uids.gateone}'';
User = "gateone";
Group = "gateone";
WorkingDirectory = cfg.settingsDir;
};
wantedBy = [ "multi-user.target" ];
requires = [ "network.target" ];
};
};
}