nixos/ntpd: format with nixfmt-rfc-style

This commit is contained in:
Pyrox 2024-10-19 03:24:01 -04:00
parent 81dbc6e74b
commit 297f21e357
No known key found for this signature in database
GPG Key ID: 8CDF3F7CAA53A0F5

View File

@ -1,4 +1,9 @@
{ config, lib, pkgs, ... }: {
config,
lib,
pkgs,
...
}:
with lib; with lib;
@ -25,7 +30,12 @@ let
${cfg.extraConfig} ${cfg.extraConfig}
''; '';
ntpFlags = [ "-c" "${configFile}" "-u" "ntp:ntp" ] ++ cfg.extraFlags; ntpFlags = [
"-c"
"${configFile}"
"-u"
"ntp:ntp"
] ++ cfg.extraFlags;
in in
@ -58,7 +68,14 @@ in
recommended in section 6.5.1.1.3, answer "No" of recommended in section 6.5.1.1.3, answer "No" of
https://support.ntp.org/Support/AccessRestrictions https://support.ntp.org/Support/AccessRestrictions
''; '';
default = [ "limited" "kod" "nomodify" "notrap" "noquery" "nopeer" ]; default = [
"limited"
"kod"
"nomodify"
"notrap"
"noquery"
"nopeer"
];
}; };
restrictSource = mkOption { restrictSource = mkOption {
@ -69,7 +86,13 @@ in
The default flags allow peers to be added by ntpd from configured The default flags allow peers to be added by ntpd from configured
pool(s), but not by other means. pool(s), but not by other means.
''; '';
default = [ "limited" "kod" "nomodify" "notrap" "noquery" ]; default = [
"limited"
"kod"
"nomodify"
"notrap"
"noquery"
];
}; };
servers = mkOption { servers = mkOption {
@ -96,14 +119,13 @@ in
type = types.listOf types.str; type = types.listOf types.str;
description = "Extra flags passed to the ntpd command."; description = "Extra flags passed to the ntpd command.";
example = literalExpression ''[ "--interface=eth0" ]''; example = literalExpression ''[ "--interface=eth0" ]'';
default = []; default = [ ];
}; };
}; };
}; };
###### implementation ###### implementation
config = mkIf config.services.ntp.enable { config = mkIf config.services.ntp.enable {
@ -113,25 +135,26 @@ in
environment.systemPackages = [ pkgs.ntp ]; environment.systemPackages = [ pkgs.ntp ];
services.timesyncd.enable = mkForce false; services.timesyncd.enable = mkForce false;
systemd.services.systemd-timedated.environment = { SYSTEMD_TIMEDATED_NTP_SERVICES = "ntpd.service"; }; systemd.services.systemd-timedated.environment = {
SYSTEMD_TIMEDATED_NTP_SERVICES = "ntpd.service";
};
users.users.ntp = users.users.ntp = {
{ isSystemUser = true; isSystemUser = true;
group = "ntp"; group = "ntp";
description = "NTP daemon user"; description = "NTP daemon user";
home = stateDir; home = stateDir;
}; };
users.groups.ntp = {}; users.groups.ntp = { };
systemd.services.ntpd = systemd.services.ntpd = {
{ description = "NTP Daemon"; description = "NTP Daemon";
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
wants = [ "time-sync.target" ]; wants = [ "time-sync.target" ];
before = [ "time-sync.target" ]; before = [ "time-sync.target" ];
preStart = preStart = ''
''
mkdir -m 0755 -p ${stateDir} mkdir -m 0755 -p ${stateDir}
chown ntp ${stateDir} chown ntp ${stateDir}
''; '';