mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-12-05 05:13:04 +00:00
eb0050ca45
Without a group the gid will default to 65534 (2^16 - 2) which maps to "nogroup". IMO it makes more sense to explicitly set a valid group. Adding pkgs.sks to environment.systemPackages is not required (IIRC we want to avoid bloating environment.systemPackages). Instead it seems like a better idea to make the relevant binaries available to the user sks and enable useDefaultShell so that "su -l sks" can be used for manual interaction (that way the files will always have the correct owner).
115 lines
3.4 KiB
Nix
115 lines
3.4 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.sks;
|
|
sksPkg = cfg.package;
|
|
|
|
in {
|
|
meta.maintainers = with maintainers; [ primeos calbrecht jcumming ];
|
|
|
|
options = {
|
|
|
|
services.sks = {
|
|
|
|
enable = mkEnableOption ''
|
|
SKS (synchronizing key server for OpenPGP) and start the database
|
|
server. You need to create "''${dataDir}/dump/*.gpg" for the initial
|
|
import'';
|
|
|
|
package = mkOption {
|
|
default = pkgs.sks;
|
|
defaultText = "pkgs.sks";
|
|
type = types.package;
|
|
description = "Which SKS derivation to use.";
|
|
};
|
|
|
|
dataDir = mkOption {
|
|
type = types.path;
|
|
default = "/var/db/sks";
|
|
example = "/var/lib/sks";
|
|
# TODO: The default might change to "/var/lib/sks" as this is more
|
|
# common. There's also https://github.com/NixOS/nixpkgs/issues/26256
|
|
# and "/var/db" is not FHS compliant (seems to come from BSD).
|
|
description = ''
|
|
Data directory (-basedir) for SKS, where the database and all
|
|
configuration files are located (e.g. KDB, PTree, membership and
|
|
sksconf).
|
|
'';
|
|
};
|
|
|
|
hkpAddress = mkOption {
|
|
default = [ "127.0.0.1" "::1" ];
|
|
type = types.listOf types.str;
|
|
description = ''
|
|
Domain names, IPv4 and/or IPv6 addresses to listen on for HKP
|
|
requests.
|
|
'';
|
|
};
|
|
|
|
hkpPort = mkOption {
|
|
default = 11371;
|
|
type = types.ints.u16;
|
|
description = "HKP port to listen on.";
|
|
};
|
|
|
|
webroot = mkOption {
|
|
type = types.path;
|
|
default = "${sksPkg.webSamples}/OpenPKG";
|
|
defaultText = "\${pkgs.sks.webSamples}/OpenPKG";
|
|
description = ''
|
|
Source directory (will be symlinked) for the files the built-in
|
|
webserver should serve. SKS (''${pkgs.sks.webSamples}) provides the
|
|
following examples: "HTML5", "OpenPKG", and "XHTML+ES". The index
|
|
file can be named index.html, index.htm, index.xhtm, or index.xhtml.
|
|
Files with the extensions .css, .es, .js, .jpg, .jpeg, .png, or .gif
|
|
are supported. Subdirectories and filenames with anything other than
|
|
alphanumeric characters and the '.' character will be ignored.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
users = {
|
|
users.sks = {
|
|
isSystemUser = true;
|
|
description = "SKS user";
|
|
home = cfg.dataDir;
|
|
createHome = true;
|
|
group = "sks";
|
|
useDefaultShell = true;
|
|
packages = [ sksPkg pkgs.db ];
|
|
};
|
|
groups.sks = { };
|
|
};
|
|
|
|
systemd.services = let
|
|
hkpAddress = "'" + (builtins.concatStringsSep " " cfg.hkpAddress) + "'" ;
|
|
hkpPort = builtins.toString cfg.hkpPort;
|
|
in {
|
|
"sks-db" = {
|
|
description = "SKS database server";
|
|
after = [ "network.target" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
preStart = ''
|
|
ln -sfT "${cfg.webroot}" web
|
|
mkdir -p dump
|
|
${sksPkg}/bin/sks build dump/*.gpg -n 10 -cache 100 || true #*/
|
|
${sksPkg}/bin/sks cleandb || true
|
|
${sksPkg}/bin/sks pbuild -cache 20 -ptree_cache 70 || true
|
|
'';
|
|
serviceConfig = {
|
|
WorkingDirectory = "~";
|
|
User = "sks";
|
|
Group = "sks";
|
|
Restart = "always";
|
|
ExecStart = "${sksPkg}/bin/sks db -hkp_address ${hkpAddress} -hkp_port ${hkpPort}";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
}
|