nixpkgs/nixos/modules/services/system/cachix-watch-store.nix

119 lines
3.3 KiB
Nix

{
config,
pkgs,
lib,
...
}:
let
cfg = config.services.cachix-watch-store;
in
{
meta = {
maintainers = lib.teams.cachix.members ++ [ lib.maintainers.jfroche ];
};
options.services.cachix-watch-store = {
enable = lib.mkEnableOption "Cachix Watch Store: <https://docs.cachix.org>";
cacheName = lib.mkOption {
type = lib.types.str;
description = "Cachix binary cache name";
};
cachixTokenFile = lib.mkOption {
type = lib.types.path;
description = ''
Required file that needs to contain the cachix auth token.
'';
};
signingKeyFile = lib.mkOption {
type = lib.types.nullOr lib.types.path;
description = ''
Optional file containing a self-managed signing key to sign uploaded store paths.
'';
default = null;
};
compressionLevel = lib.mkOption {
type = lib.types.nullOr (lib.types.ints.between 0 16);
description = "The compression level for ZSTD compression (between 0 and 16)";
default = null;
};
jobs = lib.mkOption {
type = lib.types.nullOr lib.types.ints.positive;
description = "Number of threads used for pushing store paths";
default = null;
};
host = lib.mkOption {
type = lib.types.nullOr lib.types.str;
default = null;
description = "Cachix host to connect to";
};
verbose = lib.mkOption {
type = lib.types.bool;
description = "Enable verbose output";
default = false;
};
package = lib.mkPackageOption pkgs "cachix" { };
};
config = lib.mkIf cfg.enable {
systemd.services.cachix-watch-store-agent = {
description = "Cachix watch store Agent";
wants = [ "network-online.target" ];
after = [ "network-online.target" ];
path = [ config.nix.package ];
wantedBy = [ "multi-user.target" ];
unitConfig = {
# allow to restart indefinitely
StartLimitIntervalSec = 0;
};
serviceConfig = {
# don't put too much stress on the machine when restarting
RestartSec = 1;
# we don't want to kill children processes as those are deployments
KillMode = "process";
Restart = "on-failure";
DynamicUser = true;
LoadCredential = [
"cachix-token:${toString cfg.cachixTokenFile}"
]
++ lib.optional (cfg.signingKeyFile != null) "signing-key:${toString cfg.signingKeyFile}";
};
script =
let
command = [
"${cfg.package}/bin/cachix"
]
++ (lib.optional cfg.verbose "--verbose")
++ (lib.optionals (cfg.host != null) [
"--host"
cfg.host
])
++ [ "watch-store" ]
++ (lib.optionals (cfg.compressionLevel != null) [
"--compression-level"
(toString cfg.compressionLevel)
])
++ (lib.optionals (cfg.jobs != null) [
"--jobs"
(toString cfg.jobs)
])
++ [ cfg.cacheName ];
in
''
export CACHIX_AUTH_TOKEN="$(<"$CREDENTIALS_DIRECTORY/cachix-token")"
${lib.optionalString (
cfg.signingKeyFile != null
) ''export CACHIX_SIGNING_KEY="$(<"$CREDENTIALS_DIRECTORY/signing-key")"''}
${lib.escapeShellArgs command}
'';
};
};
}