93 lines
2.1 KiB
Nix
93 lines
2.1 KiB
Nix
|
{ lib
|
||
|
, pkgs
|
||
|
, config
|
||
|
, ...
|
||
|
}:
|
||
|
|
||
|
with lib;
|
||
|
|
||
|
let
|
||
|
cfg = config.services.evcc;
|
||
|
|
||
|
format = pkgs.formats.yaml {};
|
||
|
configFile = format.generate "evcc.yml" cfg.settings;
|
||
|
|
||
|
package = pkgs.evcc;
|
||
|
in
|
||
|
|
||
|
{
|
||
|
meta.maintainers = with lib.maintainers; [ hexa ];
|
||
|
|
||
|
options.services.evcc = with types; {
|
||
|
enable = mkEnableOption (lib.mdDoc "EVCC, the extensible EV Charge Controller with PV integration");
|
||
|
|
||
|
extraArgs = mkOption {
|
||
|
type = listOf str;
|
||
|
default = [];
|
||
|
description = lib.mdDoc ''
|
||
|
Extra arguments to pass to the evcc executable.
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
settings = mkOption {
|
||
|
type = format.type;
|
||
|
description = lib.mdDoc ''
|
||
|
evcc configuration as a Nix attribute set.
|
||
|
|
||
|
Check for possible options in the sample [evcc.dist.yaml](https://github.com/andig/evcc/blob/${package.version}/evcc.dist.yaml].
|
||
|
'';
|
||
|
};
|
||
|
};
|
||
|
|
||
|
config = mkIf cfg.enable {
|
||
|
systemd.services.evcc = {
|
||
|
after = [
|
||
|
"network-online.target"
|
||
|
"mosquitto.target"
|
||
|
];
|
||
|
wantedBy = [
|
||
|
"multi-user.target"
|
||
|
];
|
||
|
|
||
|
serviceConfig = {
|
||
|
ExecStart = "${package}/bin/evcc --config ${configFile} ${escapeShellArgs cfg.extraArgs}";
|
||
|
CapabilityBoundingSet = [ "" ];
|
||
|
DeviceAllow = [
|
||
|
"char-ttyUSB"
|
||
|
];
|
||
|
DevicePolicy = "closed";
|
||
|
DynamicUser = true;
|
||
|
LockPersonality = true;
|
||
|
MemoryDenyWriteExecute = true;
|
||
|
RestrictAddressFamilies = [
|
||
|
"AF_INET"
|
||
|
"AF_INET6"
|
||
|
"AF_UNIX"
|
||
|
];
|
||
|
RestrictNamespaces = true;
|
||
|
RestrictRealtime = true;
|
||
|
PrivateTmp = true;
|
||
|
PrivateUsers = true;
|
||
|
ProcSubset = "pid";
|
||
|
ProtectClock = true;
|
||
|
ProtectControlGroups= true;
|
||
|
ProtectHome = true;
|
||
|
ProtectHostname = true;
|
||
|
ProtectKernelLogs = true;
|
||
|
ProtectKernelModules = true;
|
||
|
ProtectKernelTunables = true;
|
||
|
ProtectProc = "invisible";
|
||
|
SystemCallArchitectures = "native";
|
||
|
SystemCallFilter = [
|
||
|
"@system-service"
|
||
|
"~@privileged"
|
||
|
];
|
||
|
UMask = "0077";
|
||
|
User = "evcc";
|
||
|
};
|
||
|
};
|
||
|
};
|
||
|
|
||
|
meta.buildDocsInSandbox = false;
|
||
|
}
|