depot/third_party/nixpkgs/nixos/modules/services/desktops/seatd.nix
Default email 587713944a Project import generated by Copybara.
GitOrigin-RevId: 6143fc5eeb9c4f00163267708e26191d1e918932
2024-04-21 17:54:59 +02:00

51 lines
1.3 KiB
Nix

{ config, lib, pkgs, ... }:
let
cfg = config.services.seatd;
inherit (lib) mkEnableOption mkOption types;
in
{
meta.maintainers = with lib.maintainers; [ sinanmohd ];
options.services.seatd = {
enable = mkEnableOption "seatd";
user = mkOption {
type = types.str;
default = "root";
description = "User to own the seatd socket";
};
group = mkOption {
type = types.str;
default = "seat";
description = "Group to own the seatd socket";
};
logLevel = mkOption {
type = types.enum [ "debug" "info" "error" "silent" ];
default = "info";
description = "Logging verbosity";
};
};
config = lib.mkIf cfg.enable {
environment.systemPackages = with pkgs; [ seatd sdnotify-wrapper ];
users.groups.seat = lib.mkIf (cfg.group == "seat") {};
systemd.services.seatd = {
description = "Seat management daemon";
documentation = [ "man:seatd(1)" ];
wantedBy = [ "multi-user.target" ];
restartIfChanged = false;
serviceConfig = {
Type = "notify";
NotifyAccess = "all";
SyslogIdentifier = "seatd";
ExecStart = "${pkgs.sdnotify-wrapper}/bin/sdnotify-wrapper ${pkgs.seatd.bin}/bin/seatd -n 1 -u ${cfg.user} -g ${cfg.group} -l ${cfg.logLevel}";
RestartSec = 1;
Restart = "always";
};
};
};
}