From 5339e045194c5ad482250c0271959a5fd9f97db2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Karel=20Ko=C4=8D=C3=AD?= Date: Sun, 2 Jan 2022 17:23:58 +0100 Subject: nios: Add sentinel module --- nixos/modules/sentinel.nix | 53 ++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 53 insertions(+) create mode 100644 nixos/modules/sentinel.nix (limited to 'nixos/modules/sentinel.nix') diff --git a/nixos/modules/sentinel.nix b/nixos/modules/sentinel.nix new file mode 100644 index 0000000..5362524 --- /dev/null +++ b/nixos/modules/sentinel.nix @@ -0,0 +1,53 @@ +{ config, lib, pkgs, ... }: + +with lib; + +{ + + options = { + + services.sentinel = { + + enable = mkOption { + type = types.bool; + default = false; + description = '' + Whether to enable the Turris Sentinel attact prevention system. + ''; + }; + deviceToken = mkOption { + type = types.str; + description = '' + Turris Sentinel token. You can use `sentinel-device-token -c` to get new one. + ''; + }; + + faillogs = { + enable = mkOption { + type = types.bool; + default = true; + description = '' + Whether to enable the Turris Sentinel fail logs collector. + The services.sentinel.enable has to be enabled as well. + ''; + }; + }; + }; + + }; + + + config = mkIf config.services.sentinel.enable { + environment.systemPackages = [ pkgs.sentinel-proxy ]; + #environment.etc.cups.source = "/var/lib/cups"; + + #systemd.services.sentinel-proxy = { + # description = "Turris Sentinel proxy"; + # wantedBy = [ "multi-user.target" ]; + # path = [ sentinel-proxy ]; + # serviceConfig.ExecStart = "${sentinel-proxy}/bin/sentinel-proxy -f "; + #}; + + }; + +} -- cgit v1.2.3