2014-04-14 15:26:48 +01:00
|
|
|
{ config, lib, pkgs, ... }:
|
2013-05-23 03:07:49 +01:00
|
|
|
|
2014-04-14 15:26:48 +01:00
|
|
|
with lib;
|
2013-05-23 03:07:49 +01:00
|
|
|
|
|
|
|
let
|
2018-09-24 06:21:52 +01:00
|
|
|
cfg = config.services.chrony;
|
2013-05-23 03:07:49 +01:00
|
|
|
|
|
|
|
stateDir = "/var/lib/chrony";
|
2018-09-24 06:21:52 +01:00
|
|
|
keyFile = "${stateDir}/chrony.keys";
|
2013-05-23 04:00:09 +01:00
|
|
|
|
2017-02-07 12:16:17 +00:00
|
|
|
configFile = pkgs.writeText "chrony.conf" ''
|
2019-02-23 07:19:06 +00:00
|
|
|
${concatMapStringsSep "\n" (server: "server " + server + " iburst") cfg.servers}
|
2017-02-07 12:16:17 +00:00
|
|
|
|
|
|
|
${optionalString
|
2018-12-01 00:46:04 +00:00
|
|
|
(cfg.initstepslew.enabled && (cfg.servers != []))
|
2019-02-23 07:21:18 +00:00
|
|
|
"initstepslew ${toString cfg.initstepslew.threshold} ${concatStringsSep " " cfg.servers}"
|
2017-02-07 12:16:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
driftfile ${stateDir}/chrony.drift
|
|
|
|
keyfile ${keyFile}
|
|
|
|
|
|
|
|
${optionalString (!config.time.hardwareClockInLocalTime) "rtconutc"}
|
|
|
|
|
|
|
|
${cfg.extraConfig}
|
|
|
|
'';
|
|
|
|
|
2019-02-23 15:04:26 +00:00
|
|
|
chronyFlags = "-n -m -u chrony -f ${configFile} ${toString cfg.extraFlags}";
|
2013-05-23 03:07:49 +01:00
|
|
|
in
|
|
|
|
{
|
|
|
|
options = {
|
|
|
|
services.chrony = {
|
|
|
|
enable = mkOption {
|
|
|
|
default = false;
|
|
|
|
description = ''
|
|
|
|
Whether to synchronise your machine's time using chrony.
|
|
|
|
Make sure you disable NTP if you enable this service.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
servers = mkOption {
|
2016-12-14 22:49:14 +00:00
|
|
|
default = config.networking.timeServers;
|
2013-05-23 03:07:49 +01:00
|
|
|
description = ''
|
|
|
|
The set of NTP servers from which to synchronise.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2013-05-23 04:00:09 +01:00
|
|
|
initstepslew = mkOption {
|
|
|
|
default = {
|
|
|
|
enabled = true;
|
|
|
|
threshold = 1000; # by default, same threshold as 'ntpd -g' (1000s)
|
|
|
|
};
|
|
|
|
description = ''
|
|
|
|
Allow chronyd to make a rapid measurement of the system clock error at
|
|
|
|
boot time, and to correct the system clock by stepping before normal
|
|
|
|
operation begins.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
extraConfig = mkOption {
|
2016-10-23 18:33:41 +01:00
|
|
|
type = types.lines;
|
2013-05-23 04:00:09 +01:00
|
|
|
default = "";
|
|
|
|
description = ''
|
|
|
|
Extra configuration directives that should be added to
|
|
|
|
<literal>chrony.conf</literal>
|
|
|
|
'';
|
|
|
|
};
|
2017-02-07 16:07:20 +00:00
|
|
|
|
|
|
|
extraFlags = mkOption {
|
|
|
|
default = [];
|
|
|
|
example = [ "-s" ];
|
|
|
|
type = types.listOf types.str;
|
|
|
|
description = "Extra flags passed to the chronyd command.";
|
|
|
|
};
|
2013-05-23 03:07:49 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2016-05-26 15:25:36 +01:00
|
|
|
config = mkIf cfg.enable {
|
2018-12-01 18:55:31 +00:00
|
|
|
meta.maintainers = with lib.maintainers; [ thoughtpolice ];
|
|
|
|
|
2013-05-23 03:07:49 +01:00
|
|
|
environment.systemPackages = [ pkgs.chrony ];
|
|
|
|
|
2018-06-30 00:58:35 +01:00
|
|
|
users.groups = singleton
|
2015-07-12 06:13:04 +01:00
|
|
|
{ name = "chrony";
|
|
|
|
gid = config.ids.gids.chrony;
|
|
|
|
};
|
2015-07-12 05:01:41 +01:00
|
|
|
|
2018-06-30 00:58:35 +01:00
|
|
|
users.users = singleton
|
2015-07-12 06:13:04 +01:00
|
|
|
{ name = "chrony";
|
2013-05-23 03:07:49 +01:00
|
|
|
uid = config.ids.uids.chrony;
|
2015-07-12 06:13:04 +01:00
|
|
|
group = "chrony";
|
2013-05-23 03:07:49 +01:00
|
|
|
description = "chrony daemon user";
|
|
|
|
home = stateDir;
|
|
|
|
};
|
|
|
|
|
2018-06-22 11:02:35 +01:00
|
|
|
services.timesyncd.enable = mkForce false;
|
2015-07-12 06:13:04 +01:00
|
|
|
|
2018-10-23 21:49:42 +01:00
|
|
|
systemd.services.systemd-timedated.environment = { SYSTEMD_TIMEDATED_NTP_SERVICES = "chronyd.service"; };
|
|
|
|
|
2015-07-12 06:13:04 +01:00
|
|
|
systemd.services.chronyd =
|
|
|
|
{ description = "chrony NTP daemon";
|
2013-05-23 03:07:49 +01:00
|
|
|
|
2014-11-26 19:19:31 +00:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
2018-09-24 06:21:52 +01:00
|
|
|
wants = [ "time-sync.target" ];
|
|
|
|
before = [ "time-sync.target" ];
|
|
|
|
after = [ "network.target" ];
|
2015-07-12 05:01:41 +01:00
|
|
|
conflicts = [ "ntpd.service" "systemd-timesyncd.service" ];
|
2013-05-23 03:07:49 +01:00
|
|
|
|
2015-07-12 06:13:04 +01:00
|
|
|
path = [ pkgs.chrony ];
|
2013-05-23 03:07:49 +01:00
|
|
|
|
2018-09-24 06:21:52 +01:00
|
|
|
preStart = ''
|
|
|
|
mkdir -m 0755 -p ${stateDir}
|
|
|
|
touch ${keyFile}
|
|
|
|
chmod 0640 ${keyFile}
|
|
|
|
chown chrony:chrony ${stateDir} ${keyFile}
|
|
|
|
'';
|
2013-05-23 03:07:49 +01:00
|
|
|
|
2018-12-03 02:14:48 +00:00
|
|
|
unitConfig.ConditionCapability = "CAP_SYS_TIME";
|
2015-07-12 06:13:04 +01:00
|
|
|
serviceConfig =
|
2019-02-23 15:04:26 +00:00
|
|
|
{ Type = "simple";
|
2018-09-24 06:21:52 +01:00
|
|
|
ExecStart = "${pkgs.chrony}/bin/chronyd ${chronyFlags}";
|
|
|
|
|
|
|
|
ProtectHome = "yes";
|
|
|
|
ProtectSystem = "full";
|
|
|
|
PrivateTmp = "yes";
|
|
|
|
|
2015-07-12 06:13:04 +01:00
|
|
|
};
|
2018-12-03 02:14:48 +00:00
|
|
|
|
2013-05-23 03:07:49 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|