home-manager/modules/services/flameshot.nix

78 lines
1.9 KiB
Nix
Raw Normal View History

2018-05-03 12:29:03 +00:00
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.flameshot;
2021-10-11 19:41:49 +00:00
2018-05-03 12:29:03 +00:00
package = pkgs.flameshot;
2021-10-11 19:41:49 +00:00
iniFormat = pkgs.formats.ini { };
iniFile = iniFormat.generate "flameshot.ini" cfg.settings;
2020-02-01 23:39:17 +00:00
in {
2018-05-03 12:29:03 +00:00
meta.maintainers = [ maintainers.hamhut1066 ];
2021-10-11 19:41:49 +00:00
options.services.flameshot = {
enable = mkEnableOption "Flameshot";
settings = mkOption {
type = iniFormat.type;
default = { };
example = {
General = {
disabledTrayIcon = true;
showStartupLaunchMessage = false;
};
};
description = ''
Configuration to use for Flameshot. See
<link xlink:href="https://github.com/flameshot-org/flameshot/blob/master/flameshot.example.ini"/>
for available options.
'';
};
};
2018-05-03 12:29:03 +00:00
config = mkIf cfg.enable {
assertions = [
(lib.hm.assertions.assertPlatform "services.flameshot" pkgs
lib.platforms.linux)
];
2018-05-03 12:29:03 +00:00
home.packages = [ package ];
2021-10-11 19:41:49 +00:00
xdg.configFile = mkIf (cfg.settings != { }) {
"flameshot/flameshot.ini".source = iniFile;
};
2018-05-03 12:29:03 +00:00
systemd.user.services.flameshot = {
Unit = {
2019-05-01 11:13:38 +00:00
Description = "Flameshot screenshot tool";
Requires = [ "tray.target" ];
After = [ "graphical-session-pre.target" "tray.target" ];
2018-05-03 12:29:03 +00:00
PartOf = [ "graphical-session.target" ];
2021-10-11 19:41:49 +00:00
X-Restart-Triggers = mkIf (cfg.settings != { }) [ "${iniFile}" ];
2018-05-03 12:29:03 +00:00
};
2020-02-01 23:39:17 +00:00
Install = { WantedBy = [ "graphical-session.target" ]; };
2018-05-03 12:29:03 +00:00
Service = {
2018-07-29 16:15:50 +00:00
Environment = "PATH=${config.home.profileDirectory}/bin";
2018-05-03 12:29:03 +00:00
ExecStart = "${package}/bin/flameshot";
Restart = "on-abort";
2021-08-14 13:13:31 +00:00
# Sandboxing.
LockPersonality = true;
MemoryDenyWriteExecute = true;
NoNewPrivileges = true;
PrivateUsers = true;
RestrictNamespaces = true;
SystemCallArchitectures = "native";
SystemCallFilter = "@system-service";
2018-05-03 12:29:03 +00:00
};
};
};
}