The opencode-serve unit ran with systemd's minimal default PATH, so shell commands invoked by the agent (git, make, nix, node, rg, etc.) were not found. Set systemd.services.opencode-serve.path on both sgx and amd to a common dev toolset.
64 lines
1.2 KiB
Nix
64 lines
1.2 KiB
Nix
{
|
|
config,
|
|
pkgs,
|
|
lib,
|
|
...
|
|
}:
|
|
|
|
let
|
|
port = 4196;
|
|
user = "harald";
|
|
homeDir = "/home/harald";
|
|
in
|
|
{
|
|
systemd.services.opencode-serve = {
|
|
description = "OpenCode Web Server";
|
|
after = [ "network.target" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
path = with pkgs; [
|
|
git
|
|
bash
|
|
coreutils
|
|
findutils
|
|
gnused
|
|
gnugrep
|
|
gawk
|
|
gnumake
|
|
nix
|
|
nodejs
|
|
ripgrep
|
|
fd
|
|
curl
|
|
which
|
|
];
|
|
|
|
environment = {
|
|
HOME = homeDir;
|
|
};
|
|
|
|
serviceConfig = {
|
|
Type = "simple";
|
|
User = user;
|
|
Group = "users";
|
|
WorkingDirectory = homeDir;
|
|
ExecStart = "${pkgs.opencode}/bin/opencode serve --hostname 127.0.0.1 --port ${toString port}";
|
|
Restart = "always";
|
|
RestartSec = 5;
|
|
EnvironmentFile = config.sops.secrets.opencode-web-password.path;
|
|
|
|
# Security hardening
|
|
PrivateTmp = true;
|
|
ProtectSystem = "strict";
|
|
ProtectHome = false;
|
|
NoNewPrivileges = true;
|
|
ReadWritePaths = [ homeDir ];
|
|
};
|
|
};
|
|
|
|
sops.secrets.opencode-web-password = {
|
|
sopsFile = ../../../.secrets/amd/opencode-web.yaml;
|
|
owner = user;
|
|
restartUnits = [ "opencode-serve.service" ];
|
|
};
|
|
}
|