255 lines
8.2 KiB
Nix
255 lines
8.2 KiB
Nix
# borrows from:
|
|
# https://xeiaso.net/blog/paranoid-nixos-2021-07-18
|
|
# https://elis.nu/blog/2020/05/nixos-tmpfs-as-root/
|
|
# https://github.com/nix-community/impermanence
|
|
{ config, lib, pkgs, utils, sane-lib, ... }:
|
|
|
|
with lib;
|
|
let
|
|
path = sane-lib.path;
|
|
sane-types = sane-lib.types;
|
|
cfg = config.sane.persist;
|
|
|
|
storeType = types.submodule {
|
|
options = {
|
|
storeDescription = mkOption {
|
|
type = types.nullOr types.str;
|
|
default = null;
|
|
description = ''
|
|
an optional description of the store, which is rendered like
|
|
{store.name}: {store.storeDescription}
|
|
for example, a store named "private" could have description "ecnrypted to the user's password and decrypted on login".
|
|
'';
|
|
};
|
|
origin = mkOption {
|
|
type = types.str;
|
|
};
|
|
prefix = mkOption {
|
|
type = types.str;
|
|
default = "/";
|
|
description = ''
|
|
optional prefix to strip from children when stored here.
|
|
for example, prefix="/var/private" and mountpoint="/mnt/crypt/private"
|
|
would cause /var/private/www/root to be stored at /mnt/crypt/private/www/root instead of
|
|
/mnt/crypt/private/var/private/www/root.
|
|
'';
|
|
};
|
|
defaultMethod = mkOption {
|
|
type = types.enum [ "bind" "symlink" ];
|
|
default = "bind";
|
|
description = ''
|
|
preferred way to link items from the store into the fs
|
|
'';
|
|
};
|
|
defaultOrdering.wantedBeforeBy = mkOption {
|
|
type = types.listOf types.str;
|
|
default = [ "local-fs.target" ];
|
|
description = ''
|
|
list of units or targets which would prefer that everything in this store
|
|
be initialized before they run, but failing to do so should not error the items in this list.
|
|
'';
|
|
};
|
|
defaultOrdering.wantedBy = mkOption {
|
|
type = types.listOf types.str;
|
|
default = [ ];
|
|
description = ''
|
|
list of units or targets which, upon activation, should activate all units in this store.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
# allows a user to specify the store either by name or as an attrset
|
|
coercedToStore = types.coercedTo types.str (s: cfg.stores."${s}") storeType;
|
|
|
|
# options common to all entries, whether they're keyed by path or store
|
|
entryOpts = {
|
|
options = {
|
|
acl = mkOption {
|
|
type = sane-types.aclOverride;
|
|
default = {};
|
|
};
|
|
method = mkOption {
|
|
type = types.nullOr (types.enum [ "bind" "symlink" ]);
|
|
default = null;
|
|
description = ''
|
|
how to link the store entry into the fs
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
# options for a single mountpoint / persistence where the store is specified externally
|
|
entryInStore = types.submodule [
|
|
entryOpts
|
|
{
|
|
options = {
|
|
directory = mkOption {
|
|
type = types.str;
|
|
};
|
|
};
|
|
}
|
|
];
|
|
# allow "bar/baz" as shorthand for { directory = "bar/baz"; }
|
|
entryInStoreOrShorthand = types.coercedTo
|
|
types.str
|
|
(d: { directory = d; })
|
|
entryInStore;
|
|
|
|
# allow the user to provide the `acl` field inline: we pop acl sub-attributes placed at the
|
|
# toplevel and move them into an `acl` attribute.
|
|
convertInlineAcl = to: types.coercedTo
|
|
types.attrs
|
|
(orig: lib.recursiveUpdate
|
|
(builtins.removeAttrs orig ["user" "group" "mode" ])
|
|
{
|
|
acl = sane-lib.filterByName ["user" "group" "mode"] orig;
|
|
}
|
|
)
|
|
to;
|
|
|
|
# entry where the path is specified externally
|
|
entryAtPath = types.submodule [
|
|
entryOpts
|
|
{
|
|
options = {
|
|
store = mkOption {
|
|
type = coercedToStore;
|
|
};
|
|
};
|
|
}
|
|
];
|
|
|
|
# this submodule creates one attr per store, so that the user can specify something like:
|
|
# <option>.private.".cache/vim" = { mode = "0700"; };
|
|
# to place ".cache/vim" into the private store and create with the appropriate mode
|
|
dirsSubModule = types.submodule ({ config, ... }: {
|
|
options = lib.attrsets.unionOfDisjoint
|
|
(mapAttrs (store: store-cfg: mkOption {
|
|
default = [];
|
|
type = types.listOf (convertInlineAcl entryInStoreOrShorthand);
|
|
description = let
|
|
suffix = if store-cfg.storeDescription != null then
|
|
": ${store-cfg.storeDescription}"
|
|
else "";
|
|
in "directories to persist in ${store}${suffix}";
|
|
}) cfg.stores)
|
|
{
|
|
byPath = mkOption {
|
|
type = types.attrsOf (convertInlineAcl entryAtPath);
|
|
default = {};
|
|
description = ''
|
|
map of <path> => <path config> for all paths to be persisted.
|
|
this is computed from the other options, but users can also set it explicitly (useful for overriding)
|
|
'';
|
|
};
|
|
};
|
|
config = let
|
|
# set the `store` attribute on one dir attrset
|
|
annotateWithStore = store: dir: {
|
|
"${dir.directory}".store = store;
|
|
};
|
|
# convert an `entryInStore` to an `entryAtPath` (less the `store` item)
|
|
dirToAttrs = dir: {
|
|
"${dir.directory}" = builtins.removeAttrs dir ["directory"];
|
|
};
|
|
store-names = attrNames cfg.stores;
|
|
# :: (store -> entry -> AttrSet) -> [AttrSet]
|
|
applyToAllStores = f: lib.concatMap
|
|
(store: map (f store) config."${store}")
|
|
store-names;
|
|
in {
|
|
byPath = lib.mkMerge (concatLists [
|
|
(applyToAllStores (store: dirToAttrs))
|
|
(applyToAllStores annotateWithStore)
|
|
]);
|
|
};
|
|
});
|
|
in
|
|
{
|
|
options = {
|
|
sane.persist.enable = mkOption {
|
|
default = false;
|
|
type = types.bool;
|
|
};
|
|
sane.persist.root-on-tmpfs = mkOption {
|
|
default = false;
|
|
type = types.bool;
|
|
description = "define / fs root to be a tmpfs. make sure to mount some other device to /nix";
|
|
};
|
|
sane.persist.home = mkOption {
|
|
description = "directories to persist to disk, relative to a user's home ~";
|
|
default = {};
|
|
type = dirsSubModule;
|
|
};
|
|
sane.persist.sys = mkOption {
|
|
description = "directories to persist to disk, relative to the fs root /";
|
|
default = {};
|
|
type = dirsSubModule;
|
|
};
|
|
sane.persist.byPath = mkOption {
|
|
type = types.attrsOf (convertInlineAcl entryAtPath);
|
|
description = ''
|
|
map of <path> => <path config> for all paths to be persisted.
|
|
this is computed from the other options, but users can also set it explicitly (useful for overriding)
|
|
'';
|
|
};
|
|
sane.persist.stores = mkOption {
|
|
type = types.attrsOf storeType;
|
|
default = {};
|
|
description = ''
|
|
map from human-friendly name to a fs sub-tree from which files are linked into the logical fs.
|
|
'';
|
|
};
|
|
};
|
|
|
|
imports = [
|
|
./computed.nix
|
|
./root-on-tmpfs.nix
|
|
./stores
|
|
];
|
|
|
|
config = let
|
|
cfgFor = fspath: opt:
|
|
let
|
|
store = opt.store;
|
|
method = (sane-lib.withDefault store.defaultMethod) opt.method;
|
|
fsPathToStoreRelPath = fspath: path.from store.prefix fspath;
|
|
fsPathToBackingPath = fspath: path.concat [ store.origin (fsPathToStoreRelPath fspath) ];
|
|
in lib.mkMerge [
|
|
{
|
|
# create destination dir, with correct perms
|
|
sane.fs."${fspath}" = {
|
|
inherit (store.defaultOrdering) wantedBy wantedBeforeBy;
|
|
} // (lib.optionalAttrs (method == "bind") {
|
|
# inherit perms & make sure we don't mount until after the mount point is setup correctly.
|
|
dir.acl = opt.acl;
|
|
mount.bind = fsPathToBackingPath fspath;
|
|
}) // (lib.optionalAttrs (method == "symlink") {
|
|
symlink.acl = opt.acl;
|
|
symlink.target = fsPathToBackingPath fspath;
|
|
});
|
|
|
|
# create the backing path as a dir
|
|
sane.fs."${fsPathToBackingPath fspath}".dir = {};
|
|
}
|
|
{
|
|
# default each item along the backing path to have the same acl as the location it would be mounted.
|
|
sane.fs = lib.mkMerge (builtins.map
|
|
(fsSubpath: {
|
|
"${fsPathToBackingPath fsSubpath}" = {
|
|
generated.acl = config.sane.fs."${fsSubpath}".generated.acl;
|
|
};
|
|
})
|
|
(path.walk store.prefix fspath)
|
|
);
|
|
}
|
|
];
|
|
configs = lib.mapAttrsToList cfgFor cfg.byPath;
|
|
take = f: { sane.fs = f.sane.fs; };
|
|
in mkIf cfg.enable (
|
|
take (sane-lib.mkTypedMerge take configs)
|
|
);
|
|
}
|
|
|