84ad0b0a93
Derived from lass/3modules/ensure-permissions.nix
75 lines
1.9 KiB
Nix
75 lines
1.9 KiB
Nix
with import <stockholm/lib>;
|
|
{ config, pkgs, ... }: {
|
|
|
|
options.krebs.permown = mkOption {
|
|
default = [];
|
|
type = types.listOf (types.submodule {
|
|
options = {
|
|
directory-mode = mkOption {
|
|
default = "=rwx";
|
|
type = types.str; # TODO
|
|
};
|
|
file-mode = mkOption {
|
|
default = "=rw";
|
|
type = types.str; # TODO
|
|
};
|
|
group = mkOption {
|
|
apply = x: if x == null then "" else x;
|
|
default = null;
|
|
type = types.nullOr types.groupname;
|
|
};
|
|
owner = mkOption {
|
|
type = types.username;
|
|
};
|
|
path = mkOption {
|
|
type = types.absolute-pathname;
|
|
};
|
|
umask = mkOption {
|
|
default = "0027";
|
|
type = types.file-mode;
|
|
};
|
|
};
|
|
});
|
|
};
|
|
|
|
config.systemd.services = genAttrs' config.krebs.permown (plan: {
|
|
name = "permown.${replaceStrings ["/"] ["_"] plan.path}";
|
|
value = {
|
|
environment = {
|
|
DIR_MODE = plan.directory-mode;
|
|
FILE_MODE = plan.file-mode;
|
|
OWNER_GROUP = "${plan.owner}:${plan.group}";
|
|
ROOT_PATH = plan.path;
|
|
};
|
|
path = [
|
|
pkgs.coreutils
|
|
pkgs.findutils
|
|
pkgs.inotifyTools
|
|
];
|
|
serviceConfig = {
|
|
ExecStart = pkgs.writeDash "permown" ''
|
|
set -efu
|
|
|
|
find "$ROOT_PATH" -exec chown "$OWNER_GROUP" {} +
|
|
find "$ROOT_PATH" -type d -exec chmod "$DIR_MODE" {} +
|
|
find "$ROOT_PATH" -type f -exec chmod "$FILE_MODE" {} +
|
|
|
|
inotifywait -mrq -e CREATE --format %w%f "$ROOT_PATH" |
|
|
while read -r path; do
|
|
if test -d "$path"; then
|
|
exec "$0" "$@"
|
|
fi
|
|
chown "$OWNER_GROUP" "$path"
|
|
chmod "$FILE_MODE" "$path"
|
|
done
|
|
'';
|
|
Restart = "always";
|
|
RestartSec = 10;
|
|
UMask = plan.umask;
|
|
};
|
|
wantedBy = [ "multi-user.target" ];
|
|
};
|
|
});
|
|
|
|
}
|