119 lines
3.2 KiB
Nix
119 lines
3.2 KiB
Nix
{ config, pkgs, lib, ... }: let
|
|
slib = import ../../lib/pure.nix { inherit lib; };
|
|
in
|
|
with lib; {
|
|
|
|
options.krebs.permown = mkOption {
|
|
default = {};
|
|
type = types.attrsOf (types.submodule ({ config, ... }: {
|
|
options = {
|
|
directory-mode = mkOption {
|
|
default = "=rwx";
|
|
type = types.str; # TODO
|
|
};
|
|
file-mode = mkOption {
|
|
default = "=rw";
|
|
type = types.str; # TODO
|
|
};
|
|
group = mkOption {
|
|
apply = x: if x == null then "" else x;
|
|
default = null;
|
|
type = types.nullOr slib.types.groupname;
|
|
};
|
|
keepGoing = mkOption {
|
|
default = false;
|
|
type = types.bool;
|
|
description = ''
|
|
Whether to keep going when chowning or chmodding fails.
|
|
If set to false, then errors will cause the service to restart
|
|
instead.
|
|
'';
|
|
};
|
|
owner = mkOption {
|
|
type = slib.types.username;
|
|
};
|
|
path = mkOption {
|
|
default = config._module.args.name;
|
|
type = slib.types.absolute-pathname;
|
|
};
|
|
umask = mkOption {
|
|
default = "0027";
|
|
type = slib.types.file-mode;
|
|
};
|
|
};
|
|
}));
|
|
};
|
|
|
|
config = let
|
|
plans = attrValues config.krebs.permown;
|
|
in mkIf (plans != []) {
|
|
|
|
system.activationScripts.permown = let
|
|
mkdir = plan: /* sh */ ''
|
|
${pkgs.coreutils}/bin/mkdir -p ${slib.shell.escape plan.path}
|
|
'';
|
|
in concatMapStrings mkdir plans;
|
|
|
|
systemd.services = slib.genAttrs' plans (plan: let
|
|
continuable = command:
|
|
if plan.keepGoing
|
|
then /* sh */ "{ ${command}; } || :"
|
|
else command;
|
|
in {
|
|
name = "permown.${replaceStrings ["/"] ["_"] plan.path}";
|
|
value = {
|
|
environment = {
|
|
DIR_MODE = plan.directory-mode;
|
|
FILE_MODE = plan.file-mode;
|
|
OWNER_GROUP = "${plan.owner}:${plan.group}";
|
|
ROOT_PATH = plan.path;
|
|
};
|
|
path = [
|
|
pkgs.coreutils
|
|
pkgs.findutils
|
|
pkgs.inotify-tools
|
|
];
|
|
serviceConfig = {
|
|
ExecStart = pkgs.writeDash "permown" ''
|
|
set -efu
|
|
|
|
find "$ROOT_PATH" -exec chown -h "$OWNER_GROUP" {} +
|
|
find "$ROOT_PATH" -type d -exec chmod "$DIR_MODE" {} +
|
|
find "$ROOT_PATH" -type f -exec chmod "$FILE_MODE" {} +
|
|
|
|
paths=/tmp/paths
|
|
rm -f "$paths"
|
|
mkfifo "$paths"
|
|
|
|
inotifywait -mrq -e CREATE --format %w%f "$ROOT_PATH" > "$paths" &
|
|
inotifywaitpid=$!
|
|
|
|
trap cleanup EXIT
|
|
cleanup() {
|
|
kill "$inotifywaitpid"
|
|
}
|
|
|
|
while read -r path; do
|
|
if test -d "$path"; then
|
|
cleanup
|
|
exec "$0" "$@"
|
|
fi
|
|
${continuable /* sh */ ''chown -h "$OWNER_GROUP" "$path"''}
|
|
if test -f "$path"; then
|
|
${continuable /* sh */ ''chmod "$FILE_MODE" "$path"''}
|
|
fi
|
|
done < "$paths"
|
|
'';
|
|
PrivateTmp = true;
|
|
Restart = "always";
|
|
RestartSec = 10;
|
|
UMask = plan.umask;
|
|
};
|
|
wantedBy = [ "multi-user.target" ];
|
|
};
|
|
});
|
|
|
|
};
|
|
|
|
}
|