170 lines
5.1 KiB
Nix
170 lines
5.1 KiB
Nix
{ nixpkgs
|
|
, self
|
|
,
|
|
}:
|
|
let
|
|
inherit (nixpkgs) lib;
|
|
in
|
|
{
|
|
makeSystemConfig =
|
|
{ system
|
|
, modules
|
|
, extraSpecialArgs ? { }
|
|
,
|
|
}:
|
|
let
|
|
pkgs = nixpkgs.legacyPackages.${system};
|
|
inherit (self.packages.${system}) system-manager;
|
|
|
|
nixosConfig = (lib.nixosSystem {
|
|
inherit system;
|
|
modules = [
|
|
./modules/system-manager.nix
|
|
] ++ modules;
|
|
specialArgs = extraSpecialArgs;
|
|
}).config;
|
|
|
|
returnIfNoAssertions = drv:
|
|
let
|
|
failedAssertions = map (x: x.message) (lib.filter (x: !x.assertion) nixosConfig.assertions);
|
|
in
|
|
if failedAssertions != [ ]
|
|
then throw "\nFailed assertions:\n${lib.concatStringsSep "\n" (map (x: "- ${x}") failedAssertions)}"
|
|
else lib.showWarnings nixosConfig.warnings drv;
|
|
|
|
services =
|
|
lib.listToAttrs
|
|
(map
|
|
(name:
|
|
let
|
|
serviceName = "${name}.service";
|
|
in
|
|
lib.nameValuePair serviceName {
|
|
storePath =
|
|
''${nixosConfig.systemd.units."${serviceName}".unit}/${serviceName}'';
|
|
})
|
|
nixosConfig.system-manager.services);
|
|
|
|
servicesPath = pkgs.writeTextFile {
|
|
name = "services";
|
|
destination = "/services.json";
|
|
text = lib.generators.toJSON { } services;
|
|
};
|
|
|
|
# TODO: handle globbing
|
|
etcFiles =
|
|
let
|
|
isManaged = name: lib.elem name nixosConfig.system-manager.etcFiles;
|
|
|
|
addToStore = name: file: pkgs.runCommandLocal "${name}-etc-link" { } ''
|
|
mkdir -p "$out/$(dirname "${file.target}")"
|
|
ln -s "${file.source}" "$out/${file.target}"
|
|
|
|
if [ "${file.mode}" != symlink ]; then
|
|
echo "${file.mode}" > "$out/${file.target}.mode"
|
|
echo "${file.user}" > "$out/${file.target}.uid"
|
|
echo "${file.group}" > "$out/${file.target}.gid"
|
|
fi
|
|
'';
|
|
|
|
filteredEntries = lib.filterAttrs
|
|
(name: etcFile: etcFile.enable && isManaged name)
|
|
nixosConfig.environment.etc;
|
|
|
|
srcDrvs = lib.mapAttrs addToStore filteredEntries;
|
|
|
|
entries = lib.mapAttrs
|
|
(name: file: file // { source = "${srcDrvs.${name}}"; })
|
|
filteredEntries;
|
|
|
|
staticEnv = pkgs.buildEnv {
|
|
name = "etc-static-env";
|
|
paths = lib.attrValues srcDrvs;
|
|
};
|
|
in
|
|
{ inherit entries staticEnv; };
|
|
|
|
etcPath = pkgs.writeTextFile {
|
|
name = "etcFiles";
|
|
destination = "/etcFiles.json";
|
|
text = lib.generators.toJSON { } etcFiles;
|
|
};
|
|
|
|
registerProfileScript = pkgs.writeShellScript "register-profile" ''
|
|
${system-manager}/bin/system-manager generate \
|
|
--store-path "$(dirname $(realpath $(dirname ''${0})))" \
|
|
"$@"
|
|
'';
|
|
|
|
activationScript = pkgs.writeShellScript "activate" ''
|
|
${system-manager}/bin/system-manager activate \
|
|
--store-path "$(dirname $(realpath $(dirname ''${0})))" \
|
|
"$@"
|
|
'';
|
|
|
|
deactivationScript = pkgs.writeShellScript "deactivate" ''
|
|
${system-manager}/bin/system-manager deactivate "$@"
|
|
'';
|
|
|
|
preActivationAssertionScript =
|
|
let
|
|
mkAssertion = { name, script, ... }: ''
|
|
# ${name}
|
|
|
|
echo -e "Evaluating pre-activation assertion ${name}...\n"
|
|
(
|
|
set +e
|
|
${script}
|
|
)
|
|
assertion_result=$?
|
|
|
|
if [ $assertion_result -ne 0 ]; then
|
|
failed_assertions+=${name}
|
|
fi
|
|
'';
|
|
|
|
mkAssertions = assertions:
|
|
lib.concatStringsSep "\n" (
|
|
lib.mapAttrsToList (name: mkAssertion) (
|
|
lib.filterAttrs (name: cfg: cfg.enable)
|
|
assertions
|
|
)
|
|
);
|
|
in
|
|
pkgs.writeShellScript "preActivationAssertions" ''
|
|
set -ou pipefail
|
|
|
|
declare -a failed_assertions=()
|
|
|
|
${mkAssertions nixosConfig.system-manager.preActivationAssertions}
|
|
|
|
if [ ''${#failed_assertions[@]} -ne 0 ]; then
|
|
for failed_assertion in ''${failed_assertions[@]}; do
|
|
echo "Pre-activation assertion $failed_assertion failed."
|
|
done
|
|
echo "See the output above for more details."
|
|
exit 1
|
|
else
|
|
echo "All pre-activation assertions succeeded."
|
|
exit 0
|
|
fi
|
|
'';
|
|
|
|
linkFarmNestedEntryFromDrv = dirs: drv: {
|
|
name = lib.concatStringsSep "/" (dirs ++ [ "${drv.name}" ]);
|
|
path = drv;
|
|
};
|
|
linkFarmEntryFromDrv = linkFarmNestedEntryFromDrv [ ];
|
|
linkFarmBinEntryFromDrv = linkFarmNestedEntryFromDrv [ "bin" ];
|
|
in
|
|
returnIfNoAssertions (
|
|
pkgs.linkFarm "system-manager" [
|
|
(linkFarmEntryFromDrv servicesPath)
|
|
(linkFarmEntryFromDrv etcPath)
|
|
(linkFarmBinEntryFromDrv activationScript)
|
|
(linkFarmBinEntryFromDrv deactivationScript)
|
|
(linkFarmBinEntryFromDrv registerProfileScript)
|
|
(linkFarmBinEntryFromDrv preActivationAssertionScript)
|
|
]
|
|
);
|
|
}
|