2023-05-11 05:33:08 +07:00
|
|
|
{ config, lib, ... }:
|
2023-04-16 23:59:24 +07:00
|
|
|
|
2023-06-24 07:12:11 +07:00
|
|
|
# common impermanence config for all of my hosts
|
|
|
|
|
2023-04-16 23:59:24 +07:00
|
|
|
let
|
|
|
|
cfg = config.impermanence;
|
|
|
|
in {
|
|
|
|
options.impermanence = with lib; mkOption {
|
|
|
|
type = types.submodule {
|
|
|
|
options = {
|
|
|
|
enable = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description = "Enable impermanence";
|
|
|
|
};
|
|
|
|
path = mkOption {
|
|
|
|
type = types.path;
|
2023-07-12 20:01:14 +07:00
|
|
|
default = throw "You must set path to persistent storage";
|
2023-04-16 23:59:24 +07:00
|
|
|
description = "Default path for persistence";
|
|
|
|
};
|
|
|
|
directories = mkOption {
|
2023-05-11 05:33:08 +07:00
|
|
|
type = with types; listOf (either path attrs);
|
2023-04-16 23:59:24 +07:00
|
|
|
default = [ ];
|
|
|
|
description = "Extra directories to persist";
|
|
|
|
};
|
|
|
|
files = mkOption {
|
2023-06-24 07:12:11 +07:00
|
|
|
type = with types; listOf (either path attrs);
|
2023-04-16 23:59:24 +07:00
|
|
|
default = [ ];
|
|
|
|
description = "Extra files to persist";
|
|
|
|
};
|
|
|
|
persistTmp = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = true;
|
|
|
|
description = "Persist /tmp (and clean on boot)";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
description = "Impermanence settings";
|
|
|
|
default = { };
|
|
|
|
};
|
|
|
|
config = lib.mkIf cfg.enable {
|
2023-05-13 20:32:35 +07:00
|
|
|
users.mutableUsers = false;
|
2023-05-11 05:33:08 +07:00
|
|
|
# why is this not part of base NixOS?
|
|
|
|
systemd.tmpfiles.rules = [ "d /var/lib/systemd/pstore 0755 root root 14d" ];
|
2023-04-16 23:59:24 +07:00
|
|
|
# as weird as it sounds, I won't use tmpfs for /tmp in case I'll have to put files over 2GB there
|
2023-05-10 16:42:56 +07:00
|
|
|
boot.tmp.cleanOnBoot = lib.mkIf cfg.persistTmp true;
|
2023-04-16 23:59:24 +07:00
|
|
|
environment.persistence.${toString cfg.path} = {
|
|
|
|
hideMounts = true;
|
2023-05-11 05:33:08 +07:00
|
|
|
directories = map (x:
|
|
|
|
if builtins.isPath x then toString x
|
2023-07-12 20:01:14 +07:00
|
|
|
else if builtins.isPath (x.directory or null) then x // { directory = toString x.directory; }
|
|
|
|
else x
|
|
|
|
) ([
|
|
|
|
# the following two can't be created by impermanence (i.e. they have to exist on disk in stage 1)
|
2023-05-11 05:33:08 +07:00
|
|
|
{ directory = /var/lib/nixos; user = "root"; group = "root"; mode = "0755"; }
|
|
|
|
{ directory = /var/log; user = "root"; group = "root"; mode = "0755"; }
|
2023-04-16 23:59:24 +07:00
|
|
|
# persist this since everything here is cleaned up by systemd-tmpfiles over time anyway
|
|
|
|
# ...or so I'd like to believe
|
2023-05-11 05:33:08 +07:00
|
|
|
{ directory = /var/lib/systemd; user = "root"; group = "root"; mode = "0755"; }
|
|
|
|
{ directory = /var/tmp; user = "root"; group = "root"; mode = "1777"; }
|
|
|
|
{ directory = /var/spool; user = "root"; group = "root"; mode = "0777"; }
|
2023-06-24 07:12:11 +07:00
|
|
|
] ++ lib.optionals cfg.persistTmp [
|
2023-05-11 05:33:08 +07:00
|
|
|
{ directory = /tmp; user = "root"; group = "root"; mode = "1777"; }
|
2023-11-29 01:50:24 +07:00
|
|
|
] ++ lib.optionals config.networking.wireless.iwd.enable [
|
2023-05-11 05:33:08 +07:00
|
|
|
{ directory = /var/lib/iwd; user = "root"; group = "root"; mode = "0700"; }
|
2023-07-12 20:01:14 +07:00
|
|
|
] ++ lib.optionals (builtins.any (x: x.useDHCP != false) (builtins.attrValues config.networking.interfaces) || config.networking.useDHCP) [
|
2023-05-11 05:33:08 +07:00
|
|
|
{ directory = /var/db/dhcpcd; user = "root"; group = "root"; mode = "0755"; }
|
2023-11-29 01:50:24 +07:00
|
|
|
] ++ lib.optionals config.security.acme.acceptTerms [
|
|
|
|
{ directory = /var/lib/acme; user = "acme"; group = "acme"; mode = "0755"; }
|
|
|
|
] ++ lib.optionals config.services.akkoma.enable [
|
|
|
|
{ directory = /var/lib/akkoma; user = "akkoma"; group = "akkoma"; mode = "0700"; }
|
|
|
|
] ++ lib.optionals config.services.botamusique.enable [
|
2024-03-19 15:30:38 +07:00
|
|
|
{ directory = /var/lib/private/botamusique; user = "root"; group = "root"; mode = "0750"; defaultPerms.mode = "0700"; }
|
2023-11-29 01:50:24 +07:00
|
|
|
] ++ lib.optionals config.programs.ccache.enable [
|
|
|
|
{ directory = config.programs.ccache.cacheDir; user = "root"; group = "nixbld"; mode = "0770"; }
|
|
|
|
{ directory = /var/cache/sccache; user = "root"; group = "nixbld"; mode = "0770"; }
|
2023-12-22 23:19:42 +07:00
|
|
|
] ++ lib.optionals config.services.certspotter.enable [
|
|
|
|
{ directory = /var/lib/certspotter; user = "certspotter"; group = "certspotter"; mode = "0755"; }
|
2023-12-09 00:38:25 +07:00
|
|
|
] ++ lib.optionals (config.services.coop-ofd.enable or false) [
|
2024-03-19 15:30:38 +07:00
|
|
|
{ directory = /var/lib/private/coop-ofd; mode = "0750"; defaultPerms.mode = "0700"; }
|
2023-11-29 01:50:24 +07:00
|
|
|
] ++ lib.optionals config.services.dovecot2.enable [
|
|
|
|
{ directory = /var/lib/dhparams; user = "root"; group = "root"; mode = "0755"; }
|
|
|
|
{ directory = /var/lib/dovecot; user = "root"; group = "root"; mode = "0755"; }
|
|
|
|
] ++ lib.optionals config.services.fail2ban.enable [
|
|
|
|
{ directory = /var/lib/fail2ban; user = "root"; group = "root"; mode = "0700"; }
|
2023-10-26 06:49:55 +07:00
|
|
|
] ++ lib.optionals config.services.forgejo.enable [
|
|
|
|
{ directory = /var/lib/forgejo; user = "forgejo"; group = "forgejo"; mode = "0755"; }
|
2023-11-29 01:50:24 +07:00
|
|
|
] ++ lib.optionals config.services.gitea.enable [
|
|
|
|
{ directory = /var/lib/gitea; user = "gitea"; group = "gitea"; mode = "0755"; }
|
|
|
|
] ++ lib.optionals config.services.grafana.enable [
|
|
|
|
{ directory = /var/lib/grafana; user = "grafana"; group = "grafana"; mode = "0755"; }
|
2023-06-24 07:12:11 +07:00
|
|
|
] ++ lib.optionals config.services.heisenbridge.enable [
|
2023-05-11 05:33:08 +07:00
|
|
|
{ directory = /var/lib/heisenbridge; user = "heisenbridge"; group = "heisenbridge"; mode = "0755"; }
|
2023-11-29 01:50:24 +07:00
|
|
|
] ++ lib.optionals config.services.hydra.enable [
|
|
|
|
{ directory = /var/lib/hydra; user = "hydra"; group = "hydra"; mode = "0755"; }
|
2023-12-01 23:45:17 +07:00
|
|
|
] ++ lib.optionals config.services.jellyfin.enable [
|
|
|
|
{ directory = /var/lib/jellyfin; user = "jellyfin"; group = "jellyfin"; mode = "0750"; }
|
2023-11-29 01:50:24 +07:00
|
|
|
] ++ lib.optionals config.services.matrix-synapse.enable [
|
|
|
|
{ directory = /var/lib/matrix-synapse; user = "matrix-synapse"; group = "matrix-synapse"; mode = "0700"; }
|
2023-12-09 00:38:25 +07:00
|
|
|
] ++ lib.optionals (config.services.maubot.enable or false) [
|
2023-11-29 01:56:51 +07:00
|
|
|
{ directory = /var/lib/maubot; user = "maubot"; group = "maubot"; mode = "0750"; }
|
2023-11-29 01:50:24 +07:00
|
|
|
] ++ lib.optionals config.services.monero.enable [
|
|
|
|
{ directory = config.services.monero.dataDir; user = "monero"; group = "monero"; mode = "0750"; }
|
|
|
|
] ++ lib.optionals config.services.mullvad-vpn.enable [
|
|
|
|
{ directory = /etc/mullvad-vpn; user = "root"; group = "root"; mode = "0700"; }
|
|
|
|
{ directory = /var/cache/mullvad-vpn; user = "root"; group = "root"; mode = "0755"; }
|
2023-06-24 07:12:11 +07:00
|
|
|
] ++ lib.optionals config.services.murmur.enable [
|
2023-05-11 05:33:08 +07:00
|
|
|
{ directory = /var/lib/murmur; user = "murmur"; group = "murmur"; mode = "0700"; }
|
2023-06-24 07:12:11 +07:00
|
|
|
] ++ lib.optionals config.services.nextcloud.enable [
|
2023-05-11 05:33:08 +07:00
|
|
|
{ directory = /var/lib/nextcloud; user = "nextcloud"; group = "nextcloud"; mode = "0750"; }
|
2023-12-19 11:12:34 +07:00
|
|
|
] ++ lib.optionals config.networking.networkmanager.enable [
|
|
|
|
{ directory = /etc/NetworkManager/system-connections; mode = "0700"; }
|
|
|
|
{ directory = /var/lib/NetworkManager; mode = "0755"; }
|
|
|
|
{ directory = /var/lib/NetworkManager-fortisslvpn; mode = "0700"; }
|
2023-06-24 07:12:11 +07:00
|
|
|
] ++ lib.optionals config.services.opendkim.enable [
|
2023-05-11 05:33:08 +07:00
|
|
|
{ directory = /var/lib/opendkim; user = "opendkim"; group = "opendkim"; mode = "0700"; }
|
2023-11-29 01:50:24 +07:00
|
|
|
] ++ lib.optionals config.services.openldap.enable [
|
|
|
|
{ directory = /var/lib/openldap; inherit (config.services.openldap) user group; mode = "0755"; }
|
2023-06-24 07:12:11 +07:00
|
|
|
] ++ lib.optionals config.services.pleroma.enable [
|
2023-05-11 05:33:08 +07:00
|
|
|
{ directory = /var/lib/pleroma; user = "pleroma"; group = "pleroma"; mode = "0700"; }
|
2023-06-24 07:12:11 +07:00
|
|
|
] ++ lib.optionals config.services.postfix.enable [
|
2023-05-11 05:33:08 +07:00
|
|
|
{ directory = /var/lib/postfix; user = "root"; group = "root"; mode = "0755"; }
|
2023-06-24 07:12:11 +07:00
|
|
|
] ++ lib.optionals config.services.postgresql.enable [
|
2023-05-11 05:33:08 +07:00
|
|
|
{ directory = /var/lib/postgresql; user = "postgres"; group = "postgres"; mode = "0755"; }
|
2023-11-29 01:50:24 +07:00
|
|
|
] ++ lib.optionals config.services.printing.enable [
|
|
|
|
{ directory = /var/lib/cups; user = "root"; group = "root"; mode = "0755"; }
|
|
|
|
{ directory = /var/cache/cups; user = "root"; group = "lp"; mode = "0770"; }
|
|
|
|
] ++ lib.optionals config.services.prometheus.enable [
|
|
|
|
{ directory = /var/lib/${config.services.prometheus.stateDir}; user = "prometheus"; group = "prometheus"; mode = "0755"; }
|
2023-12-09 00:38:25 +07:00
|
|
|
] ++ lib.optionals (config.services.qbittorrent-nox.enable or false) [
|
2023-11-29 01:50:24 +07:00
|
|
|
{ directory = /var/lib/qbittorrent-nox; mode = "0755"; }
|
|
|
|
] ++ lib.optionals (config.services.redis.servers.rspamd.enable or false) [
|
|
|
|
{ directory = /var/lib/redis-rspamd; user = "redis-rspamd"; group = "redis-rspamd"; mode = "0700"; }
|
2023-06-24 07:12:11 +07:00
|
|
|
] ++ lib.optionals config.services.roundcube.enable [
|
2023-05-11 05:33:08 +07:00
|
|
|
{ directory = /var/lib/roundcube; user = "roundcube"; group = "roundcube"; mode = "0700"; }
|
2023-06-24 07:12:11 +07:00
|
|
|
] ++ lib.optionals config.services.rspamd.enable [
|
2023-05-11 05:33:08 +07:00
|
|
|
{ directory = /var/lib/rspamd; user = "rspamd"; group = "rspamd"; mode = "0700"; }
|
2023-10-17 20:25:03 +07:00
|
|
|
] ++ lib.optionals (config.services.scanservjs.enable or false) [
|
|
|
|
{ directory = /var/lib/scanservjs; user = "scanservjs"; group = "scanservjs"; mode = "0750"; }
|
2023-11-29 01:50:24 +07:00
|
|
|
] ++ lib.optionals config.services.searx.enable [
|
|
|
|
{ directory = /var/lib/searx; user = "searx"; group = "searx"; mode = "0700"; }
|
|
|
|
] ++ lib.optionals config.security.sudo.enable [
|
|
|
|
{ directory = /var/db/sudo/lectured; user = "root"; group = "root"; mode = "0700"; }
|
|
|
|
] ++ lib.optionals config.services.unbound.enable [
|
|
|
|
{ directory = /var/lib/unbound; user = "unbound"; group = "unbound"; mode = "0755"; }
|
|
|
|
] ++ lib.optionals config.virtualisation.libvirtd.enable ([
|
|
|
|
# { directory = /var/cache/libvirt; user = "root"; group = "root"; mode = "0755"; }
|
|
|
|
{ directory = /var/lib/libvirt; user = "root"; group = "root"; mode = "0755"; }
|
|
|
|
] ++ lib.optionals config.virtualisation.libvirtd.qemu.swtpm.enable [
|
|
|
|
{ directory = /var/lib/swtpm-localca; user = "root"; group = "root"; mode = "0750"; }
|
|
|
|
]) ++ cfg.directories);
|
2023-06-24 07:12:11 +07:00
|
|
|
files = map (x:
|
|
|
|
if builtins.isPath x then toString x
|
2023-07-12 20:01:14 +07:00
|
|
|
else if builtins.isPath (x.file or null) then x // { file = toString x.file; }
|
|
|
|
else x
|
|
|
|
) ([
|
2023-04-16 23:59:24 +07:00
|
|
|
# hardware-related
|
|
|
|
/etc/adjtime
|
2023-05-11 05:33:08 +07:00
|
|
|
# needed at least for /var/log
|
2023-04-16 23:59:24 +07:00
|
|
|
/etc/machine-id
|
2023-06-24 07:12:11 +07:00
|
|
|
] ++ lib.optionals config.services.openssh.enable [
|
|
|
|
# keep ssh fingerprints stable
|
|
|
|
/etc/ssh/ssh_host_ed25519_key
|
|
|
|
/etc/ssh/ssh_host_ed25519_key.pub
|
|
|
|
/etc/ssh/ssh_host_rsa_key
|
|
|
|
/etc/ssh/ssh_host_rsa_key.pub
|
2023-04-16 23:59:24 +07:00
|
|
|
] ++ cfg.files);
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|