Modules/Impermanence: Set home ownership
This commit is contained in:
@ -23,17 +23,17 @@ in {
|
|||||||
|
|
||||||
mkDir = user: directory: mode: {
|
mkDir = user: directory: mode: {
|
||||||
inherit directory mode;
|
inherit directory mode;
|
||||||
user = config.users.users.${user}.name;
|
# user = config.users.users.${user}.name;
|
||||||
group = config.users.users.${user}.group;
|
# group = config.users.users.${user}.group;
|
||||||
};
|
};
|
||||||
|
|
||||||
mkFile = user: file: mode: {
|
mkFile = user: file: mode: {
|
||||||
inherit file;
|
inherit file;
|
||||||
parentDirectory = {
|
# parentDirectory = {
|
||||||
inherit mode;
|
# inherit mode;
|
||||||
user = config.users.users.${user}.name;
|
# user = config.users.users.${user}.name;
|
||||||
group = config.users.users.${user}.group;
|
# group = config.users.users.${user}.group;
|
||||||
};
|
# };
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
lib.mkIf impermanence.enable {
|
lib.mkIf impermanence.enable {
|
||||||
@ -55,6 +55,8 @@ in {
|
|||||||
(mkRDir "/etc/secureboot" m755)
|
(mkRDir "/etc/secureboot" m755)
|
||||||
(mkRDir "/etc/ssh" m755)
|
(mkRDir "/etc/ssh" m755)
|
||||||
|
|
||||||
|
(mkRDir "/nix/var" m755)
|
||||||
|
|
||||||
# https://github.com/nix-community/impermanence/issues/253
|
# https://github.com/nix-community/impermanence/issues/253
|
||||||
(mkRDir "/usr/systemd-placeholder" m755)
|
(mkRDir "/usr/systemd-placeholder" m755)
|
||||||
|
|
||||||
@ -63,9 +65,10 @@ in {
|
|||||||
(mkRDir "/var/lib/bluetooth" m755) # m700
|
(mkRDir "/var/lib/bluetooth" m755) # m700
|
||||||
(mkRDir "/var/lib/containers" m755)
|
(mkRDir "/var/lib/containers" m755)
|
||||||
(mkRDir "/var/lib/flatpak" m755)
|
(mkRDir "/var/lib/flatpak" m755)
|
||||||
(mkRDir "/var/lib/NetworkManager" m755)
|
|
||||||
(mkRDir "/var/lib/libvirt" m755)
|
(mkRDir "/var/lib/libvirt" m755)
|
||||||
|
(mkRDir "/var/lib/NetworkManager" m755)
|
||||||
(mkRDir "/var/lib/nixos" m755)
|
(mkRDir "/var/lib/nixos" m755)
|
||||||
|
(mkRDir "/var/lib/private/ollama" m755)
|
||||||
(mkRDir "/var/lib/systemd" m755)
|
(mkRDir "/var/lib/systemd" m755)
|
||||||
|
|
||||||
(mkRDir "/var/tmp" m777)
|
(mkRDir "/var/tmp" m777)
|
||||||
@ -126,11 +129,35 @@ in {
|
|||||||
(mkUDir ".local/share/zoxide" m755)
|
(mkUDir ".local/share/zoxide" m755)
|
||||||
|
|
||||||
(mkUDir ".local/state/astal/notifd" m755)
|
(mkUDir ".local/state/astal/notifd" m755)
|
||||||
|
(mkUDir ".local/state/nix" m755)
|
||||||
(mkUDir ".local/state/nvim" m755)
|
(mkUDir ".local/state/nvim" m755)
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# NOTE: This is REQUIRED for HM activation! Otherwise the home directory won't be writable!
|
||||||
|
systemd.services."impermanence-fix-home-ownership" = let
|
||||||
|
homeDir = "/home/${username}";
|
||||||
|
homeUser = builtins.toString config.users.users.${username}.uid;
|
||||||
|
homeGroup = builtins.toString config.users.groups.${config.users.users.${username}.group}.gid;
|
||||||
|
in {
|
||||||
|
description = "Fix impermanent home ownership";
|
||||||
|
wantedBy = ["home-manager-christoph.service"]; # Required for HM activation
|
||||||
|
before = ["home-manager-christoph.service"];
|
||||||
|
after = ["home.mount"];
|
||||||
|
partOf = ["home.mount"];
|
||||||
|
serviceConfig.Type = "oneshot";
|
||||||
|
|
||||||
|
script = ''
|
||||||
|
if [[ -d ${homeDir} ]]; then
|
||||||
|
chown -R ${homeUser}:${homeGroup} ${homeDir}
|
||||||
|
echo "Set ownership for ${homeDir} to ${homeUser}:${homeGroup}"
|
||||||
|
else
|
||||||
|
echo "ERROR: Home ${homeDir} does not exist!"
|
||||||
|
fi
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
# Because we have a LUKS encrypted drive
|
# Because we have a LUKS encrypted drive
|
||||||
# we use a systemd service to cleanup the volumes
|
# we use a systemd service to cleanup the volumes
|
||||||
boot.initrd.systemd = {
|
boot.initrd.systemd = {
|
||||||
@ -140,6 +167,9 @@ in {
|
|||||||
backupDuration = "7"; # Days
|
backupDuration = "7"; # Days
|
||||||
mountDir = "/btrfs_tmp";
|
mountDir = "/btrfs_tmp";
|
||||||
persistDir = "${mountDir}/persist";
|
persistDir = "${mountDir}/persist";
|
||||||
|
|
||||||
|
homeUser = builtins.toString config.users.users.${username}.uid;
|
||||||
|
homeGroup = builtins.toString config.users.groups.${config.users.users.${username}.group}.gid;
|
||||||
in {
|
in {
|
||||||
description = "Clean impermanent btrfs subvolumes";
|
description = "Clean impermanent btrfs subvolumes";
|
||||||
wantedBy = ["initrd.target"];
|
wantedBy = ["initrd.target"];
|
||||||
@ -205,6 +235,16 @@ in {
|
|||||||
btrfs subvolume create ${mountDir}/home
|
btrfs subvolume create ${mountDir}/home
|
||||||
echo "Created new subvolumes ${mountDir}/root and ${mountDir}/home"
|
echo "Created new subvolumes ${mountDir}/root and ${mountDir}/home"
|
||||||
|
|
||||||
|
if [[ -d ${mountDir}/home/${username} ]]; then
|
||||||
|
chown -R ${homeUser}:${homeGroup} ${mountDir}/home/${username}
|
||||||
|
echo "Set permissions for ${mountDir}/home/${username} to ${homeUser}:${homeGroup}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [[ -d ${persistDir}/home/${username} ]]; then
|
||||||
|
chown -R ${homeUser}:${homeGroup} ${persistDir}/home/${username}
|
||||||
|
echo "Set permissions for ${persistDir}/home/${username} to ${homeUser}:${homeGroup}"
|
||||||
|
fi
|
||||||
|
|
||||||
umount ${mountDir}
|
umount ${mountDir}
|
||||||
rmdir ${mountDir}
|
rmdir ${mountDir}
|
||||||
'';
|
'';
|
||||||
|
Reference in New Issue
Block a user