X-Git-Url: http://git.scottworley.com/auto-upgrade-with-pinch/blobdiff_plain/f43ffe152e4274099983533c9922a76febc035c5..9dbfef330f23b81081a08f0c2f52c31393943340:/modules/auto-upgrade.nix?ds=inline diff --git a/modules/auto-upgrade.nix b/modules/auto-upgrade.nix index 31e2b0b..d30a624 100644 --- a/modules/auto-upgrade.nix +++ b/modules/auto-upgrade.nix @@ -1,6 +1,59 @@ { config, lib, pkgs, ... }: with lib; -let cfg = config.system.autoUpgradeWithPinch; +let + cfg = config.system.autoUpgradeWithPinch; + pull-repo-snippet = '' + ( + cd /etc/nixos + ${pkgs.git}/bin/git fetch + PATH="${pkgs.keyedgit cfg.keys}/bin:$PATH" \ + ${pkgs.polite-merge}/bin/polite-merge --ff-only --verify-signatures + ) + ''; + + auto-upgrade-script = pkgs.writeShellScript "auto-upgrade" '' + ${pkgs.utillinux}/bin/flock /run/auto-upgrade-with-pinch ${ + pkgs.writeShellScript "auto-upgrade-with-lock-held" '' + set -e + + in_tmpdir() { + d=$(mktemp -d) + pushd "$d" + "$@" + popd + rm -r "$d" + } + + as_user() { + ${ + if cfg.userEnvironment.enable then '' + /run/wrappers/bin/sudo -u ${escapeShellArg cfg.userEnvironment.user} "$@" + '' else '' + : + '' + } + } + + # Pull updates + ${pull-repo-snippet} + + # Update channels + ${pkgs.pinch}/bin/pinch update /etc/nixos/channels + + # Build + in_tmpdir ${config.system.build.nixos-rebuild}/bin/nixos-rebuild build + as_user nix-build --no-out-link '' -A ${ + escapeShellArg cfg.userEnvironment.package + } + + # Install + ${config.system.build.nixos-rebuild}/bin/nixos-rebuild switch + as_user nix-env -f '' -riA ${ + escapeShellArg cfg.userEnvironment.package + } + '' + } + ''; in { options = { system.autoUpgradeWithPinch = { @@ -26,32 +79,75 @@ in { ''; }; - key = mkOption { + keys = mkOption { type = types.path; description = '' - GPG key that signs updates. Updates are only merged if the commit - at the tip of the remote branch is signed with this key. + File containing GPG keys that sign updates. Updates are only merged + if the commit at the tip of the remote branch is signed with one of + these keys. ''; }; + + userEnvironment = { + enable = mkOption { + type = types.bool; + default = false; + description = '' + Whether to update a user-environment as well. This update is done + with nix-env -riA. Note the -r! I.e., ALL OTHER PACKAGES INSTALLED + WITH nix-env WILL BE DELETED! + + This presumes that you have configured an "entire user environment" + package as shown in + https://nixos.wiki/wiki/FAQ#How_can_I_manage_software_with_nix-env_like_with_configuration.nix.3F + + To check if you're set up for this, run "nix-env --query". If it + only lists one package, you're good to go. + ''; + }; + + user = mkOption { + type = types.str; + description = '' + The username of the user whose environment should be updated. + ''; + }; + + package = mkOption { + type = types.str; + example = "nixos.userPackages"; + description = '' + The name of the single package that is the user's entire environment. + ''; + }; + + }; }; }; config = lib.mkIf cfg.enable { + + security.sudo.extraRules = lib.mkAfter [{ + groups = [ "users" ]; + commands = [{ + command = "${auto-upgrade-script}"; + options = [ "NOPASSWD" "NOSETENV" ]; + }]; + }]; + # NOSETENV above still allows through ~17 vars, including PATH. Block those + # as well: + security.sudo.extraConfig = '' + Defaults!${auto-upgrade-script} !env_check + Defaults!${auto-upgrade-script} !env_keep + ''; + nixpkgs.overlays = [ (import ../overlays/keyedgit.nix) (import ../overlays/pinch.nix) + (import ../overlays/polite-merge.nix) (self: super: { auto-upgrade = super.writeShellScriptBin "auto-upgrade" '' - flock /run/auto-upgrade-with-pinch ${super.writeShellScript "auto-upgrade-with-lock-held" '' - set -e - ( - cd /etc/nixos - ${self.keyedgit cfg.key}/bin/git pull --ff-only --verify-signatures - ${self.pinch}/bin/pinch update channels - ) - - ${config.system.build.nixos-rebuild}/bin/nixos-rebuild switch --no-build-output - ''} + /run/wrappers/bin/sudo ${auto-upgrade-script} ''; }) ]; @@ -97,10 +193,16 @@ in { sleep "$delay" fi - ${pkgs.auto-upgrade}/bin/auto-upgrade + ${auto-upgrade-script} ''; startAt = cfg.dates; }; + + assertions = [{ + assertion = cfg.userEnvironment.enable -> cfg.enable; + message = + "User environment upgrades cannot yet be enabled separately from system upgrades."; + }]; }; }