nixdots/options/system/impermanence.nix

176 lines
5.4 KiB
Nix
Raw Permalink Normal View History

2024-07-26 23:07:07 +00:00
{
lib,
config,
...
}:
with lib; let
2024-04-07 22:36:02 +00:00
inherit (lib) mkEnableOption mkOption literalExpression types;
2024-04-07 16:28:15 +00:00
cfg = config.myOptions.system.impermanence;
2024-07-26 23:07:07 +00:00
in {
2024-04-07 16:28:15 +00:00
options.myOptions.system.impermanence = {
root = {
enable = mkEnableOption ''
the Impermanence module for persisting important state directories.
'';
extraFiles = mkOption {
default = [];
2024-04-07 22:36:02 +00:00
type = types.listOf types.path;
2024-04-07 16:28:15 +00:00
example = literalExpression ''["/etc/nix/id_rsa"]'';
description = ''
Additional files in root to link to persistent storage.
'';
};
extraDirectories = mkOption {
default = [];
2024-04-07 22:36:02 +00:00
type = types.listOf types.path;
2024-04-07 16:28:15 +00:00
example = literalExpression ''["/etc/nix/id_rsa"]'';
description = ''
Additional directories in root to link to persistent storage.
'';
};
persistentMountPoint = mkOption {
default = "/persist";
description = ''
Path to a persistent directory (usually a mount point to a
standalone partition / subvolume), which will hold the persistent
system state files.
2024-06-19 15:41:40 +00:00
This should point to the entire persistent partition, this setup
then expects this directory to contain `passwords` and `system` subdirectories.
'';
};
};
home = {
enable = mkEnableOption ''
the Impermanence module for persisting important state directories.
This requires home-manager.
'';
extraFiles = mkOption {
default = [];
type = types.listOf types.str;
example = literalExpression ''[".zshrc"]'';
description = ''
Additional files in home to link to persistent storage.
'';
};
extraDirectories = mkOption {
default = [];
type = types.listOf types.str;
example = literalExpression ''[".config/chromium"]'';
2024-06-19 15:41:40 +00:00
description = ''
Additional directories in home to link to persistent storage.
'';
};
persistentMountPoint = mkOption {
default = "/persist/home";
description = ''
Path to a persistent directory (usually a mount point to a
standalone partition or subvolume), which will hold the persistent
2024-06-19 15:41:40 +00:00
system state files.
This does not create any subdirectories, all of the persistent home files
2024-06-19 15:41:40 +00:00
will be put directly in here. The user should be the owner of this direcotry.
2024-04-07 16:28:15 +00:00
'';
};
persistentDataMountPoint = mkOption {
default = "/persist/home";
description = ''
Path to a persistent directory (usually a mount point to a
standalone partition or subvolume), which will hold the persistent
data files.
This does not create any subdirectories, all of the persistent home files
fill be put directly in here. The user should be the owner of this directory.
2024-07-26 23:07:07 +00:00
If you don't wish to distinguish between data and system / configuration files,
you can point this to the same location.
'';
};
extraDataFiles = mkOption {
default = [];
type = types.listOf types.str;
example = literalExpression ''["notes.txt"]'';
description = ''
Additional files in home to link to persistent data storage.
'';
};
extraDataDirectories = mkOption {
default = [];
type = types.listOf types.str;
example = literalExpression ''["Downloads"]'';
description = ''
Additional directories in home to link to persistent data storage.
'';
};
2024-04-07 22:36:02 +00:00
};
2024-04-07 16:28:15 +00:00
2024-04-07 22:36:02 +00:00
autoWipeBtrfs = let
btrfsDeviceOptionType = types.submodule {
options = {
subvolumes = mkOption {
type = types.listOf types.str;
default = [];
description = ''
List of BTRFS subvolumes to be wiped from the device.
2024-04-07 16:28:15 +00:00
2024-04-07 22:36:02 +00:00
These subvolumes will be wiped from initrd, before the subvolumes are mounted.
'';
example = literalExpression ''[ "root" "home" ]'';
};
2024-04-07 16:28:15 +00:00
};
2024-04-07 22:36:02 +00:00
};
in {
enable = mkEnableOption ''
2024-07-26 23:07:07 +00:00
automatic wiping of specified BTRFS subvolumes from initrd.
2024-04-07 16:28:15 +00:00
2024-07-26 23:07:07 +00:00
If you're using BTRFS, you will generally want to enable this, however
with a non-BTRFS system, or in case you wish to set up some custom handling
which this module doesn't support, you will need to write your own logic
for automatic root wiping.
2024-04-07 16:28:15 +00:00
2024-07-26 23:07:07 +00:00
One option is is to simply have your root get mounted from tmpfs, making it
live in RAM. This does however require dedicating a concrete chunk of RAM.
'';
2024-04-07 16:28:15 +00:00
2024-04-07 22:36:02 +00:00
devices = mkOption {
default = {};
type = types.attrsOf btrfsDeviceOptionType;
description = ''
BTRFS devices and their subvolumes to be wiped.
'';
example = literalExpression ''
{
"/dev/sda1" = {
subvolumes = [ "root" ];
};
"/dev/mapper/cryptfs" = {
subvolumes = [ "homeJohn" "homeBob" ];
};
}
'';
2024-04-07 16:28:15 +00:00
};
};
};
config = {
assertions = [
{
assertion = cfg.autoWipeBtrfs.enable -> cfg.root.enable;
message = "myOptions.system.impermanence.autoWipeBtrfs requires myOptions.system.impermanence.root to be enabled.";
}
];
};
2024-04-07 16:28:15 +00:00
}