nixos: allow more things to be disabled (#429695)
This commit is contained in:
@@ -8,41 +8,47 @@
|
||||
}:
|
||||
let
|
||||
|
||||
requiredPackages =
|
||||
map (pkg: lib.setPrio ((pkg.meta.priority or lib.meta.defaultPriority) + 3) pkg)
|
||||
[
|
||||
pkgs.acl
|
||||
pkgs.attr
|
||||
pkgs.bashInteractive # bash with ncurses support
|
||||
pkgs.bzip2
|
||||
pkgs.coreutils-full
|
||||
pkgs.cpio
|
||||
pkgs.curl
|
||||
pkgs.diffutils
|
||||
pkgs.findutils
|
||||
pkgs.gawk
|
||||
pkgs.stdenv.cc.libc
|
||||
pkgs.getent
|
||||
pkgs.getconf
|
||||
pkgs.gnugrep
|
||||
pkgs.gnupatch
|
||||
pkgs.gnused
|
||||
pkgs.gnutar
|
||||
pkgs.gzip
|
||||
pkgs.xz
|
||||
pkgs.less
|
||||
pkgs.libcap
|
||||
pkgs.ncurses
|
||||
pkgs.netcat
|
||||
config.programs.ssh.package
|
||||
pkgs.mkpasswd
|
||||
pkgs.procps
|
||||
pkgs.su
|
||||
pkgs.time
|
||||
pkgs.util-linux
|
||||
pkgs.which
|
||||
pkgs.zstd
|
||||
corePackageNames = [
|
||||
"acl"
|
||||
"attr"
|
||||
"bashInteractive" # bash with ncurses support
|
||||
"bzip2"
|
||||
"coreutils-full"
|
||||
"cpio"
|
||||
"curl"
|
||||
"diffutils"
|
||||
"findutils"
|
||||
"gawk"
|
||||
"getent"
|
||||
"getconf"
|
||||
"gnugrep"
|
||||
"gnupatch"
|
||||
"gnused"
|
||||
"gnutar"
|
||||
"gzip"
|
||||
"xz"
|
||||
"less"
|
||||
"libcap"
|
||||
"ncurses"
|
||||
"netcat"
|
||||
"mkpasswd"
|
||||
"procps"
|
||||
"su"
|
||||
"time"
|
||||
"util-linux"
|
||||
"which"
|
||||
"zstd"
|
||||
];
|
||||
corePackages =
|
||||
(map (
|
||||
n:
|
||||
let
|
||||
pkg = pkgs.${n};
|
||||
in
|
||||
lib.setPrio ((pkg.meta.priority or lib.meta.defaultPriority) + 3) pkg
|
||||
) corePackageNames)
|
||||
++ [ pkgs.stdenv.cc.libc ];
|
||||
corePackagesText = "[ ${lib.concatMapStringsSep " " (n: "pkgs.${n}") corePackageNames} ]";
|
||||
|
||||
defaultPackageNames = [
|
||||
"perl"
|
||||
@@ -80,6 +86,29 @@ in
|
||||
'';
|
||||
};
|
||||
|
||||
corePackages = lib.mkOption {
|
||||
type = lib.types.listOf lib.types.package;
|
||||
default = corePackages;
|
||||
defaultText = lib.literalMD ''
|
||||
these packages, with their `meta.priority` numerically increased
|
||||
(thus lowering their installation priority):
|
||||
|
||||
${corePackagesText}
|
||||
'';
|
||||
example = [ ];
|
||||
description = ''
|
||||
Set of core packages for a normal interactive system.
|
||||
|
||||
Only change this if you know what you're doing!
|
||||
|
||||
Like with systemPackages, packages are installed to
|
||||
{file}`/run/current-system/sw`. They are
|
||||
automatically available to all users, and are
|
||||
automatically updated every time you rebuild the system
|
||||
configuration.
|
||||
'';
|
||||
};
|
||||
|
||||
defaultPackages = lib.mkOption {
|
||||
type = lib.types.listOf lib.types.package;
|
||||
default = defaultPackages;
|
||||
@@ -151,7 +180,7 @@ in
|
||||
|
||||
config = {
|
||||
|
||||
environment.systemPackages = requiredPackages ++ config.environment.defaultPackages;
|
||||
environment.systemPackages = config.environment.corePackages ++ config.environment.defaultPackages;
|
||||
|
||||
environment.pathsToLink = [
|
||||
"/bin"
|
||||
|
||||
@@ -23,15 +23,11 @@ let
|
||||
in
|
||||
|
||||
{
|
||||
imports = [
|
||||
(lib.mkRemovedOptionModule [ "programs" "bash" "enable" ] "")
|
||||
];
|
||||
|
||||
options = {
|
||||
|
||||
programs.bash = {
|
||||
|
||||
/*
|
||||
enable = lib.mkOption {
|
||||
default = true;
|
||||
description = ''
|
||||
@@ -44,7 +40,6 @@ in
|
||||
'';
|
||||
type = lib.types.bool;
|
||||
};
|
||||
*/
|
||||
|
||||
shellAliases = lib.mkOption {
|
||||
default = { };
|
||||
@@ -129,8 +124,7 @@ in
|
||||
|
||||
};
|
||||
|
||||
config = # lib.mkIf cfg.enable
|
||||
{
|
||||
config = lib.mkIf cfg.enable {
|
||||
|
||||
programs.bash = {
|
||||
|
||||
|
||||
@@ -1,4 +1,9 @@
|
||||
{ config, lib, ... }:
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
|
||||
let
|
||||
cfg = config.programs.fuse;
|
||||
@@ -7,6 +12,10 @@ in
|
||||
meta.maintainers = with lib.maintainers; [ ];
|
||||
|
||||
options.programs.fuse = {
|
||||
enable = lib.mkEnableOption "fuse" // {
|
||||
default = true;
|
||||
};
|
||||
|
||||
mountMax = lib.mkOption {
|
||||
# In the C code it's an "int" (i.e. signed and at least 16 bit), but
|
||||
# negative numbers obviously make no sense:
|
||||
@@ -27,10 +36,30 @@ in
|
||||
};
|
||||
};
|
||||
|
||||
config = {
|
||||
config = lib.mkIf cfg.enable {
|
||||
environment.systemPackages = [
|
||||
pkgs.fuse
|
||||
pkgs.fuse3
|
||||
];
|
||||
|
||||
security.wrappers =
|
||||
let
|
||||
mkSetuidRoot = source: {
|
||||
setuid = true;
|
||||
owner = "root";
|
||||
group = "root";
|
||||
inherit source;
|
||||
};
|
||||
in
|
||||
{
|
||||
fusermount = mkSetuidRoot "${lib.getBin pkgs.fuse}/bin/fusermount";
|
||||
fusermount3 = mkSetuidRoot "${lib.getBin pkgs.fuse3}/bin/fusermount3";
|
||||
};
|
||||
|
||||
environment.etc."fuse.conf".text = ''
|
||||
${lib.optionalString (!cfg.userAllowOther) "#"}user_allow_other
|
||||
mount_max = ${builtins.toString cfg.mountMax}
|
||||
'';
|
||||
|
||||
};
|
||||
}
|
||||
|
||||
@@ -335,6 +335,8 @@ in
|
||||
}
|
||||
);
|
||||
|
||||
environment.corePackages = [ cfg.package ];
|
||||
|
||||
# SSH configuration. Slight duplication of the sshd_config
|
||||
# generation in the sshd service.
|
||||
environment.etc."ssh/ssh_config".text = ''
|
||||
|
||||
@@ -266,8 +266,6 @@ in
|
||||
in
|
||||
{
|
||||
# These are mount related wrappers that require the +s permission.
|
||||
fusermount = mkSetuidRoot "${lib.getBin pkgs.fuse}/bin/fusermount";
|
||||
fusermount3 = mkSetuidRoot "${lib.getBin pkgs.fuse3}/bin/fusermount3";
|
||||
mount = mkSetuidRoot "${lib.getBin pkgs.util-linux}/bin/mount";
|
||||
umount = mkSetuidRoot "${lib.getBin pkgs.util-linux}/bin/umount";
|
||||
};
|
||||
|
||||
@@ -317,7 +317,7 @@ in
|
||||
source ${config.system.build.earlyMountScript}
|
||||
'';
|
||||
|
||||
systemd.user = {
|
||||
systemd.user = lib.mkIf config.system.activatable {
|
||||
services.nixos-activation = {
|
||||
description = "Run user-specific NixOS activation";
|
||||
script = config.system.userActivationScripts.script;
|
||||
|
||||
@@ -414,7 +414,9 @@ in
|
||||
|
||||
ln -s ${initrdPath} $out/initrd
|
||||
|
||||
${optionalString (config.boot.initrd.secrets != { }) ''
|
||||
ln -s ${config.system.build.initialRamdiskSecretAppender}/bin/append-initrd-secrets $out
|
||||
''}
|
||||
|
||||
ln -s ${config.hardware.firmware}/lib/firmware $out/firmware
|
||||
'';
|
||||
|
||||
@@ -1,7 +1,22 @@
|
||||
{ pkgs, lib, ... }:
|
||||
|
||||
{
|
||||
config = lib.mkIf (lib.meta.availableOn pkgs.stdenv.hostPlatform pkgs.kexec-tools) {
|
||||
config,
|
||||
pkgs,
|
||||
lib,
|
||||
...
|
||||
}:
|
||||
|
||||
let
|
||||
cfg = config.boot.kexec;
|
||||
in
|
||||
{
|
||||
options.boot.kexec = {
|
||||
enable = lib.mkEnableOption "kexec" // {
|
||||
default = lib.meta.availableOn pkgs.stdenv.hostPlatform pkgs.kexec-tools;
|
||||
defaultText = lib.literalExpression ''lib.meta.availableOn pkgs.stdenv.hostPlatform pkgs.kexec-tools'';
|
||||
};
|
||||
};
|
||||
|
||||
config = lib.mkIf cfg.enable {
|
||||
environment.systemPackages = [ pkgs.kexec-tools ];
|
||||
|
||||
systemd.services.prepare-kexec = {
|
||||
|
||||
@@ -461,13 +461,7 @@ in
|
||||
# Add the mount helpers to the system path so that `mount' can find them.
|
||||
system.fsPackages = [ pkgs.dosfstools ];
|
||||
|
||||
environment.systemPackages =
|
||||
with pkgs;
|
||||
[
|
||||
fuse3
|
||||
fuse
|
||||
]
|
||||
++ config.system.fsPackages;
|
||||
environment.systemPackages = config.system.fsPackages;
|
||||
|
||||
environment.etc.fstab.text =
|
||||
let
|
||||
|
||||
@@ -1767,7 +1767,8 @@ in
|
||||
text = cfg.hostName + "\n";
|
||||
};
|
||||
|
||||
environment.systemPackages = [
|
||||
environment.corePackages = lib.mkOptionDefault (
|
||||
[
|
||||
pkgs.host
|
||||
pkgs.hostname-debian
|
||||
pkgs.iproute2
|
||||
@@ -1777,7 +1778,8 @@ in
|
||||
pkgs.wirelesstools # FIXME: obsolete?
|
||||
pkgs.iw
|
||||
]
|
||||
++ bridgeStp;
|
||||
++ bridgeStp
|
||||
);
|
||||
|
||||
# Wake-on-LAN configuration is shared by the scripted and networkd backends.
|
||||
systemd.network.links = pipe interfaces [
|
||||
|
||||
Reference in New Issue
Block a user