summaryrefslogtreecommitdiffstats
path: root/lass/3modules/acl.nix
diff options
context:
space:
mode:
authorlassulus <lassulus@lassul.us>2022-01-28 23:34:21 +0100
committerlassulus <lassulus@lassul.us>2022-01-28 23:34:21 +0100
commit8c81dde1f3b3ce8edcad2ca42ff973c06c13d788 (patch)
tree2aeb9300a66ab475fad619b54dea4073d30b931c /lass/3modules/acl.nix
parentd8b64c4f1367e21ffea0c68d987e22480f5e8899 (diff)
l: add acl module
Diffstat (limited to 'lass/3modules/acl.nix')
-rw-r--r--lass/3modules/acl.nix64
1 files changed, 64 insertions, 0 deletions
diff --git a/lass/3modules/acl.nix b/lass/3modules/acl.nix
new file mode 100644
index 000000000..b87ca2e08
--- /dev/null
+++ b/lass/3modules/acl.nix
@@ -0,0 +1,64 @@
+{ config, lib, pkgs, ... }: let
+ generateACLs = attrs:
+ lib.mapAttrsToList (path: rules: pkgs.writeDash "acl-${builtins.baseNameOf path}" ''
+ mkdir -p "${path}"
+ ${generateRules rules path}
+ '') attrs;
+
+ generateRules = rules: path:
+ lib.concatStrings (
+ lib.mapAttrsToList (_: rule: ''
+ setfacl -${lib.optionalString rule.recursive "R"}m ${rule.rule} ${path}
+ ${lib.optionalString rule.default "setfacl -${lib.optionalString rule.recursive "R"}dm ${rule.rule} ${path}"}
+ ${lib.optionalString rule.parents (lib.concatMapStringsSep "\n" (folder: "setfacl -m ${rule.rule} ${folder}") (parents path))}
+ '') rules
+ );
+
+ parents = dir:
+ if dir == "/" then
+ [ dir ]
+ else
+ [ dir ] ++ parents (builtins.dirOf dir)
+ ;
+in {
+ options.lass.acl = lib.mkOption {
+ type = lib.types.attrsOf (lib.types.attrsOf (lib.types.submodule ({ config, ... }: {
+ options = {
+ rule = lib.mkOption {
+ type = lib.types.str;
+ default = config._module.args.name;
+ };
+ default = lib.mkOption {
+ type = lib.types.bool;
+ default = !config.parents;
+ };
+ recursive = lib.mkOption {
+ type = lib.types.bool;
+ default = !config.parents;
+ };
+ parents = lib.mkOption {
+ type = lib.types.bool;
+ default = false;
+ description = ''
+ apply ACL to every parent folder
+ '';
+ };
+ };
+ })));
+ default = {};
+ };
+ config = lib.mkIf (config.lass.acl != {}) {
+ systemd.services.set_acl = {
+ wantedBy = [ "multi-user.target" ];
+ path = [
+ pkgs.acl
+ pkgs.coreutils
+ ];
+ serviceConfig = {
+ ExecStart = generateACLs config.lass.acl;
+ RemainAfterExit = true;
+ Type = "oneshot";
+ };
+ };
+ };
+}