Extract default user to separate module
This commit is contained in:
parent
7537cf4205
commit
17e4feb542
@ -92,6 +92,7 @@
|
|||||||
|
|
||||||
modules = mapAttrs (_: f: ./. + "/nixos/modules/${f}") {
|
modules = mapAttrs (_: f: ./. + "/nixos/modules/${f}") {
|
||||||
common = "common.nix";
|
common = "common.nix";
|
||||||
|
user = "user.nix";
|
||||||
build = "build.nix";
|
build = "build.nix";
|
||||||
dynamic-motd = "dynamic-motd.nix";
|
dynamic-motd = "dynamic-motd.nix";
|
||||||
tmproot = "tmproot.nix";
|
tmproot = "tmproot.nix";
|
||||||
|
@ -1,29 +1,11 @@
|
|||||||
{ lib, pkgs, pkgs', inputs, options, config, ... }:
|
{ lib, pkgs, pkgs', inputs, config, ... }:
|
||||||
let
|
let
|
||||||
inherit (builtins) attrValues;
|
inherit (lib) flatten optional mkIf mkDefault mkMerge;
|
||||||
inherit (lib) flatten optional mkIf mkDefault mkMerge mkOption mkAliasDefinitions;
|
inherit (lib.my) mkBoolOpt' dummyOption;
|
||||||
inherit (lib.my) mkOpt' mkBoolOpt' dummyOption mkDefault';
|
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options = with lib.types; {
|
options = with lib.types; {
|
||||||
my = {
|
my = {
|
||||||
# TODO: Move to separate module
|
|
||||||
user = {
|
|
||||||
enable = mkBoolOpt' true "Whether to create a primary user.";
|
|
||||||
config = mkOption {
|
|
||||||
type = options.users.users.type.nestedTypes.elemType;
|
|
||||||
default = { };
|
|
||||||
description = "User definition (as `users.users.*`).";
|
|
||||||
};
|
|
||||||
homeConfig = mkOption {
|
|
||||||
type = options.home-manager.users.type.nestedTypes.elemType;
|
|
||||||
default = { };
|
|
||||||
# Prevent docs traversing into all of home-manager
|
|
||||||
visible = "shallow";
|
|
||||||
description = "Home configuration (as `home-manager.users.*`)";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
ssh = {
|
ssh = {
|
||||||
strictModes = mkBoolOpt' true
|
strictModes = mkBoolOpt' true
|
||||||
("Specifies whether sshd(8) should check file modes and ownership of the user's files and home directory "+
|
("Specifies whether sshd(8) should check file modes and ownership of the user's files and home directory "+
|
||||||
@ -36,36 +18,6 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
config = mkMerge [
|
config = mkMerge [
|
||||||
(let
|
|
||||||
cfg = config.my.user;
|
|
||||||
user' = cfg.config;
|
|
||||||
in mkIf cfg.enable
|
|
||||||
{
|
|
||||||
my = {
|
|
||||||
user = {
|
|
||||||
config = {
|
|
||||||
name = mkDefault' "dev";
|
|
||||||
isNormalUser = true;
|
|
||||||
uid = mkDefault 1000;
|
|
||||||
extraGroups = mkDefault [ "wheel" ];
|
|
||||||
password = mkDefault "hunter2"; # TODO: secrets...
|
|
||||||
openssh.authorizedKeys.keyFiles = [ lib.my.authorizedKeys ];
|
|
||||||
};
|
|
||||||
# In order for this option to evaluate on its own, home-manager expects the `name` (which is derived from the
|
|
||||||
# parent attr name) to be the users name, aka `home-manager.users.<name>`
|
|
||||||
homeConfig = { _module.args.name = lib.mkForce user'.name; };
|
|
||||||
};
|
|
||||||
|
|
||||||
deploy.authorizedKeys = mkDefault user'.openssh.authorizedKeys;
|
|
||||||
};
|
|
||||||
|
|
||||||
# mkAliasDefinitions will copy the unmerged defintions to allow the upstream submodule to deal with
|
|
||||||
users.users.${user'.name} = mkAliasDefinitions options.my.user.config;
|
|
||||||
|
|
||||||
# NOTE: As the "outermost" module is still being evaluated in NixOS land, special params (e.g. pkgs) won't be
|
|
||||||
# passed to it
|
|
||||||
home-manager.users.${user'.name} = mkAliasDefinitions options.my.user.homeConfig;
|
|
||||||
})
|
|
||||||
{
|
{
|
||||||
home-manager = {
|
home-manager = {
|
||||||
# Installs packages in the system config instead of in the local profile on activation
|
# Installs packages in the system config instead of in the local profile on activation
|
||||||
|
52
nixos/modules/user.nix
Normal file
52
nixos/modules/user.nix
Normal file
@ -0,0 +1,52 @@
|
|||||||
|
{ lib, options, config, ... }:
|
||||||
|
let
|
||||||
|
inherit (lib) mkIf mkDefault mkOption mkAliasDefinitions;
|
||||||
|
inherit (lib.my) mkBoolOpt' mkDefault';
|
||||||
|
|
||||||
|
cfg = config.my.user;
|
||||||
|
user' = cfg.config;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options.my.user = with lib.types; {
|
||||||
|
enable = mkBoolOpt' true "Whether to create a primary user.";
|
||||||
|
config = mkOption {
|
||||||
|
type = options.users.users.type.nestedTypes.elemType;
|
||||||
|
default = { };
|
||||||
|
description = "User definition (as `users.users.*`).";
|
||||||
|
};
|
||||||
|
homeConfig = mkOption {
|
||||||
|
type = options.home-manager.users.type.nestedTypes.elemType;
|
||||||
|
default = { };
|
||||||
|
# Prevent docs traversing into all of home-manager
|
||||||
|
visible = "shallow";
|
||||||
|
description = "Home configuration (as `home-manager.users.*`)";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = mkIf cfg.enable {
|
||||||
|
my = {
|
||||||
|
user = {
|
||||||
|
config = {
|
||||||
|
name = mkDefault' "dev";
|
||||||
|
isNormalUser = true;
|
||||||
|
uid = mkDefault 1000;
|
||||||
|
extraGroups = mkDefault [ "wheel" ];
|
||||||
|
password = mkDefault "hunter2"; # TODO: secrets...
|
||||||
|
openssh.authorizedKeys.keyFiles = [ lib.my.authorizedKeys ];
|
||||||
|
};
|
||||||
|
# In order for this option to evaluate on its own, home-manager expects the `name` (which is derived from the
|
||||||
|
# parent attr name) to be the users name, aka `home-manager.users.<name>`
|
||||||
|
homeConfig = { _module.args.name = lib.mkForce user'.name; };
|
||||||
|
};
|
||||||
|
|
||||||
|
deploy.authorizedKeys = mkDefault user'.openssh.authorizedKeys;
|
||||||
|
};
|
||||||
|
|
||||||
|
# mkAliasDefinitions will copy the unmerged defintions to allow the upstream submodule to deal with
|
||||||
|
users.users.${user'.name} = mkAliasDefinitions options.my.user.config;
|
||||||
|
|
||||||
|
# NOTE: As the "outermost" module is still being evaluated in NixOS land, special params (e.g. pkgs) won't be
|
||||||
|
# passed to it
|
||||||
|
home-manager.users.${user'.name} = mkAliasDefinitions options.my.user.homeConfig;
|
||||||
|
};
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user