2020-04-24 23:36:52 +00:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
cfg = config.services.locate;
|
|
|
|
isMLocate = hasPrefix "mlocate" cfg.locate.name;
|
|
|
|
isFindutils = hasPrefix "findutils" cfg.locate.name;
|
|
|
|
in {
|
|
|
|
imports = [
|
|
|
|
(mkRenamedOptionModule [ "services" "locate" "period" ] [ "services" "locate" "interval" ])
|
|
|
|
(mkRemovedOptionModule [ "services" "locate" "includeStore" ] "Use services.locate.prunePaths" )
|
|
|
|
];
|
|
|
|
|
|
|
|
options.services.locate = with types; {
|
|
|
|
enable = mkOption {
|
|
|
|
type = bool;
|
|
|
|
default = false;
|
|
|
|
description = ''
|
|
|
|
If enabled, NixOS will periodically update the database of
|
|
|
|
files used by the <command>locate</command> command.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
locate = mkOption {
|
|
|
|
type = package;
|
|
|
|
default = pkgs.findutils;
|
|
|
|
defaultText = "pkgs.findutils";
|
|
|
|
example = "pkgs.mlocate";
|
|
|
|
description = ''
|
|
|
|
The locate implementation to use
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
interval = mkOption {
|
|
|
|
type = str;
|
|
|
|
default = "02:15";
|
|
|
|
example = "hourly";
|
|
|
|
description = ''
|
|
|
|
Update the locate database at this interval. Updates by
|
|
|
|
default at 2:15 AM every day.
|
|
|
|
|
|
|
|
The format is described in
|
|
|
|
<citerefentry><refentrytitle>systemd.time</refentrytitle>
|
|
|
|
<manvolnum>7</manvolnum></citerefentry>.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
extraFlags = mkOption {
|
|
|
|
type = listOf str;
|
|
|
|
default = [ ];
|
|
|
|
description = ''
|
|
|
|
Extra flags to pass to <command>updatedb</command>.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
output = mkOption {
|
|
|
|
type = path;
|
|
|
|
default = "/var/cache/locatedb";
|
|
|
|
description = ''
|
|
|
|
The database file to build.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
localuser = mkOption {
|
|
|
|
type = nullOr str;
|
|
|
|
default = "nobody";
|
|
|
|
description = ''
|
|
|
|
The user to search non-network directories as, using
|
|
|
|
<command>su</command>.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
pruneFS = mkOption {
|
|
|
|
type = listOf str;
|
2020-12-25 13:55:36 +00:00
|
|
|
default = [
|
|
|
|
"afs"
|
|
|
|
"anon_inodefs"
|
|
|
|
"auto"
|
|
|
|
"autofs"
|
|
|
|
"bdev"
|
|
|
|
"binfmt"
|
|
|
|
"binfmt_misc"
|
|
|
|
"cgroup"
|
|
|
|
"cifs"
|
|
|
|
"coda"
|
|
|
|
"configfs"
|
|
|
|
"cramfs"
|
|
|
|
"cpuset"
|
|
|
|
"debugfs"
|
|
|
|
"devfs"
|
|
|
|
"devpts"
|
|
|
|
"devtmpfs"
|
|
|
|
"ecryptfs"
|
|
|
|
"eventpollfs"
|
|
|
|
"exofs"
|
|
|
|
"futexfs"
|
|
|
|
"ftpfs"
|
|
|
|
"fuse"
|
|
|
|
"fusectl"
|
|
|
|
"fuse.sshfs"
|
|
|
|
"gfs"
|
|
|
|
"gfs2"
|
|
|
|
"hostfs"
|
|
|
|
"hugetlbfs"
|
|
|
|
"inotifyfs"
|
|
|
|
"iso9660"
|
|
|
|
"jffs2"
|
|
|
|
"lustre"
|
|
|
|
"misc"
|
|
|
|
"mqueue"
|
|
|
|
"ncpfs"
|
|
|
|
"nnpfs"
|
|
|
|
"ocfs"
|
|
|
|
"ocfs2"
|
|
|
|
"pipefs"
|
|
|
|
"proc"
|
|
|
|
"ramfs"
|
|
|
|
"rpc_pipefs"
|
|
|
|
"securityfs"
|
|
|
|
"selinuxfs"
|
|
|
|
"sfs"
|
|
|
|
"shfs"
|
|
|
|
"smbfs"
|
|
|
|
"sockfs"
|
|
|
|
"spufs"
|
|
|
|
"nfs"
|
|
|
|
"NFS"
|
|
|
|
"nfs4"
|
|
|
|
"nfsd"
|
|
|
|
"sshfs"
|
|
|
|
"subfs"
|
|
|
|
"supermount"
|
|
|
|
"sysfs"
|
|
|
|
"tmpfs"
|
|
|
|
"ubifs"
|
|
|
|
"udf"
|
|
|
|
"usbfs"
|
|
|
|
"vboxsf"
|
|
|
|
"vperfctrfs"
|
|
|
|
];
|
2020-04-24 23:36:52 +00:00
|
|
|
description = ''
|
|
|
|
Which filesystem types to exclude from indexing
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
prunePaths = mkOption {
|
|
|
|
type = listOf path;
|
|
|
|
default = ["/tmp" "/var/tmp" "/var/cache" "/var/lock" "/var/run" "/var/spool" "/nix/store"];
|
|
|
|
description = ''
|
|
|
|
Which paths to exclude from indexing
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
pruneNames = mkOption {
|
|
|
|
type = listOf str;
|
|
|
|
default = [];
|
|
|
|
description = ''
|
|
|
|
Directory components which should exclude paths containing them from indexing
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
pruneBindMounts = mkOption {
|
|
|
|
type = bool;
|
|
|
|
default = false;
|
|
|
|
description = ''
|
|
|
|
Whether not to index bind mounts
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
users.groups = mkIf isMLocate { mlocate = {}; };
|
|
|
|
|
|
|
|
security.wrappers = mkIf isMLocate {
|
|
|
|
locate = {
|
|
|
|
group = "mlocate";
|
|
|
|
owner = "root";
|
|
|
|
permissions = "u+rx,g+x,o+x";
|
|
|
|
setgid = true;
|
|
|
|
setuid = false;
|
|
|
|
source = "${cfg.locate}/bin/locate";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
nixpkgs.config = { locate.dbfile = cfg.output; };
|
|
|
|
|
|
|
|
environment.systemPackages = [ cfg.locate ];
|
|
|
|
|
|
|
|
environment.variables = mkIf (!isMLocate)
|
|
|
|
{ LOCATE_PATH = cfg.output;
|
|
|
|
};
|
|
|
|
|
2020-09-25 04:45:31 +00:00
|
|
|
warnings = optional (isMLocate && cfg.localuser != null) "mlocate does not support the services.locate.localuser option; updatedb will run as root. (Silence with services.locate.localuser = null.)"
|
2020-04-24 23:36:52 +00:00
|
|
|
++ optional (isFindutils && cfg.pruneNames != []) "findutils locate does not support pruning by directory component"
|
|
|
|
++ optional (isFindutils && cfg.pruneBindMounts) "findutils locate does not support skipping bind mounts";
|
|
|
|
|
|
|
|
systemd.services.update-locatedb =
|
|
|
|
{ description = "Update Locate Database";
|
|
|
|
path = mkIf (!isMLocate) [ pkgs.su ];
|
|
|
|
|
|
|
|
# mlocate's updatedb takes flags via a configuration file or
|
|
|
|
# on the command line, but not by environment variable.
|
|
|
|
script =
|
|
|
|
if isMLocate
|
|
|
|
then let toFlags = x: optional (cfg.${x} != [])
|
|
|
|
"--${lib.toLower x} '${concatStringsSep " " cfg.${x}}'";
|
|
|
|
args = concatLists (map toFlags ["pruneFS" "pruneNames" "prunePaths"]);
|
|
|
|
in ''
|
|
|
|
exec ${cfg.locate}/bin/updatedb \
|
|
|
|
--output ${toString cfg.output} ${concatStringsSep " " args} \
|
|
|
|
--prune-bind-mounts ${if cfg.pruneBindMounts then "yes" else "no"} \
|
|
|
|
${concatStringsSep " " cfg.extraFlags}
|
|
|
|
''
|
|
|
|
else ''
|
|
|
|
exec ${cfg.locate}/bin/updatedb \
|
|
|
|
${optionalString (cfg.localuser != null && ! isMLocate) ''--localuser=${cfg.localuser}''} \
|
|
|
|
--output=${toString cfg.output} ${concatStringsSep " " cfg.extraFlags}
|
|
|
|
'';
|
|
|
|
environment = optionalAttrs (!isMLocate) {
|
|
|
|
PRUNEFS = concatStringsSep " " cfg.pruneFS;
|
|
|
|
PRUNEPATHS = concatStringsSep " " cfg.prunePaths;
|
|
|
|
PRUNENAMES = concatStringsSep " " cfg.pruneNames;
|
|
|
|
PRUNE_BIND_MOUNTS = if cfg.pruneBindMounts then "yes" else "no";
|
|
|
|
};
|
|
|
|
serviceConfig.Nice = 19;
|
|
|
|
serviceConfig.IOSchedulingClass = "idle";
|
|
|
|
serviceConfig.PrivateTmp = "yes";
|
|
|
|
serviceConfig.PrivateNetwork = "yes";
|
|
|
|
serviceConfig.NoNewPrivileges = "yes";
|
|
|
|
serviceConfig.ReadOnlyPaths = "/";
|
|
|
|
# Use dirOf cfg.output because mlocate creates temporary files next to
|
|
|
|
# the actual database. We could specify and create them as well,
|
|
|
|
# but that would make this quite brittle when they change something.
|
|
|
|
# NOTE: If /var/cache does not exist, this leads to the misleading error message:
|
|
|
|
# update-locatedb.service: Failed at step NAMESPACE spawning …/update-locatedb-start: No such file or directory
|
|
|
|
serviceConfig.ReadWritePaths = dirOf cfg.output;
|
|
|
|
};
|
|
|
|
|
|
|
|
systemd.timers.update-locatedb =
|
|
|
|
{ description = "Update timer for locate database";
|
|
|
|
partOf = [ "update-locatedb.service" ];
|
|
|
|
wantedBy = [ "timers.target" ];
|
|
|
|
timerConfig.OnCalendar = cfg.interval;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|