f6fd10cbd8
Just set nix.distributedBuilds to true and nix.buildMachines to a list of machines that can perform Nix builds via SSH, and local builds will be forwarded appropriately. So now any user can say something like nix-build /etc/nixos/nixpkgs/ --arg system '"powerpc-linux"' -A libxml2 and the build for powerpc-linux will be forwarded to a machine of that type. svn path=/nixos/trunk/; revision=9696
233 lines
6.3 KiB
Nix
233 lines
6.3 KiB
Nix
{ config, pkgs, upstartJobs, systemPath, wrapperDir
|
|
, defaultShell, extraEtc, nixEnvVars
|
|
}:
|
|
|
|
let
|
|
|
|
|
|
optional = pkgs.lib.optional;
|
|
|
|
|
|
# !!! ugh, these files shouldn't be created here.
|
|
|
|
|
|
envConf = pkgs.writeText "environment" "
|
|
PATH=${systemPath}/bin:${systemPath}/sbin:${pkgs.openssh}/bin
|
|
NIX_REMOTE=daemon
|
|
" /* ${pkgs.openssh}/bin is a hack to get remote scp to work */;
|
|
|
|
|
|
# Don't indent this file!
|
|
pamConsoleHandlers = pkgs.writeText "console.handlers" "
|
|
console consoledevs /dev/tty[0-9][0-9]* :[0-9]\.[0-9] :[0-9]
|
|
${pkgs.pam_console}/sbin/pam_console_apply lock logfail wait -t tty -s -c ${pamConsolePerms}
|
|
${pkgs.pam_console}/sbin/pam_console_apply unlock logfail wait -r -t tty -s -c ${pamConsolePerms}
|
|
";
|
|
|
|
pamConsolePerms = ./security/console.perms;
|
|
|
|
|
|
in
|
|
|
|
|
|
import ../helpers/make-etc.nix {
|
|
inherit (pkgs) stdenv;
|
|
|
|
configFiles = [
|
|
|
|
{ # TCP/UDP port assignments.
|
|
source = pkgs.iana_etc + "/etc/services";
|
|
target = "services";
|
|
}
|
|
|
|
{ # IP protocol numbers.
|
|
source = pkgs.iana_etc + "/etc/protocols";
|
|
target = "protocols";
|
|
}
|
|
|
|
{ # Hostname-to-IP mappings.
|
|
source = pkgs.substituteAll{
|
|
src = ./hosts;
|
|
extraHosts = config.networking.extraHosts;
|
|
};
|
|
target = "hosts";
|
|
}
|
|
|
|
{ # Name Service Switch configuration file. Required by the C library.
|
|
source = ./nsswitch.conf;
|
|
target = "nsswitch.conf";
|
|
}
|
|
|
|
{ # Configuration file for the system logging daemon.
|
|
source = ./syslog.conf;
|
|
target = "syslog.conf";
|
|
}
|
|
|
|
{ # Friendly greeting on the virtual consoles.
|
|
source = ./issue;
|
|
target = "issue";
|
|
}
|
|
|
|
{ # Configuration for pwdutils (login, passwd, useradd, etc.).
|
|
# You cannot login without it!
|
|
source = ./login.defs;
|
|
target = "login.defs";
|
|
}
|
|
|
|
{ # The Upstart events defined above.
|
|
source = upstartJobs + "/etc/event.d";
|
|
target = "event.d";
|
|
}
|
|
|
|
{ # Configuration for passwd and friends (e.g., hash algorithm
|
|
# for /etc/passwd).
|
|
source = ./default/passwd;
|
|
target = "default/passwd";
|
|
}
|
|
|
|
{ # Configuration for useradd.
|
|
source = pkgs.substituteAll {
|
|
src = ./default/useradd;
|
|
inherit defaultShell;
|
|
};
|
|
target = "default/useradd";
|
|
}
|
|
|
|
{ # Dhclient hooks for emitting ip-up/ip-down events.
|
|
source = pkgs.substituteAll {
|
|
src = ./dhclient-exit-hooks;
|
|
inherit (pkgs) upstart glibc;
|
|
};
|
|
target = "dhclient-exit-hooks";
|
|
}
|
|
|
|
{ # Script executed when the shell starts.
|
|
source = pkgs.substituteAll {
|
|
src = ./profile.sh;
|
|
inherit systemPath wrapperDir;
|
|
inherit (pkgs) systemKernel glibc;
|
|
timeZone = config.time.timeZone;
|
|
defaultLocale = config.i18n.defaultLocale;
|
|
inherit nixEnvVars;
|
|
};
|
|
target = "profile";
|
|
}
|
|
|
|
{ # Configuration for readline in bash.
|
|
source = ./inputrc;
|
|
target = "inputrc";
|
|
}
|
|
|
|
{ # Nix configuration.
|
|
source = pkgs.writeText "nix.conf" "
|
|
# WARNING: this file is generated.
|
|
build-users-group = nixbld
|
|
build-max-jobs = ${toString (config.nix.maxJobs)}
|
|
build-use-chroot = ${if config.nix.useChroot then "true" else "false"}
|
|
build-chroot-dirs = /dev /proc /bin /etc
|
|
${config.nix.extraOptions}
|
|
";
|
|
target = "nix.conf"; # will be symlinked from /nix/etc/nix/nix.conf in activate-configuration.sh.
|
|
}
|
|
|
|
]
|
|
|
|
# Configuration for ssmtp.
|
|
++ optional config.networking.defaultMailServer.directDelivery {
|
|
source = pkgs.writeText "ssmtp.conf" "
|
|
mailhub=${config.networking.defaultMailServer.hostName}
|
|
UseTLS=${if config.networking.defaultMailServer.useTLS then "YES" else "NO"}
|
|
UseSTARTTLS=${if config.networking.defaultMailServer.useSTARTTLS then "YES" else "NO"}
|
|
#Debug=YES
|
|
";
|
|
target = "ssmtp/ssmtp.conf";
|
|
}
|
|
|
|
# Configuration file for fontconfig used to locate
|
|
# (X11) client-rendered fonts.
|
|
++ optional config.fonts.enableFontConfig {
|
|
source = pkgs.runCommand "fonts.conf"
|
|
{
|
|
fontDirectories = import ../system/fonts.nix {inherit pkgs config;};
|
|
buildInputs = [pkgs.libxslt];
|
|
inherit (pkgs) fontconfig;
|
|
}
|
|
"xsltproc --stringparam fontDirectories \"$fontDirectories\" \\
|
|
--stringparam fontconfig \"$fontconfig\" \\
|
|
${./fonts/make-fonts-conf.xsl} $fontconfig/etc/fonts/fonts.conf \\
|
|
> $out
|
|
";
|
|
target = "fonts/fonts.conf";
|
|
}
|
|
|
|
# LDAP configuration.
|
|
++ optional config.users.ldap.enable {
|
|
source = import ./ldap.conf.nix {
|
|
inherit (pkgs) writeText;
|
|
inherit config;
|
|
};
|
|
target = "ldap.conf";
|
|
}
|
|
|
|
# "sudo" configuration.
|
|
++ optional config.security.sudo.enable {
|
|
source = pkgs.runCommand "sudoers"
|
|
{ src = pkgs.writeText "sudoers-in" (config.security.sudo.configFile);
|
|
}
|
|
# Make sure that the sudoers file is syntactically valid.
|
|
# (currently disabled - NIXOS-66)
|
|
#"${pkgs.sudo}/sbin/visudo -f $src -c && cp $src $out";
|
|
"cp $src $out";
|
|
target = "sudoers";
|
|
mode = "0440";
|
|
}
|
|
|
|
# A bunch of PAM configuration files for various programs.
|
|
++ (map
|
|
(program:
|
|
let isLDAPEnabled = config.users.ldap.enable; in
|
|
{ source = pkgs.substituteAll {
|
|
src = ./pam.d + ("/" + program);
|
|
inherit (pkgs) pam_unix2 pam_console;
|
|
pam_ldap =
|
|
if isLDAPEnabled
|
|
then pkgs.pam_ldap
|
|
else "/no-such-path";
|
|
inherit (pkgs.xorg) xauth;
|
|
inherit envConf pamConsoleHandlers;
|
|
isLDAPEnabled = if isLDAPEnabled then "" else "#";
|
|
};
|
|
target = "pam.d/" + program;
|
|
}
|
|
)
|
|
[
|
|
"login"
|
|
"slim"
|
|
"su"
|
|
"sudo"
|
|
"other"
|
|
"passwd"
|
|
"shadow"
|
|
"sshd"
|
|
"useradd"
|
|
"chsh"
|
|
"common"
|
|
"common-console" # shared stuff for interactive local sessions
|
|
]
|
|
)
|
|
|
|
# List of machines for distributed Nix builds in the format expected
|
|
# by build-remote.pl.
|
|
++ optional config.nix.distributedBuilds {
|
|
source = pkgs.writeText "nix.machines"
|
|
(pkgs.lib.concatStrings (map (machine:
|
|
"${machine.sshUser}@${machine.hostName} ${machine.system} ${machine.sshKey} ${toString machine.maxJobs}\n"
|
|
) config.nix.buildMachines));
|
|
target = "nix.machines";
|
|
}
|
|
|
|
# Additional /etc files declared by Upstart jobs.
|
|
++ extraEtc;
|
|
|
|
}
|