-
-
Notifications
You must be signed in to change notification settings - Fork 35
/
nixos.rs
184 lines (149 loc) · 6.22 KB
/
nixos.rs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
use std::ops::Deref;
use std::{env, vec};
use color_eyre::eyre::{bail, Context};
use color_eyre::Result;
use tracing::{debug, info, warn};
use crate::interface::NHRunnable;
use crate::interface::OsRebuildType::{self, Boot, Build, Switch, Test};
use crate::interface::{self, OsRebuildArgs};
use crate::util::{compare_semver, get_nix_version};
use crate::*;
const SYSTEM_PROFILE: &str = "/nix/var/nix/profiles/system";
const CURRENT_PROFILE: &str = "/run/current-system";
const SPEC_LOCATION: &str = "/etc/specialisation";
impl NHRunnable for interface::OsArgs {
fn run(&self) -> Result<()> {
match &self.action {
Switch(args) | Boot(args) | Test(args) | Build(args) => args.rebuild(&self.action),
s => bail!("Subcommand {:?} not yet implemented", s),
}
}
}
impl OsRebuildArgs {
pub fn rebuild(&self, rebuild_type: &OsRebuildType) -> Result<()> {
let use_sudo = if self.bypass_root_check {
warn!("Bypassing root check, now running nix as root");
false
} else {
if nix::unistd::Uid::effective().is_root() {
bail!("Don't run nh os as root. I will call sudo internally as needed");
}
true
};
// TODO: add a .maybe_arg to CommandBuilder
// so that I can do .maybe_arg( Option<T> )
let sudo_args: &[_] = if use_sudo { &["sudo"] } else { &[] };
let hostname = match &self.hostname {
Some(h) => h.to_owned(),
None => hostname::get().context("Failed to get hostname")?,
};
let out_path: Box<dyn crate::util::MaybeTempPath> = match self.common.out_link {
Some(ref p) => Box::new(p.clone()),
None => Box::new({
let dir = tempfile::Builder::new().prefix("nh-os").tempdir()?;
(dir.as_ref().join("result"), dir)
}),
};
debug!(?out_path);
let flake_output = format!(
"{}#nixosConfigurations.\"{:?}\".config.system.build.toplevel",
&self.common.flakeref.deref(),
hostname
);
if self.common.update {
// Get the Nix version
let nix_version = get_nix_version().unwrap_or_else(|_| {
panic!("Failed to get Nix version. Custom Nix fork?");
});
// Default interface for updating flake inputs
let mut update_args = vec!["nix", "flake", "update"];
// If user is on Nix 2.19.0 or above, --flake must be passed
if let Ok(ordering) = compare_semver(&nix_version, "2.19.0") {
if ordering == std::cmp::Ordering::Greater {
update_args.push("--flake");
}
}
update_args.push(&self.common.flakeref);
debug!("nix_version: {:?}", nix_version);
debug!("update_args: {:?}", update_args);
commands::CommandBuilder::default()
.args(&update_args)
.message("Updating flake")
.build()?
.exec()?;
}
commands::BuildCommandBuilder::default()
.flakeref(flake_output)
.message("Building NixOS configuration")
.extra_args(["--out-link"])
.extra_args([out_path.get_path()])
.extra_args(&self.extra_args)
.nom(!self.common.no_nom)
.build()?
.exec()?;
let current_specialisation = std::fs::read_to_string(SPEC_LOCATION).ok();
let target_specialisation = if self.no_specialisation {
None
} else {
current_specialisation.or_else(|| self.specialisation.to_owned())
};
debug!("target_specialisation: {target_specialisation:?}");
let target_profile = match &target_specialisation {
None => out_path.get_path().to_owned(),
Some(spec) => out_path.get_path().join("specialisation").join(spec),
};
target_profile.try_exists().context("Doesn't exist")?;
commands::CommandBuilder::default()
.args(self.common.diff_provider.split_ascii_whitespace())
.args([CURRENT_PROFILE, target_profile.to_str().unwrap()])
.message("Comparing changes")
.build()?
.exec()?;
if self.common.dry || matches!(rebuild_type, OsRebuildType::Build(_)) {
return Ok(());
}
if self.common.ask {
info!("Apply the config?");
let confirmation = dialoguer::Confirm::new().default(false).interact()?;
if !confirmation {
bail!("User rejected the new config");
}
}
if let Test(_) | Switch(_) = rebuild_type {
// !! Use the target profile aka spec-namespaced
let switch_to_configuration =
target_profile.join("bin").join("switch-to-configuration");
let switch_to_configuration = switch_to_configuration.to_str().unwrap();
commands::CommandBuilder::default()
.args(sudo_args)
.args([switch_to_configuration, "test"])
.message("Activating configuration")
.build()?
.exec()?;
}
if let Boot(_) | Switch(_) = rebuild_type {
commands::CommandBuilder::default()
.args(sudo_args)
.args(["nix-env", "--profile", SYSTEM_PROFILE, "--set"])
.args([out_path.get_path()])
.build()?
.exec()?;
// !! Use the base profile aka no spec-namespace
let switch_to_configuration = out_path
.get_path()
.join("bin")
.join("switch-to-configuration");
let switch_to_configuration = switch_to_configuration.to_str().unwrap();
commands::CommandBuilder::default()
.args(sudo_args)
.args([switch_to_configuration, "boot"])
.message("Adding configuration to bootloader")
.build()?
.exec()?;
}
// Make sure out_path is not accidentally dropped
// https://docs.rs/tempfile/3.12.0/tempfile/index.html#early-drop-pitfall
drop(out_path);
Ok(())
}
}