nixpkgs/nixos/modules/services/hardware/udisks2.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

100 lines
3.2 KiB
Nix
Raw Normal View History

# Udisks daemon.
{ config, lib, pkgs, ... }:
2022-04-03 06:22:08 +00:00
let
2022-01-01 19:37:02 +00:00
cfg = config.services.udisks2;
2022-04-03 06:22:08 +00:00
settingsFormat = pkgs.formats.ini {
listToValue = lib.concatMapStringsSep "," (lib.generators.mkValueStringDefault {});
2022-04-03 06:22:08 +00:00
};
configFiles = lib.mapAttrs (name: value: (settingsFormat.generate name value)) (lib.mapAttrs' (name: value: lib.nameValuePair name value ) config.services.udisks2.settings);
2022-04-03 06:22:08 +00:00
in
{
###### interface
options = {
services.udisks2 = {
enable = lib.mkEnableOption "udisks2, a DBus service that allows applications to query and manipulate storage devices";
2022-01-01 19:37:02 +00:00
mountOnMedia = lib.mkOption {
type = lib.types.bool;
2022-01-01 19:37:02 +00:00
default = false;
description = ''
When enabled, instructs udisks2 to mount removable drives under `/media/` directory, instead of the
default, ACL-controlled `/run/media/$USER/`. Since `/media/` is not mounted as tmpfs by default, it
requires cleanup to get rid of stale mountpoints; enabling this option will take care of this at boot.
'';
};
settings = lib.mkOption rec {
type = lib.types.attrsOf settingsFormat.type;
apply = lib.recursiveUpdate default;
2022-04-03 06:22:08 +00:00
default = {
"udisks2.conf" = {
udisks2 = {
modules = [ "*" ];
modules_load_preference = "ondemand";
};
defaults = {
encryption = "luks2";
};
};
};
example = lib.literalExpression ''
2022-04-03 06:22:08 +00:00
{
"WDC-WD10EZEX-60M2NA0-WD-WCC3F3SJ0698.conf" = {
ATA = {
StandbyTimeout = 50;
};
};
};
'';
2022-01-01 19:37:02 +00:00
description = ''
2022-04-03 06:22:08 +00:00
Options passed to udisksd.
See [here](http://manpages.ubuntu.com/manpages/latest/en/man5/udisks2.conf.5.html) and
drive configuration in [here](http://manpages.ubuntu.com/manpages/latest/en/man8/udisks.8.html) for supported options.
'';
};
};
};
###### implementation
config = lib.mkIf config.services.udisks2.enable {
environment.systemPackages = [ pkgs.udisks2 ];
environment.etc = (lib.mapAttrs' (name: value: lib.nameValuePair "udisks2/${name}" { source = value; } ) configFiles) // (
let
libblockdev = pkgs.udisks2.libblockdev;
majorVer = lib.versions.major libblockdev.version;
in {
# We need to make sure /etc/libblockdev/@major_ver@/conf.d is populated to avoid
# warnings
"libblockdev/${majorVer}/conf.d/00-default.cfg".source = "${libblockdev}/etc/libblockdev/${majorVer}/conf.d/00-default.cfg";
"libblockdev/${majorVer}/conf.d/10-lvm-dbus.cfg".source = "${libblockdev}/etc/libblockdev/${majorVer}/conf.d/10-lvm-dbus.cfg";
});
2022-04-03 06:22:08 +00:00
2022-03-02 16:38:36 +00:00
security.polkit.enable = true;
services.dbus.packages = [ pkgs.udisks2 ];
2022-01-01 19:37:02 +00:00
systemd.tmpfiles.rules = [ "d /var/lib/udisks2 0755 root root -" ]
++ lib.optional cfg.mountOnMedia "D! /media 0755 root root -";
services.udev.packages = [ pkgs.udisks2 ];
services.udev.extraRules = lib.optionalString cfg.mountOnMedia ''
2022-01-01 19:37:02 +00:00
ENV{ID_FS_USAGE}=="filesystem", ENV{UDISKS_FILESYSTEM_SHARED}="1"
'';
systemd.packages = [ pkgs.udisks2 ];
};
}