2017-10-05 21:38:46 +02:00
|
|
|
|
{ pkgs, config, lib, ... }:
|
|
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
|
|
cfg = config.home.file;
|
2017-11-06 10:28:42 +01:00
|
|
|
|
|
2017-10-06 00:19:03 +02:00
|
|
|
|
homeDirectory = config.home.homeDirectory;
|
2017-10-05 21:38:46 +02:00
|
|
|
|
|
2017-11-06 10:28:54 +01:00
|
|
|
|
fileType = (import lib/file-type.nix {
|
|
|
|
|
inherit homeDirectory lib pkgs;
|
|
|
|
|
}).fileType;
|
2017-11-06 10:28:42 +01:00
|
|
|
|
|
2019-01-16 02:14:14 +01:00
|
|
|
|
sourceStorePath = file:
|
|
|
|
|
let
|
|
|
|
|
sourcePath = toString file.source;
|
|
|
|
|
sourceName = config.lib.strings.storeFileName (baseNameOf sourcePath);
|
|
|
|
|
in
|
|
|
|
|
if builtins.hasContext sourcePath
|
|
|
|
|
then file.source
|
|
|
|
|
else builtins.path { path = file.source; name = sourceName; };
|
|
|
|
|
|
2017-10-05 21:38:46 +02:00
|
|
|
|
in
|
|
|
|
|
|
|
|
|
|
{
|
|
|
|
|
options = {
|
|
|
|
|
home.file = mkOption {
|
|
|
|
|
description = "Attribute set of files to link into the user home.";
|
|
|
|
|
default = {};
|
2017-11-06 10:28:54 +01:00
|
|
|
|
type = fileType "<envar>HOME</envar>" homeDirectory;
|
2017-10-05 21:38:46 +02:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
home-files = mkOption {
|
|
|
|
|
type = types.package;
|
|
|
|
|
internal = true;
|
|
|
|
|
description = "Package to contain all home files";
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
config = {
|
2021-06-27 16:42:45 +02:00
|
|
|
|
assertions = [(
|
|
|
|
|
let
|
|
|
|
|
dups =
|
|
|
|
|
attrNames
|
|
|
|
|
(filterAttrs (n: v: v > 1)
|
|
|
|
|
(foldAttrs (acc: v: acc + v) 0
|
|
|
|
|
(mapAttrsToList (n: v: { ${v.target} = 1; }) cfg)));
|
|
|
|
|
dupsStr = concatStringsSep ", " dups;
|
|
|
|
|
in {
|
|
|
|
|
assertion = dups == [];
|
|
|
|
|
message = ''
|
|
|
|
|
Conflicting managed target files: ${dupsStr}
|
|
|
|
|
|
|
|
|
|
This may happen, for example, if you have a configuration similar to
|
|
|
|
|
|
|
|
|
|
home.file = {
|
|
|
|
|
conflict1 = { source = ./foo.nix; target = "baz"; };
|
|
|
|
|
conflict2 = { source = ./bar.nix; target = "baz"; };
|
|
|
|
|
}'';
|
|
|
|
|
})
|
|
|
|
|
];
|
|
|
|
|
|
2020-05-02 01:06:41 +02:00
|
|
|
|
lib.file.mkOutOfStoreSymlink = path:
|
|
|
|
|
let
|
|
|
|
|
pathStr = toString path;
|
|
|
|
|
name = hm.strings.storeFileName (baseNameOf pathStr);
|
|
|
|
|
in
|
|
|
|
|
pkgs.runCommandLocal name {} ''ln -s ${escapeShellArg pathStr} $out'';
|
|
|
|
|
|
2017-10-05 21:38:46 +02:00
|
|
|
|
# This verifies that the links we are about to create will not
|
|
|
|
|
# overwrite an existing file.
|
2020-01-16 23:41:14 +01:00
|
|
|
|
home.activation.checkLinkTargets = hm.dag.entryBefore ["writeBoundary"] (
|
2017-10-05 21:38:46 +02:00
|
|
|
|
let
|
2020-03-17 22:27:29 +01:00
|
|
|
|
# Paths that should be forcibly overwritten by Home Manager.
|
|
|
|
|
# Caveat emptor!
|
|
|
|
|
forcedPaths =
|
2019-10-29 03:29:12 +01:00
|
|
|
|
concatMapStringsSep " " (p: ''"$HOME"/${escapeShellArg p}'')
|
2020-03-17 22:27:29 +01:00
|
|
|
|
(mapAttrsToList (n: v: v.target)
|
|
|
|
|
(filterAttrs (n: v: v.force) cfg));
|
|
|
|
|
|
2017-10-05 21:38:46 +02:00
|
|
|
|
check = pkgs.writeText "check" ''
|
2021-04-30 01:29:39 +02:00
|
|
|
|
${config.lib.bash.initHomeManagerLib}
|
2017-10-05 21:38:46 +02:00
|
|
|
|
|
2019-11-25 10:54:27 +01:00
|
|
|
|
# A symbolic link whose target path matches this pattern will be
|
|
|
|
|
# considered part of a Home Manager generation.
|
2019-10-29 03:29:12 +01:00
|
|
|
|
homeFilePattern="$(readlink -e ${escapeShellArg builtins.storeDir})/*-home-manager-files/*"
|
2019-11-25 10:54:27 +01:00
|
|
|
|
|
2020-03-17 22:27:29 +01:00
|
|
|
|
forcedPaths=(${forcedPaths})
|
|
|
|
|
|
2017-10-05 21:38:46 +02:00
|
|
|
|
newGenFiles="$1"
|
|
|
|
|
shift
|
|
|
|
|
for sourcePath in "$@" ; do
|
|
|
|
|
relativePath="''${sourcePath#$newGenFiles/}"
|
|
|
|
|
targetPath="$HOME/$relativePath"
|
2020-03-17 22:27:29 +01:00
|
|
|
|
|
|
|
|
|
forced=""
|
|
|
|
|
for forcedPath in "''${forcedPaths[@]}"; do
|
|
|
|
|
if [[ $targetPath == $forcedPath* ]]; then
|
|
|
|
|
forced="yeah"
|
|
|
|
|
break
|
|
|
|
|
fi
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
if [[ -n $forced ]]; then
|
|
|
|
|
$VERBOSE_ECHO "Skipping collision check for $targetPath"
|
|
|
|
|
elif [[ -e "$targetPath" \
|
2019-11-25 10:54:27 +01:00
|
|
|
|
&& ! "$(readlink "$targetPath")" == $homeFilePattern ]] ; then
|
2020-05-19 14:44:44 +02:00
|
|
|
|
# The target file already exists and it isn't a symlink owned by Home Manager.
|
2021-10-30 09:30:41 +02:00
|
|
|
|
if cmp -s "$sourcePath" "$targetPath"; then
|
2020-05-19 14:44:44 +02:00
|
|
|
|
# First compare the files' content. If they're equal, we're fine.
|
|
|
|
|
warnEcho "Existing file '$targetPath' is in the way of '$sourcePath', will be skipped since they are the same"
|
|
|
|
|
elif [[ ! -L "$targetPath" && -n "$HOME_MANAGER_BACKUP_EXT" ]] ; then
|
|
|
|
|
# Next, try to move the file to a backup location if configured and possible
|
2019-04-17 21:15:38 +02:00
|
|
|
|
backup="$targetPath.$HOME_MANAGER_BACKUP_EXT"
|
|
|
|
|
if [[ -e "$backup" ]]; then
|
|
|
|
|
errorEcho "Existing file '$backup' would be clobbered by backing up '$targetPath'"
|
|
|
|
|
collision=1
|
|
|
|
|
else
|
2020-05-14 16:02:31 +02:00
|
|
|
|
warnEcho "Existing file '$targetPath' is in the way of '$sourcePath', will be moved to '$backup'"
|
2019-04-17 21:15:38 +02:00
|
|
|
|
fi
|
|
|
|
|
else
|
2020-05-19 14:44:44 +02:00
|
|
|
|
# Fail if nothing else works
|
2020-05-14 16:02:31 +02:00
|
|
|
|
errorEcho "Existing file '$targetPath' is in the way of '$sourcePath'"
|
2019-04-17 21:15:38 +02:00
|
|
|
|
collision=1
|
|
|
|
|
fi
|
2017-10-05 21:38:46 +02:00
|
|
|
|
fi
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
if [[ -v collision ]] ; then
|
2021-08-22 01:28:02 +02:00
|
|
|
|
errorEcho "Please move the above files and try again or use 'home-manager switch -b backup' to back up existing files automatically."
|
2017-10-05 21:38:46 +02:00
|
|
|
|
exit 1
|
|
|
|
|
fi
|
|
|
|
|
'';
|
|
|
|
|
in
|
|
|
|
|
''
|
|
|
|
|
function checkNewGenCollision() {
|
|
|
|
|
local newGenFiles
|
|
|
|
|
newGenFiles="$(readlink -e "$newGenPath/home-files")"
|
2019-04-30 14:52:44 +02:00
|
|
|
|
find "$newGenFiles" \( -type f -or -type l \) \
|
2019-04-27 13:48:57 +02:00
|
|
|
|
-exec bash ${check} "$newGenFiles" {} +
|
2017-10-05 21:38:46 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
checkNewGenCollision || exit 1
|
|
|
|
|
''
|
|
|
|
|
);
|
|
|
|
|
|
2017-11-15 18:12:40 +01:00
|
|
|
|
# This activation script will
|
|
|
|
|
#
|
|
|
|
|
# 1. Remove files from the old generation that are not in the new
|
|
|
|
|
# generation.
|
|
|
|
|
#
|
|
|
|
|
# 2. Switch over the Home Manager gcroot and current profile
|
|
|
|
|
# links.
|
|
|
|
|
#
|
|
|
|
|
# 3. Symlink files from the new generation into $HOME.
|
|
|
|
|
#
|
|
|
|
|
# This order is needed to ensure that we always know which links
|
|
|
|
|
# belong to which generation. Specifically, if we're moving from
|
|
|
|
|
# generation A to generation B having sets of home file links FA
|
|
|
|
|
# and FB, respectively then cleaning before linking produces state
|
|
|
|
|
# transitions similar to
|
|
|
|
|
#
|
|
|
|
|
# FA → FA ∩ FB → (FA ∩ FB) ∪ FB = FB
|
|
|
|
|
#
|
|
|
|
|
# and a failure during the intermediate state FA ∩ FB will not
|
|
|
|
|
# result in lost links because this set of links are in both the
|
|
|
|
|
# source and target generation.
|
2020-01-16 23:41:14 +01:00
|
|
|
|
home.activation.linkGeneration = hm.dag.entryAfter ["writeBoundary"] (
|
2017-10-05 21:38:46 +02:00
|
|
|
|
let
|
2021-06-27 23:31:20 +02:00
|
|
|
|
link = pkgs.writeShellScript "link" ''
|
2017-10-05 21:38:46 +02:00
|
|
|
|
newGenFiles="$1"
|
|
|
|
|
shift
|
|
|
|
|
for sourcePath in "$@" ; do
|
|
|
|
|
relativePath="''${sourcePath#$newGenFiles/}"
|
|
|
|
|
targetPath="$HOME/$relativePath"
|
2019-04-17 21:15:38 +02:00
|
|
|
|
if [[ -e "$targetPath" && ! -L "$targetPath" && -n "$HOME_MANAGER_BACKUP_EXT" ]] ; then
|
2020-05-19 14:44:44 +02:00
|
|
|
|
# The target exists, back it up
|
2019-04-17 21:15:38 +02:00
|
|
|
|
backup="$targetPath.$HOME_MANAGER_BACKUP_EXT"
|
|
|
|
|
$DRY_RUN_CMD mv $VERBOSE_ARG "$targetPath" "$backup" || errorEcho "Moving '$targetPath' failed!"
|
|
|
|
|
fi
|
2020-05-19 14:44:44 +02:00
|
|
|
|
|
2021-10-30 09:30:41 +02:00
|
|
|
|
if [[ -e "$targetPath" && ! -L "$targetPath" ]] && cmp -s "$sourcePath" "$targetPath" ; then
|
2020-05-19 14:44:44 +02:00
|
|
|
|
# The target exists but is identical – don't do anything.
|
|
|
|
|
$VERBOSE_ECHO "Skipping '$targetPath' as it is identical to '$sourcePath'"
|
|
|
|
|
else
|
|
|
|
|
# Place that symlink, --force
|
2023-01-09 13:00:21 +01:00
|
|
|
|
# This can still fail if the target is a directory, in which case we bail out.
|
2020-05-19 14:44:44 +02:00
|
|
|
|
$DRY_RUN_CMD mkdir -p $VERBOSE_ARG "$(dirname "$targetPath")"
|
2023-01-09 13:00:21 +01:00
|
|
|
|
$DRY_RUN_CMD ln -Tsf $VERBOSE_ARG "$sourcePath" "$targetPath" || exit 1
|
2020-05-19 14:44:44 +02:00
|
|
|
|
fi
|
2017-10-05 21:38:46 +02:00
|
|
|
|
done
|
|
|
|
|
'';
|
|
|
|
|
|
2021-06-27 23:31:20 +02:00
|
|
|
|
cleanup = pkgs.writeShellScript "cleanup" ''
|
2021-04-30 01:29:39 +02:00
|
|
|
|
${config.lib.bash.initHomeManagerLib}
|
2017-10-05 21:38:46 +02:00
|
|
|
|
|
2019-11-25 10:54:27 +01:00
|
|
|
|
# A symbolic link whose target path matches this pattern will be
|
|
|
|
|
# considered part of a Home Manager generation.
|
2019-10-29 03:29:12 +01:00
|
|
|
|
homeFilePattern="$(readlink -e ${escapeShellArg builtins.storeDir})/*-home-manager-files/*"
|
2019-11-25 10:54:27 +01:00
|
|
|
|
|
2017-10-05 21:38:46 +02:00
|
|
|
|
newGenFiles="$1"
|
2017-11-11 14:16:45 +01:00
|
|
|
|
shift 1
|
|
|
|
|
for relativePath in "$@" ; do
|
2017-10-05 21:38:46 +02:00
|
|
|
|
targetPath="$HOME/$relativePath"
|
|
|
|
|
if [[ -e "$newGenFiles/$relativePath" ]] ; then
|
|
|
|
|
$VERBOSE_ECHO "Checking $targetPath: exists"
|
2019-11-25 10:54:27 +01:00
|
|
|
|
elif [[ ! "$(readlink "$targetPath")" == $homeFilePattern ]] ; then
|
2020-05-17 03:35:05 +02:00
|
|
|
|
warnEcho "Path '$targetPath' does not link into a Home Manager generation. Skipping delete."
|
2017-10-05 21:38:46 +02:00
|
|
|
|
else
|
|
|
|
|
$VERBOSE_ECHO "Checking $targetPath: gone (deleting)"
|
|
|
|
|
$DRY_RUN_CMD rm $VERBOSE_ARG "$targetPath"
|
|
|
|
|
|
|
|
|
|
# Recursively delete empty parent directories.
|
|
|
|
|
targetDir="$(dirname "$relativePath")"
|
|
|
|
|
if [[ "$targetDir" != "." ]] ; then
|
|
|
|
|
pushd "$HOME" > /dev/null
|
|
|
|
|
|
|
|
|
|
# Call rmdir with a relative path excluding $HOME.
|
|
|
|
|
# Otherwise, it might try to delete $HOME and exit
|
|
|
|
|
# with a permission error.
|
|
|
|
|
$DRY_RUN_CMD rmdir $VERBOSE_ARG \
|
|
|
|
|
-p --ignore-fail-on-non-empty \
|
|
|
|
|
"$targetDir"
|
|
|
|
|
|
|
|
|
|
popd > /dev/null
|
|
|
|
|
fi
|
|
|
|
|
fi
|
|
|
|
|
done
|
|
|
|
|
'';
|
|
|
|
|
in
|
|
|
|
|
''
|
|
|
|
|
function linkNewGen() {
|
2021-04-30 01:29:39 +02:00
|
|
|
|
_i "Creating home file links in %s" "$HOME"
|
2017-11-15 18:31:04 +01:00
|
|
|
|
|
2017-10-05 21:38:46 +02:00
|
|
|
|
local newGenFiles
|
|
|
|
|
newGenFiles="$(readlink -e "$newGenPath/home-files")"
|
2019-04-30 14:52:44 +02:00
|
|
|
|
find "$newGenFiles" \( -type f -or -type l \) \
|
2019-04-27 13:48:57 +02:00
|
|
|
|
-exec bash ${link} "$newGenFiles" {} +
|
2017-10-05 21:38:46 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
function cleanOldGen() {
|
2022-03-26 15:04:19 +01:00
|
|
|
|
if [[ ! -v oldGenPath || ! -e "$oldGenPath/home-files" ]] ; then
|
2017-10-05 21:38:46 +02:00
|
|
|
|
return
|
|
|
|
|
fi
|
|
|
|
|
|
2021-04-30 01:29:39 +02:00
|
|
|
|
_i "Cleaning up orphan links from %s" "$HOME"
|
2017-10-05 21:38:46 +02:00
|
|
|
|
|
|
|
|
|
local newGenFiles oldGenFiles
|
|
|
|
|
newGenFiles="$(readlink -e "$newGenPath/home-files")"
|
|
|
|
|
oldGenFiles="$(readlink -e "$oldGenPath/home-files")"
|
2017-11-11 14:16:45 +01:00
|
|
|
|
|
|
|
|
|
# Apply the cleanup script on each leaf in the old
|
|
|
|
|
# generation. The find command below will print the
|
|
|
|
|
# relative path of the entry.
|
|
|
|
|
find "$oldGenFiles" '(' -type f -or -type l ')' -printf '%P\0' \
|
|
|
|
|
| xargs -0 bash ${cleanup} "$newGenFiles"
|
2017-10-05 21:38:46 +02:00
|
|
|
|
}
|
|
|
|
|
|
2017-11-15 18:12:40 +01:00
|
|
|
|
cleanOldGen
|
|
|
|
|
|
2017-10-05 21:38:46 +02:00
|
|
|
|
if [[ ! -v oldGenPath || "$oldGenPath" != "$newGenPath" ]] ; then
|
2021-11-10 19:23:33 +01:00
|
|
|
|
_i "Creating profile generation %s" $newGenNum
|
|
|
|
|
if [[ -e "$genProfilePath"/manifest.json ]] ; then
|
|
|
|
|
# Remove all packages from "$genProfilePath"
|
|
|
|
|
# `nix profile remove '.*' --profile "$genProfilePath"` was not working, so here is a workaround:
|
|
|
|
|
nix profile list --profile "$genProfilePath" \
|
|
|
|
|
| cut -d ' ' -f 4 \
|
|
|
|
|
| xargs -t $DRY_RUN_CMD nix profile remove $VERBOSE_ARG --profile "$genProfilePath"
|
|
|
|
|
$DRY_RUN_CMD nix profile install $VERBOSE_ARG --profile "$genProfilePath" "$newGenPath"
|
|
|
|
|
else
|
|
|
|
|
$DRY_RUN_CMD nix-env $VERBOSE_ARG --profile "$genProfilePath" --set "$newGenPath"
|
|
|
|
|
fi
|
|
|
|
|
|
2017-10-05 21:38:46 +02:00
|
|
|
|
$DRY_RUN_CMD ln -Tsf $VERBOSE_ARG "$newGenPath" "$newGenGcPath"
|
|
|
|
|
else
|
2021-04-30 01:29:39 +02:00
|
|
|
|
_i "No change so reusing latest profile generation %s" "$oldGenNum"
|
2017-10-05 21:38:46 +02:00
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
linkNewGen
|
|
|
|
|
''
|
|
|
|
|
);
|
|
|
|
|
|
2020-01-16 23:41:14 +01:00
|
|
|
|
home.activation.checkFilesChanged = hm.dag.entryBefore ["linkGeneration"] (
|
2021-06-27 23:31:20 +02:00
|
|
|
|
let
|
|
|
|
|
homeDirArg = escapeShellArg homeDirectory;
|
|
|
|
|
in ''
|
2021-05-20 22:12:45 +02:00
|
|
|
|
function _cmp() {
|
|
|
|
|
if [[ -d $1 && -d $2 ]]; then
|
|
|
|
|
diff -rq "$1" "$2" &> /dev/null
|
|
|
|
|
else
|
|
|
|
|
cmp --quiet "$1" "$2"
|
|
|
|
|
fi
|
|
|
|
|
}
|
2018-02-17 00:32:29 +01:00
|
|
|
|
declare -A changedFiles
|
2021-06-27 23:31:20 +02:00
|
|
|
|
'' + concatMapStrings (v:
|
|
|
|
|
let
|
|
|
|
|
sourceArg = escapeShellArg (sourceStorePath v);
|
|
|
|
|
targetArg = escapeShellArg v.target;
|
|
|
|
|
in ''
|
|
|
|
|
_cmp ${sourceArg} ${homeDirArg}/${targetArg} \
|
|
|
|
|
&& changedFiles[${targetArg}]=0 \
|
|
|
|
|
|| changedFiles[${targetArg}]=1
|
|
|
|
|
'') (filter (v: v.onChange != "") (attrValues cfg))
|
2021-05-20 22:12:45 +02:00
|
|
|
|
+ ''
|
|
|
|
|
unset -f _cmp
|
|
|
|
|
''
|
2018-02-17 00:32:29 +01:00
|
|
|
|
);
|
|
|
|
|
|
2020-01-16 23:41:14 +01:00
|
|
|
|
home.activation.onFilesChange = hm.dag.entryAfter ["linkGeneration"] (
|
2018-02-17 00:32:29 +01:00
|
|
|
|
concatMapStrings (v: ''
|
2021-08-01 00:54:47 +02:00
|
|
|
|
if (( ''${changedFiles[${escapeShellArg v.target}]} == 1 )); then
|
|
|
|
|
if [[ -v DRY_RUN || -v VERBOSE ]]; then
|
|
|
|
|
echo "Running onChange hook for" ${escapeShellArg v.target}
|
|
|
|
|
fi
|
|
|
|
|
if [[ ! -v DRY_RUN ]]; then
|
|
|
|
|
${v.onChange}
|
|
|
|
|
fi
|
2018-02-17 00:32:29 +01:00
|
|
|
|
fi
|
|
|
|
|
'') (filter (v: v.onChange != "") (attrValues cfg))
|
|
|
|
|
);
|
|
|
|
|
|
2019-03-18 01:25:14 +01:00
|
|
|
|
# Symlink directories and files that have the right execute bit.
|
|
|
|
|
# Copy files that need their execute bit changed.
|
2021-06-27 23:31:20 +02:00
|
|
|
|
home-files = pkgs.runCommandLocal
|
2019-03-18 01:25:14 +01:00
|
|
|
|
"home-manager-files"
|
|
|
|
|
{
|
2020-06-05 07:26:03 +02:00
|
|
|
|
nativeBuildInputs = [ pkgs.xorg.lndir ];
|
2019-03-18 01:25:14 +01:00
|
|
|
|
}
|
|
|
|
|
(''
|
2017-11-06 10:28:50 +01:00
|
|
|
|
mkdir -p $out
|
|
|
|
|
|
2019-11-22 10:54:29 +01:00
|
|
|
|
# Needed in case /nix is a symbolic link.
|
|
|
|
|
realOut="$(realpath -m "$out")"
|
|
|
|
|
|
2017-11-06 10:28:50 +01:00
|
|
|
|
function insertFile() {
|
|
|
|
|
local source="$1"
|
|
|
|
|
local relTarget="$2"
|
|
|
|
|
local executable="$3"
|
2017-12-11 15:14:45 +01:00
|
|
|
|
local recursive="$4"
|
2017-11-06 10:28:50 +01:00
|
|
|
|
|
2021-06-27 16:42:45 +02:00
|
|
|
|
# If the target already exists then we have a collision. Note, this
|
|
|
|
|
# should not happen due to the assertion found in the 'files' module.
|
|
|
|
|
# We therefore simply log the conflict and otherwise ignore it, mainly
|
|
|
|
|
# to make the `files-target-config` test work as expected.
|
|
|
|
|
if [[ -e "$realOut/$relTarget" ]]; then
|
|
|
|
|
echo "File conflict for file '$relTarget'" >&2
|
|
|
|
|
return
|
|
|
|
|
fi
|
|
|
|
|
|
2017-11-06 10:28:50 +01:00
|
|
|
|
# Figure out the real absolute path to the target.
|
|
|
|
|
local target
|
2019-11-22 10:54:29 +01:00
|
|
|
|
target="$(realpath -m "$realOut/$relTarget")"
|
2017-11-06 10:28:50 +01:00
|
|
|
|
|
|
|
|
|
# Target path must be within $HOME.
|
2019-11-22 10:54:29 +01:00
|
|
|
|
if [[ ! $target == $realOut* ]] ; then
|
2017-11-06 10:28:50 +01:00
|
|
|
|
echo "Error installing file '$relTarget' outside \$HOME" >&2
|
|
|
|
|
exit 1
|
|
|
|
|
fi
|
2017-10-05 21:38:46 +02:00
|
|
|
|
|
2017-11-06 10:28:50 +01:00
|
|
|
|
mkdir -p "$(dirname "$target")"
|
|
|
|
|
if [[ -d $source ]]; then
|
2017-11-06 18:00:25 +01:00
|
|
|
|
if [[ $recursive ]]; then
|
|
|
|
|
mkdir -p "$target"
|
|
|
|
|
lndir -silent "$source" "$target"
|
|
|
|
|
else
|
|
|
|
|
ln -s "$source" "$target"
|
|
|
|
|
fi
|
2017-11-06 10:28:50 +01:00
|
|
|
|
else
|
|
|
|
|
[[ -x $source ]] && isExecutable=1 || isExecutable=""
|
2017-11-12 00:49:36 +01:00
|
|
|
|
|
|
|
|
|
# Link the file into the home file directory if possible,
|
|
|
|
|
# i.e., if the executable bit of the source is the same we
|
|
|
|
|
# expect for the target. Otherwise, we copy the file and
|
|
|
|
|
# set the executable bit to the expected value.
|
2017-12-02 22:52:35 +01:00
|
|
|
|
if [[ $executable == inherit || $isExecutable == $executable ]]; then
|
2017-11-06 10:28:50 +01:00
|
|
|
|
ln -s "$source" "$target"
|
|
|
|
|
else
|
|
|
|
|
cp "$source" "$target"
|
2017-11-12 00:49:36 +01:00
|
|
|
|
|
|
|
|
|
if [[ $executable == inherit ]]; then
|
|
|
|
|
# Don't change file mode if it should match the source.
|
|
|
|
|
:
|
|
|
|
|
elif [[ $executable ]]; then
|
2017-11-06 10:28:50 +01:00
|
|
|
|
chmod +x "$target"
|
2017-10-05 21:38:46 +02:00
|
|
|
|
else
|
2017-11-06 10:28:50 +01:00
|
|
|
|
chmod -x "$target"
|
2017-10-05 21:38:46 +02:00
|
|
|
|
fi
|
2017-11-06 10:28:50 +01:00
|
|
|
|
fi
|
|
|
|
|
fi
|
|
|
|
|
}
|
|
|
|
|
'' + concatStrings (
|
|
|
|
|
mapAttrsToList (n: v: ''
|
2020-08-29 18:22:03 +02:00
|
|
|
|
insertFile ${
|
|
|
|
|
escapeShellArgs [
|
|
|
|
|
(sourceStorePath v)
|
|
|
|
|
v.target
|
|
|
|
|
(if v.executable == null
|
|
|
|
|
then "inherit"
|
|
|
|
|
else toString v.executable)
|
|
|
|
|
(toString v.recursive)
|
|
|
|
|
]}
|
2017-11-06 10:28:50 +01:00
|
|
|
|
'') cfg
|
2019-03-18 01:25:14 +01:00
|
|
|
|
));
|
2017-10-05 21:38:46 +02:00
|
|
|
|
};
|
|
|
|
|
}
|