aboutsummaryrefslogtreecommitdiff
path: root/gnu/build
ModeNameSize
-rw-r--r--activation.scm15913logplainabout
-rw-r--r--file-systems.scm10765logplainabout
-rw-r--r--install.scm8033logplainabout
-rw-r--r--linux-boot.scm15933logplainabout
-rw-r--r--linux-initrd.scm5275logplainabout
-rw-r--r--linux-modules.scm5843logplainabout
-rw-r--r--vm.scm9461logplainabout
ow I/O. (limit (@ (name "auth_timeout")) "300000") (servicehelper "/run/privileged/bin/dbus-daemon-launch-helper") ;; First, the '.service' files of services subject to activation. ;; We use a fixed location under /etc because the setuid helper ;; looks for them in that location and nowhere else. See ;; <https://bugs.freedesktop.org/show_bug.cgi?id=92458>. (servicedir "/etc/dbus-1/system-services") ,@(append-map (lambda (dir) (directives (includedir (string-append dir "/etc/dbus-1/system.d")) (includedir (string-append dir "/share/dbus-1/system.d")) (servicedir ;for '.service' files (string-append dir "/share/dbus-1/services")))) services))) (mkdir #$output) ;; Provide /etc/dbus-1/system-services, which is where the setuid ;; helper looks for system service files. (symlink #$(system-service-directory services) (string-append #$output "/system-services")) ;; 'system-local.conf' is automatically included by the default ;; 'system.conf', so this is where we stuff our own things. (call-with-output-file (string-append #$output "/system-local.conf") (lambda (port) (sxml->xml (services->sxml (list #$@services)) port))))) (computed-file "dbus-configuration" build)) (define (dbus-etc-files config) "Return a list of FILES for @var{etc-service-type} to build the @code{/etc/dbus-1} directory." (list `("dbus-1" ,(dbus-configuration-directory (dbus-configuration-services config))))) (define %dbus-accounts ;; Accounts used by the system bus. (list (user-group (name "messagebus") (system? #t)) (user-account (name "messagebus") (group "messagebus") (system? #t) (comment "D-Bus system bus user") (home-directory "/run/dbus") (shell (file-append shadow "/sbin/nologin"))))) (define dbus-setuid-programs ;; Return a list of <setuid-program> for the program that we need. (match-lambda (($ <dbus-configuration> dbus services) (list (setuid-program (program (file-append dbus "/libexec/dbus-daemon-launch-helper"))))))) (define (dbus-activation config) "Return an activation gexp for D-Bus using @var{config}." (with-imported-modules (source-module-closure '((gnu build activation) (guix build utils))) #~(begin (use-modules (gnu build activation) (guix build utils)) (let ((user (getpwnam "messagebus"))) ;; This directory contains the daemon's socket so it must be ;; world-readable. (mkdir-p/perms "/run/dbus" user #o755)) (catch 'system-error (lambda () (symlink "/run/dbus" "/var/run/dbus")) (lambda args (let ((errno (system-error-errno args))) (cond ((= errno EEXIST) (let ((existing-name (false-if-exception (readlink "/var/run/dbus")))) (unless (equal? existing-name "/run/dbus") ;; Move the content of /var/run/dbus to /run/dbus, and ;; retry. (let ((dir (opendir "/var/run/dbus"))) (let loop ((next (readdir dir))) (cond ((eof-object? next) (closedir dir)) ((member next '("." "..")) (loop (readdir dir))) (else (begin (rename-file (string-append "/var/run/dbus/" next) (string-append "/run/dbus/" next)) (loop (readdir dir))))))) (rmdir "/var/run/dbus") (symlink "/run/dbus" "/var/run/dbus")))) (else (format (current-error-port) "Failed to symlink /run/dbus to /var/run/dbus: ~s~%" (strerror errno)) (error "cannot create /var/run/dbus")))))) (unless (file-exists? "/etc/machine-id") (format #t "creating /etc/machine-id...~%") (invoke (string-append #$(dbus-configuration-dbus config) "/bin/dbus-uuidgen") "--ensure=/etc/machine-id"))))) (define dbus-shepherd-service (match-lambda (($ <dbus-configuration> dbus _ verbose?) (list (shepherd-service (documentation "Run the D-Bus system daemon.") (provision '(dbus-system)) (requirement '(user-processes syslogd)) (start #~(make-forkexec-constructor (list (string-append #$dbus "/bin/dbus-daemon") "--nofork" "--system") #:log-file "/var/log/dbus-daemon.log" #$@(if verbose? ;; Since the verbose output goes to the console, ;; not syslog, add a log file to capture it. '(#:environment-variables '("DBUS_VERBOSE=1")) '()) #:pid-file "/run/dbus/pid")) (stop #~(make-kill-destructor))))))) (define dbus-root-service-type (service-type (name 'dbus) (extensions (list (service-extension shepherd-root-service-type dbus-shepherd-service) (service-extension activation-service-type dbus-activation) (service-extension etc-service-type dbus-etc-files) (service-extension account-service-type (const %dbus-accounts)) (service-extension setuid-program-service-type dbus-setuid-programs))) ;; Extensions consist of lists of packages (representing D-Bus ;; services) that we just concatenate. (compose concatenate) ;; The service's parameters field is extended by augmenting ;; its <dbus-configuration> 'services' field. (extend (lambda (config services) (dbus-configuration (inherit config) (services (append (dbus-configuration-services config) services))))) (default-value (dbus-configuration)) (description "Run the system-wide D-Bus inter-process message bus. It allows programs and daemons to communicate and is also responsible for spawning (@dfn{activating}) D-Bus services on demand."))) (define-deprecated (dbus-service #:key (dbus dbus) (services '()) verbose?) dbus-root-service-type "Return a service that runs the \"system bus\", using @var{dbus}, with support for @var{services}. When @var{verbose?} is true, it causes the @samp{DBUS_VERBOSE} environment variable to be set to @samp{1}; a verbose-enabled D-Bus package such as @code{dbus-verbose} should be provided as @var{dbus} in this scenario. @uref{http://dbus.freedesktop.org/, D-Bus} is an inter-process communication facility. Its system bus is used to allow system services to communicate and be notified of system-wide events. @var{services} must be a list of packages that provide an @file{etc/dbus-1/system.d} directory containing additional D-Bus configuration and policy files. For example, to allow avahi-daemon to use the system bus, @var{services} must be equal to @code{(list avahi)}." (service dbus-root-service-type (dbus-configuration (dbus dbus) (services services) (verbose? verbose?)))) (define (wrapped-dbus-service service program variables) "Return a wrapper for @var{service}, a package containing a D-Bus service, where @var{program} is wrapped such that @var{variables}, a list of name/value tuples, are all set as environment variables when the bus daemon launches it." (define wrapper (program-file (string-append (package-name service) "-program-wrapper") #~(begin (use-modules (ice-9 match)) (for-each (match-lambda ((variable value) (setenv variable value))) '#$variables) (apply execl (string-append #$service "/" #$program) (string-append #$service "/" #$program) (cdr (command-line)))))) (define build (with-imported-modules '((guix build utils)) #~(begin (use-modules (guix build utils)) (define service-directory "/share/dbus-1/system-services") (mkdir-p (dirname (string-append #$output service-directory))) (copy-recursively (string-append #$service service-directory) (string-append #$output service-directory)) (symlink (string-append #$service "/etc") ;for etc/dbus-1 (string-append #$output "/etc")) (for-each (lambda (file) (substitute* file (("Exec[[:blank:]]*=[[:blank:]]*([[:graph:]]+)(.*)$" _ original-program arguments) (string-append "Exec=" #$wrapper arguments "\n")))) (find-files #$output "\\.service$"))))) (computed-file (string-append (package-name service) "-wrapper") build)) ;;; ;;; Polkit privilege management service. ;;; (define-record-type* <polkit-configuration> polkit-configuration make-polkit-configuration polkit-configuration? (polkit polkit-configuration-polkit ;file-like (default polkit)) (actions polkit-configuration-actions ;list of file-like (default '()))) (define %polkit-accounts (list (user-group (name "polkitd") (system? #t)) (user-account (name "polkitd") (group "polkitd") (system? #t) (comment "Polkit daemon user") (home-directory "/var/empty") (shell "/run/current-system/profile/sbin/nologin")))) (define %polkit-pam-services (list (unix-pam-service "polkit-1"))) (define (polkit-directory packages) "Return a directory containing an @file{actions} and possibly a @file{rules.d} sub-directory, for use as @file{/etc/polkit-1}." (with-imported-modules '((guix build union)) (computed-file "etc-polkit-1" #~(begin (use-modules (guix build union) (srfi srfi-26)) (union-build #$output (map (cut string-append <> "/share/polkit-1") (list #$@packages))))))) (define polkit-etc-files (match-lambda (($ <polkit-configuration> polkit packages) `(("polkit-1" ,(polkit-directory (cons polkit packages))))))) (define polkit-setuid-programs (match-lambda (($ <polkit-configuration> polkit) (map file-like->setuid-program (list (file-append polkit "/lib/polkit-1/polkit-agent-helper-1") (file-append polkit "/bin/pkexec")))))) (define polkit-service-type (service-type (name 'polkit) (extensions (list (service-extension account-service-type (const %polkit-accounts)) (service-extension pam-root-service-type (const %polkit-pam-services)) (service-extension dbus-root-service-type (compose list polkit-configuration-polkit)) (service-extension etc-service-type polkit-etc-files) (service-extension setuid-program-service-type polkit-setuid-programs))) ;; Extensions are lists of packages that provide polkit rules ;; or actions under share/polkit-1/{actions,rules.d}. (compose concatenate) (extend (lambda (config actions) (polkit-configuration (inherit config) (actions (append (polkit-configuration-actions config) actions))))) (default-value (polkit-configuration)) (description "Run the @uref{http://www.freedesktop.org/wiki/Software/polkit/, Polkit privilege management service}, which allows system administrators to grant access to privileged operations in a structured way. Polkit is a requirement for most desktop environments, such as GNOME."))) (define-deprecated (polkit-service #:key (polkit polkit)) polkit-service-type "Return a service that runs the @uref{http://www.freedesktop.org/wiki/Software/polkit/, Polkit privilege management service}, which allows system administrators to grant access to privileged operations in a structured way. By querying the Polkit service, a privileged system component can know when it should grant additional capabilities to ordinary users. For example, an ordinary user can be granted the capability to suspend the system if the user is logged in locally." (service polkit-service-type (polkit-configuration (polkit polkit)))) ;;; dbus.scm ends here