nix/module/AutoUpdateSigned.nix

61 lines
1.4 KiB
Nix
Raw Normal View History

# System automatic updates.
# This is a systemd service that pulls updates every hour.
# Unlike system.autoUpgrade, this script also verifies my git signature
# to prevent unathorized changes to hosts.
{ const, pkgs, lib, util, config, secret, ... }: with lib; let
cfg = config.module.autoupdate;
2024-06-25 04:04:39 +03:00
in {
options = {
module.autoupdate = {
enable = mkEnableOption "System auto-updates.";
2024-06-25 04:04:39 +03:00
};
};
2024-06-25 04:04:39 +03:00
config = mkIf cfg.enable {
programs.git = {
enable = true;
config = {
gpg.ssh.allowedSignersFile = toString secret.crypto.sign.git.allowed;
};
};
2024-06-25 04:04:39 +03:00
systemd.services.autoupdate = util.mkStaticSystemdService {
enable = true;
description = "Signed system auto-update.";
serviceConfig.Type = "oneshot";
path = with pkgs; [
bash
git
gnumake
nixos-rebuild
openssh
];
script = ''
pushd /tmp
rm -rf ./nixos
${getExe pkgs.git} clone --depth=1 --single-branch --branch=main ${const.url} ./nixos
pushd ./nixos
${getExe pkgs.git} verify-commit HEAD || {
echo "Verification failed."
exit 1
};
2024-08-22 04:53:22 +03:00
${getExe pkgs.gnumake} switch
${getExe pkgs.gnumake} fix-hm-root
2024-06-25 04:04:39 +03:00
'';
after = [ "network-online.target" ];
wants = [ "network-online.target" ];
};
systemd.timers.autoupdate = {
enable = true;
timerConfig = {
OnCalendar = "hourly";
Persistent = true;
Unit = "autoupdate.service";
# RandomizedDelaySec = 60;
};
wantedBy = [ "timers.target" ];
};
};
}