2014-04-14 15:26:48 +01:00
|
|
|
{ config, lib, pkgs, ... }:
|
2007-01-11 23:55:25 +00:00
|
|
|
|
2014-04-14 15:26:48 +01:00
|
|
|
with lib;
|
2009-12-16 20:51:25 +00:00
|
|
|
|
2009-03-06 12:27:40 +00:00
|
|
|
let
|
2009-07-15 12:34:55 +01:00
|
|
|
|
2009-03-06 12:27:40 +00:00
|
|
|
nssModulesPath = config.system.nssModules.path;
|
2014-01-31 13:07:44 +00:00
|
|
|
cfg = config.services.nscd;
|
2009-07-15 12:34:55 +01:00
|
|
|
|
2009-03-06 12:27:40 +00:00
|
|
|
in
|
2007-01-11 23:55:25 +00:00
|
|
|
|
2009-03-06 12:27:40 +00:00
|
|
|
{
|
2009-12-16 20:51:25 +00:00
|
|
|
|
|
|
|
###### interface
|
|
|
|
|
|
|
|
options = {
|
|
|
|
|
|
|
|
services.nscd = {
|
|
|
|
|
|
|
|
enable = mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
type = types.bool;
|
2009-12-16 20:51:25 +00:00
|
|
|
default = true;
|
2020-04-25 17:09:51 +01:00
|
|
|
description = ''
|
|
|
|
Whether to enable the Name Service Cache Daemon.
|
|
|
|
Disabling this is strongly discouraged, as this effectively disables NSS Lookups
|
|
|
|
from all non-glibc NSS modules, including the ones provided by systemd.
|
|
|
|
'';
|
2009-12-16 20:51:25 +00:00
|
|
|
};
|
|
|
|
|
2014-01-31 13:07:44 +00:00
|
|
|
config = mkOption {
|
|
|
|
type = types.lines;
|
|
|
|
default = builtins.readFile ./nscd.conf;
|
|
|
|
description = "Configuration to use for Name Service Cache Daemon.";
|
|
|
|
};
|
|
|
|
|
2021-05-22 08:07:18 +01:00
|
|
|
package = mkOption {
|
|
|
|
type = types.package;
|
|
|
|
default = if pkgs.stdenv.hostPlatform.libc == "glibc"
|
|
|
|
then pkgs.stdenv.cc.libc.bin
|
|
|
|
else pkgs.glibc.bin;
|
2022-04-26 13:06:52 +01:00
|
|
|
defaultText = lib.literalExpression ''
|
2022-04-18 13:47:53 +01:00
|
|
|
if pkgs.stdenv.hostPlatform.libc == "glibc"
|
|
|
|
then pkgs.stdenv.cc.libc.bin
|
|
|
|
else pkgs.glibc.bin;
|
|
|
|
'';
|
2021-05-22 08:07:18 +01:00
|
|
|
description = "package containing the nscd binary to be used by the service";
|
|
|
|
};
|
|
|
|
|
2009-12-16 20:51:25 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
2012-08-06 17:26:52 +01:00
|
|
|
|
2009-12-16 20:51:25 +00:00
|
|
|
###### implementation
|
|
|
|
|
2014-01-31 13:07:44 +00:00
|
|
|
config = mkIf cfg.enable {
|
2016-04-14 19:18:09 +01:00
|
|
|
environment.etc."nscd.conf".text = cfg.config;
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2013-01-16 11:33:18 +00:00
|
|
|
systemd.services.nscd =
|
2009-10-12 18:27:57 +01:00
|
|
|
{ description = "Name Service Cache Daemon";
|
2009-07-15 12:34:55 +01:00
|
|
|
|
2022-01-10 18:30:15 +00:00
|
|
|
before = [ "nss-lookup.target" "nss-user-lookup.target" ];
|
|
|
|
wants = [ "nss-lookup.target" "nss-user-lookup.target" ];
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
2009-07-15 12:34:55 +01:00
|
|
|
|
2009-07-15 16:24:11 +01:00
|
|
|
environment = { LD_LIBRARY_PATH = nssModulesPath; };
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2016-04-14 19:18:09 +01:00
|
|
|
restartTriggers = [
|
|
|
|
config.environment.etc.hosts.source
|
|
|
|
config.environment.etc."nsswitch.conf".source
|
|
|
|
config.environment.etc."nscd.conf".source
|
|
|
|
];
|
2013-06-11 15:15:24 +01:00
|
|
|
|
2019-07-12 20:07:45 +01:00
|
|
|
# We use DynamicUser because in default configurations nscd doesn't
|
|
|
|
# create any files that need to survive restarts. However, in some
|
|
|
|
# configurations, nscd needs to be started as root; it will drop
|
|
|
|
# privileges after all the NSS modules have read their configuration
|
|
|
|
# files. So prefix the ExecStart command with "!" to prevent systemd
|
|
|
|
# from dropping privileges early. See ExecStart in systemd.service(5).
|
2012-08-14 21:45:50 +01:00
|
|
|
serviceConfig =
|
2021-05-22 08:07:18 +01:00
|
|
|
{ ExecStart = "!@${cfg.package}/bin/nscd nscd";
|
2012-10-01 21:27:42 +01:00
|
|
|
Type = "forking";
|
2019-07-03 21:11:05 +01:00
|
|
|
DynamicUser = true;
|
nixos/nscd: let systemd manage directories
Previously this module created both /var/db/nscd and /run/nscd using
shell commands in a preStart script. Note that both of these paths are
hard-coded in the nscd source. (Well, the latter is actually
/var/run/nscd but /var/run is a symlink to /run so it works out the
same.)
/var/db/nscd is only used if the nscd.conf "persistent" option is turned
on for one or more databases, which it is not in our default config
file. I'm not even sure persistent mode can work under systemd, since
`nscd --shutdown` is not synchronous so systemd will always
unceremoniously kill nscd without reliably giving it time to mark the
databases as unused. Nonetheless, if someone wants to use that option,
they can ensure the directory exists using systemd.tmpfiles.rules.
systemd can create /run/nscd for us with the RuntimeDirectory directive,
with the added benefit of causing systemd to delete the directory on
service stop or restart. The default value of RuntimeDirectoryMode is
755, the same as the mode which this module was using before.
I don't think the `rm -f /run/nscd/nscd.pid` was necessary after NixOS
switched to systemd and used its PIDFile directive, because systemd
deletes the specified file after the service stops, and because the file
can't persist across reboots since /run is a tmpfs. Even if the file
still exists when nscd starts, it's only a problem if the pid it
contains has been reused by another process, which is unlikely. Anyway,
this change makes that deletion even less necessary, because now systemd
deletes the entire /run/nscd directory when the service stops.
2019-07-03 20:39:48 +01:00
|
|
|
RuntimeDirectory = "nscd";
|
2012-10-01 21:27:42 +01:00
|
|
|
PIDFile = "/run/nscd/nscd.pid";
|
|
|
|
Restart = "always";
|
|
|
|
ExecReload =
|
2021-05-22 08:07:18 +01:00
|
|
|
[ "${cfg.package}/bin/nscd --invalidate passwd"
|
|
|
|
"${cfg.package}/bin/nscd --invalidate group"
|
|
|
|
"${cfg.package}/bin/nscd --invalidate hosts"
|
2012-10-01 21:27:42 +01:00
|
|
|
];
|
|
|
|
};
|
2012-01-21 19:13:43 +00:00
|
|
|
};
|
|
|
|
|
2009-03-06 12:27:40 +00:00
|
|
|
};
|
2007-01-11 23:55:25 +00:00
|
|
|
}
|