forked from mirrors/nixpkgs
ef176dcf7e
conversions were done using https://github.com/pennae/nix-doc-munge using (probably) rev f34e145 running nix-doc-munge nixos/**/*.nix nix-doc-munge --import nixos/**/*.nix the tool ensures that only changes that could affect the generated manual *but don't* are committed, other changes require manual review and are discarded.
132 lines
3.8 KiB
Nix
132 lines
3.8 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
|
|
nssModulesPath = config.system.nssModules.path;
|
|
cfg = config.services.nscd;
|
|
|
|
in
|
|
|
|
{
|
|
|
|
###### interface
|
|
|
|
options = {
|
|
|
|
services.nscd = {
|
|
|
|
enable = mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = lib.mdDoc ''
|
|
Whether to enable the Name Service Cache Daemon.
|
|
Disabling this is strongly discouraged, as this effectively disables NSS Lookups
|
|
from all non-glibc NSS modules, including the ones provided by systemd.
|
|
'';
|
|
};
|
|
|
|
user = mkOption {
|
|
type = types.str;
|
|
default = "nscd";
|
|
description = lib.mdDoc ''
|
|
User account under which nscd runs.
|
|
'';
|
|
};
|
|
|
|
group = mkOption {
|
|
type = types.str;
|
|
default = "nscd";
|
|
description = lib.mdDoc ''
|
|
User group under which nscd runs.
|
|
'';
|
|
};
|
|
|
|
config = mkOption {
|
|
type = types.lines;
|
|
default = builtins.readFile ./nscd.conf;
|
|
description = lib.mdDoc "Configuration to use for Name Service Cache Daemon.";
|
|
};
|
|
|
|
package = mkOption {
|
|
type = types.package;
|
|
default = if pkgs.stdenv.hostPlatform.libc == "glibc"
|
|
then pkgs.stdenv.cc.libc.bin
|
|
else pkgs.glibc.bin;
|
|
defaultText = lib.literalExpression ''
|
|
if pkgs.stdenv.hostPlatform.libc == "glibc"
|
|
then pkgs.stdenv.cc.libc.bin
|
|
else pkgs.glibc.bin;
|
|
'';
|
|
description = lib.mdDoc "package containing the nscd binary to be used by the service";
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
###### implementation
|
|
|
|
config = mkIf cfg.enable {
|
|
environment.etc."nscd.conf".text = cfg.config;
|
|
|
|
users.users.${cfg.user} = {
|
|
isSystemUser = true;
|
|
group = cfg.group;
|
|
};
|
|
|
|
users.groups.${cfg.group} = {};
|
|
|
|
systemd.services.nscd =
|
|
{ description = "Name Service Cache Daemon";
|
|
|
|
before = [ "nss-lookup.target" "nss-user-lookup.target" ];
|
|
wants = [ "nss-lookup.target" "nss-user-lookup.target" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
requiredBy = [ "nss-lookup.target" "nss-user-lookup.target" ];
|
|
|
|
environment = { LD_LIBRARY_PATH = nssModulesPath; };
|
|
|
|
restartTriggers = [
|
|
config.environment.etc.hosts.source
|
|
config.environment.etc."nsswitch.conf".source
|
|
config.environment.etc."nscd.conf".source
|
|
] ++ optionals config.users.mysql.enable [
|
|
config.environment.etc."libnss-mysql.cfg".source
|
|
config.environment.etc."libnss-mysql-root.cfg".source
|
|
];
|
|
|
|
# In some configurations, nscd needs to be started as root; it will
|
|
# drop privileges after all the NSS modules have read their
|
|
# configuration files. So prefix the ExecStart command with "!" to
|
|
# prevent systemd from dropping privileges early. See ExecStart in
|
|
# systemd.service(5). We use a static user, because some NSS modules
|
|
# sill want to read their configuration files after the privilege drop
|
|
# and so users can set the owner of those files to the nscd user.
|
|
serviceConfig =
|
|
{ ExecStart = "!@${cfg.package}/bin/nscd nscd";
|
|
Type = "forking";
|
|
User = cfg.user;
|
|
Group = cfg.group;
|
|
RemoveIPC = true;
|
|
PrivateTmp = true;
|
|
NoNewPrivileges = true;
|
|
RestrictSUIDSGID = true;
|
|
ProtectSystem = "strict";
|
|
ProtectHome = "read-only";
|
|
RuntimeDirectory = "nscd";
|
|
PIDFile = "/run/nscd/nscd.pid";
|
|
Restart = "always";
|
|
ExecReload =
|
|
[ "${cfg.package}/bin/nscd --invalidate passwd"
|
|
"${cfg.package}/bin/nscd --invalidate group"
|
|
"${cfg.package}/bin/nscd --invalidate hosts"
|
|
];
|
|
};
|
|
};
|
|
|
|
};
|
|
}
|