2009-05-28 13:24:56 +01:00
|
|
|
# Configuration for the pwdutils suite of tools: passwd, useradd, etc.
|
|
|
|
|
|
|
|
{config, pkgs, ...}:
|
|
|
|
|
|
|
|
let
|
|
|
|
|
2010-06-02 22:16:27 +01:00
|
|
|
loginDefs =
|
|
|
|
''
|
|
|
|
DEFAULT_HOME yes
|
|
|
|
|
|
|
|
SYS_UID_MIN 100
|
|
|
|
SYS_UID_MAX 499
|
|
|
|
UID_MIN 1000
|
|
|
|
UID_MAX 29999
|
|
|
|
|
|
|
|
SYS_GID_MIN 100
|
|
|
|
SYS_GID_MAX 499
|
|
|
|
GID_MIN 1000
|
|
|
|
GID_MAX 29999
|
|
|
|
|
|
|
|
TTYGROUP tty
|
|
|
|
TTYPERM 0620
|
|
|
|
|
2012-07-13 15:41:48 +01:00
|
|
|
# Ensure privacy for newly created home directories.
|
|
|
|
UMASK 077
|
|
|
|
|
2010-06-02 22:16:27 +01:00
|
|
|
# Uncomment this to allow non-root users to change their account
|
|
|
|
#information. This should be made configurable.
|
|
|
|
#CHFN_RESTRICT frwh
|
|
|
|
'';
|
|
|
|
|
2010-06-02 22:10:48 +01:00
|
|
|
in
|
|
|
|
|
|
|
|
{
|
|
|
|
|
|
|
|
###### interface
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2009-05-28 13:24:56 +01:00
|
|
|
options = {
|
|
|
|
|
|
|
|
users.defaultUserShell = pkgs.lib.mkOption {
|
|
|
|
default = "/var/run/current-system/sw/bin/bash";
|
|
|
|
description = ''
|
2012-06-06 16:23:20 +01:00
|
|
|
This option defines the default shell assigned to user
|
2009-05-28 13:24:56 +01:00
|
|
|
accounts. This must not be a store path, since the path is
|
|
|
|
used outside the store (in particular in /etc/passwd).
|
|
|
|
Rather, it should be the path of a symlink that points to the
|
|
|
|
actual shell in the Nix store.
|
|
|
|
'';
|
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2009-05-28 13:24:56 +01:00
|
|
|
};
|
|
|
|
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2010-06-02 22:10:48 +01:00
|
|
|
###### implementation
|
2009-05-28 13:24:56 +01:00
|
|
|
|
2010-06-02 22:10:48 +01:00
|
|
|
config = {
|
|
|
|
|
|
|
|
environment.systemPackages = [ pkgs.shadow ];
|
|
|
|
|
|
|
|
environment.etc =
|
|
|
|
[ { # /etc/login.defs: global configuration for pwdutils. You
|
2011-09-14 19:20:50 +01:00
|
|
|
# cannot login without it!
|
2010-06-02 22:16:27 +01:00
|
|
|
source = pkgs.writeText "login.defs" loginDefs;
|
2010-06-02 22:10:48 +01:00
|
|
|
target = "login.defs";
|
2011-09-14 19:20:50 +01:00
|
|
|
}
|
2010-06-02 22:10:48 +01:00
|
|
|
|
|
|
|
{ # /etc/default/useradd: configuration for useradd.
|
|
|
|
source = pkgs.writeText "useradd"
|
|
|
|
''
|
|
|
|
GROUP=100
|
|
|
|
HOME=/home
|
|
|
|
SHELL=${config.users.defaultUserShell}
|
|
|
|
'';
|
|
|
|
target = "default/useradd";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
|
|
|
|
security.pam.services =
|
|
|
|
[ { name = "chsh"; rootOK = true; }
|
|
|
|
{ name = "chfn"; rootOK = true; }
|
2011-08-15 15:48:32 +01:00
|
|
|
{ name = "su"; rootOK = true; forwardXAuth = true; }
|
2010-06-02 22:10:48 +01:00
|
|
|
{ name = "passwd"; }
|
|
|
|
# Note: useradd, groupadd etc. aren't setuid root, so it
|
|
|
|
# doesn't really matter what the PAM config says as long as it
|
|
|
|
# lets root in.
|
|
|
|
{ name = "useradd"; rootOK = true; }
|
|
|
|
{ name = "usermod"; rootOK = true; }
|
|
|
|
{ name = "userdel"; rootOK = true; }
|
|
|
|
{ name = "groupadd"; rootOK = true; }
|
2011-09-14 19:20:50 +01:00
|
|
|
{ name = "groupmod"; rootOK = true; }
|
2010-06-02 22:10:48 +01:00
|
|
|
{ name = "groupmems"; rootOK = true; }
|
|
|
|
{ name = "groupdel"; rootOK = true; }
|
2011-08-01 11:17:18 +01:00
|
|
|
{ name = "login"; ownDevices = true; allowNullPassword = true; }
|
2010-06-02 22:10:48 +01:00
|
|
|
];
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2010-06-02 22:10:48 +01:00
|
|
|
security.setuidPrograms = [ "passwd" "chfn" "su" ];
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2010-06-02 22:10:48 +01:00
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2009-05-28 13:24:56 +01:00
|
|
|
}
|