2009-05-28 00:14:38 +01:00
|
|
|
# Configuration for the Name Service Switch (/etc/nsswitch.conf).
|
|
|
|
|
2018-12-12 12:57:31 +00:00
|
|
|
{ config, lib, pkgs, ... }:
|
2012-10-07 01:58:46 +01:00
|
|
|
|
2014-04-14 15:26:48 +01:00
|
|
|
with lib;
|
2009-05-28 00:14:38 +01:00
|
|
|
|
|
|
|
let
|
|
|
|
|
2017-06-30 01:20:09 +01:00
|
|
|
# only with nscd up and running we can load NSS modules that are not integrated in NSS
|
|
|
|
canLoadExternalModules = config.services.nscd.enable;
|
2017-06-30 01:20:50 +01:00
|
|
|
myhostname = canLoadExternalModules;
|
|
|
|
mymachines = canLoadExternalModules;
|
2020-04-25 13:27:50 +01:00
|
|
|
# XXX Move these to their respective modules
|
2017-06-30 01:20:50 +01:00
|
|
|
nssmdns = canLoadExternalModules && config.services.avahi.nssmdns;
|
|
|
|
nsswins = canLoadExternalModules && config.services.samba.nsswins;
|
|
|
|
ldap = canLoadExternalModules && (config.users.ldap.enable && config.users.ldap.nsswitch);
|
|
|
|
resolved = canLoadExternalModules && config.services.resolved.enable;
|
|
|
|
|
2020-04-25 13:27:50 +01:00
|
|
|
hostArray = mkMerge [
|
|
|
|
(mkBefore [ "files" ])
|
|
|
|
(mkIf mymachines [ "mymachines" ])
|
|
|
|
(mkIf nssmdns [ "mdns_minimal [NOTFOUND=return]" ])
|
|
|
|
(mkIf nsswins [ "wins" ])
|
|
|
|
(mkIf resolved [ "resolve [!UNAVAIL=return]" ])
|
|
|
|
(mkAfter [ "dns" ])
|
|
|
|
(mkIf nssmdns (mkOrder 1501 [ "mdns" ])) # 1501 to ensure it's after dns
|
|
|
|
(mkIf myhostname (mkOrder 1600 [ "myhostname" ])) # 1600 to ensure it's always the last
|
|
|
|
];
|
|
|
|
|
|
|
|
passwdArray = mkMerge [
|
|
|
|
(mkBefore [ "files" ])
|
|
|
|
(mkIf ldap [ "ldap" ])
|
|
|
|
(mkIf mymachines [ "mymachines" ])
|
|
|
|
(mkIf canLoadExternalModules (mkAfter [ "systemd" ]))
|
|
|
|
];
|
|
|
|
|
|
|
|
shadowArray = mkMerge [
|
|
|
|
(mkBefore [ "files" ])
|
|
|
|
(mkIf ldap [ "ldap" ])
|
|
|
|
];
|
|
|
|
|
2016-09-01 10:00:20 +01:00
|
|
|
in {
|
2009-05-28 00:14:38 +01:00
|
|
|
options = {
|
|
|
|
|
|
|
|
# NSS modules. Hacky!
|
2017-06-30 01:20:09 +01:00
|
|
|
# Only works with nscd!
|
2012-10-07 01:58:46 +01:00
|
|
|
system.nssModules = mkOption {
|
2013-10-28 15:14:15 +00:00
|
|
|
type = types.listOf types.path;
|
2009-05-28 00:14:38 +01:00
|
|
|
internal = true;
|
|
|
|
default = [];
|
2013-09-04 12:05:09 +01:00
|
|
|
description = ''
|
2009-05-28 00:14:38 +01:00
|
|
|
Search path for NSS (Name Service Switch) modules. This allows
|
|
|
|
several DNS resolution methods to be specified via
|
|
|
|
<filename>/etc/nsswitch.conf</filename>.
|
2013-09-04 12:05:09 +01:00
|
|
|
'';
|
2009-05-28 00:14:38 +01:00
|
|
|
apply = list:
|
2012-09-16 18:14:19 +01:00
|
|
|
{
|
|
|
|
inherit list;
|
|
|
|
path = makeLibraryPath list;
|
2009-05-28 00:14:38 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2020-04-25 13:27:50 +01:00
|
|
|
system.nssDatabases = {
|
|
|
|
passwd = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
description = ''
|
|
|
|
List of passwd entries to configure in <filename>/etc/nsswitch.conf</filename>.
|
|
|
|
|
|
|
|
Note that "files" is always prepended while "systemd" is appended if nscd is enabled.
|
|
|
|
|
|
|
|
This option only takes effect if nscd is enabled.
|
|
|
|
'';
|
|
|
|
default = [];
|
|
|
|
};
|
|
|
|
|
|
|
|
group = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
description = ''
|
|
|
|
List of group entries to configure in <filename>/etc/nsswitch.conf</filename>.
|
|
|
|
|
|
|
|
Note that "files" is always prepended while "systemd" is appended if nscd is enabled.
|
|
|
|
|
|
|
|
This option only takes effect if nscd is enabled.
|
|
|
|
'';
|
|
|
|
default = [];
|
|
|
|
};
|
|
|
|
|
|
|
|
shadow = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
description = ''
|
|
|
|
List of shadow entries to configure in <filename>/etc/nsswitch.conf</filename>.
|
2019-02-15 18:22:14 +00:00
|
|
|
|
2020-04-25 13:27:50 +01:00
|
|
|
Note that "files" is always prepended.
|
|
|
|
|
|
|
|
This option only takes effect if nscd is enabled.
|
|
|
|
'';
|
|
|
|
default = [];
|
|
|
|
};
|
|
|
|
|
|
|
|
hosts = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
description = ''
|
|
|
|
List of hosts entries to configure in <filename>/etc/nsswitch.conf</filename>.
|
|
|
|
|
|
|
|
Note that "files" is always prepended, and "dns" and "myhostname" are always appended.
|
|
|
|
|
|
|
|
This option only takes effect if nscd is enabled.
|
|
|
|
'';
|
|
|
|
default = [];
|
|
|
|
};
|
|
|
|
|
|
|
|
services = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
description = ''
|
|
|
|
List of services entries to configure in <filename>/etc/nsswitch.conf</filename>.
|
|
|
|
|
|
|
|
Note that "files" is always prepended.
|
|
|
|
|
|
|
|
This option only takes effect if nscd is enabled.
|
|
|
|
'';
|
|
|
|
default = [];
|
|
|
|
};
|
|
|
|
};
|
2009-05-28 00:14:38 +01:00
|
|
|
};
|
|
|
|
|
2020-04-25 13:27:50 +01:00
|
|
|
imports = [
|
|
|
|
(mkRenamedOptionModule [ "system" "nssHosts" ] [ "system" "nssDatabases" "hosts" ])
|
|
|
|
];
|
|
|
|
|
2013-09-04 12:05:09 +01:00
|
|
|
config = {
|
2017-06-30 01:20:09 +01:00
|
|
|
assertions = [
|
|
|
|
{
|
|
|
|
# generic catch if the NixOS module adding to nssModules does not prevent it with specific message.
|
|
|
|
assertion = config.system.nssModules.path != "" -> canLoadExternalModules;
|
|
|
|
message = "Loading NSS modules from path ${config.system.nssModules.path} requires nscd being enabled.";
|
|
|
|
}
|
|
|
|
{
|
|
|
|
# resolved does not need to add to nssModules, therefore needs an extra assertion
|
|
|
|
assertion = resolved -> canLoadExternalModules;
|
|
|
|
message = "Loading systemd-resolved's nss-resolve NSS module requires nscd being enabled.";
|
|
|
|
}
|
|
|
|
];
|
2013-09-04 12:05:09 +01:00
|
|
|
|
2014-08-24 16:08:55 +01:00
|
|
|
# Name Service Switch configuration file. Required by the C
|
2020-04-25 13:27:50 +01:00
|
|
|
# library.
|
2016-09-01 10:00:20 +01:00
|
|
|
environment.etc."nsswitch.conf".text = ''
|
2020-04-25 13:27:50 +01:00
|
|
|
passwd: ${concatStringsSep " " config.system.nssDatabases.passwd}
|
|
|
|
group: ${concatStringsSep " " config.system.nssDatabases.group}
|
|
|
|
shadow: ${concatStringsSep " " config.system.nssDatabases.shadow}
|
2016-09-01 10:00:20 +01:00
|
|
|
|
2020-04-25 13:27:50 +01:00
|
|
|
hosts: ${concatStringsSep " " config.system.nssDatabases.hosts}
|
2016-09-01 10:00:20 +01:00
|
|
|
networks: files
|
|
|
|
|
|
|
|
ethers: files
|
2020-04-25 13:27:50 +01:00
|
|
|
services: ${concatStringsSep " " config.system.nssDatabases.services}
|
2016-09-01 10:00:20 +01:00
|
|
|
protocols: files
|
|
|
|
rpc: files
|
|
|
|
'';
|
2014-08-24 16:08:55 +01:00
|
|
|
|
2020-04-25 13:27:50 +01:00
|
|
|
system.nssDatabases = {
|
|
|
|
passwd = passwdArray;
|
|
|
|
group = passwdArray;
|
|
|
|
shadow = shadowArray;
|
|
|
|
hosts = hostArray;
|
2020-04-28 16:02:46 +01:00
|
|
|
services = mkBefore [ "files" ];
|
2020-04-25 13:27:50 +01:00
|
|
|
};
|
2019-02-15 18:22:14 +00:00
|
|
|
|
2014-08-24 16:08:55 +01:00
|
|
|
# Systemd provides nss-myhostname to ensure that our hostname
|
|
|
|
# always resolves to a valid IP address. It returns all locally
|
|
|
|
# configured IP addresses, or ::1 and 127.0.0.2 as
|
|
|
|
# fallbacks. Systemd also provides nss-mymachines to return IP
|
|
|
|
# addresses of local containers.
|
2020-04-30 16:51:13 +01:00
|
|
|
system.nssModules = (optionals canLoadExternalModules [ config.systemd.package.out ]);
|
2013-09-04 12:05:09 +01:00
|
|
|
};
|
2009-05-28 00:14:38 +01:00
|
|
|
}
|