mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-12-29 00:53:57 +00:00
aee40c2d8a
When set, this switches from using nscd to using nsncd. It's a protocol-compatible, non-caching and much less flaky alternative.
150 lines
4.4 KiB
Nix
150 lines
4.4 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
|
|
nssModulesPath = config.system.nssModules.path;
|
|
cfg = config.services.nscd;
|
|
|
|
in
|
|
|
|
{
|
|
|
|
###### interface
|
|
|
|
options = {
|
|
|
|
services.nscd = {
|
|
|
|
enable = mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = lib.mdDoc ''
|
|
Whether to enable the Name Service Cache Daemon.
|
|
Disabling this is strongly discouraged, as this effectively disables NSS Lookups
|
|
from all non-glibc NSS modules, including the ones provided by systemd.
|
|
'';
|
|
};
|
|
|
|
enableNsncd = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = lib.mdDoc ''
|
|
Whether to use nsncd instead of nscd.
|
|
This is a nscd-compatible daemon, that proxies lookups, without any caching.
|
|
'';
|
|
};
|
|
|
|
user = mkOption {
|
|
type = types.str;
|
|
default = "nscd";
|
|
description = lib.mdDoc ''
|
|
User account under which nscd runs.
|
|
'';
|
|
};
|
|
|
|
group = mkOption {
|
|
type = types.str;
|
|
default = "nscd";
|
|
description = lib.mdDoc ''
|
|
User group under which nscd runs.
|
|
'';
|
|
};
|
|
|
|
config = mkOption {
|
|
type = types.lines;
|
|
default = builtins.readFile ./nscd.conf;
|
|
description = lib.mdDoc "Configuration to use for Name Service Cache Daemon.";
|
|
};
|
|
|
|
package = mkOption {
|
|
type = types.package;
|
|
default =
|
|
if pkgs.stdenv.hostPlatform.libc == "glibc"
|
|
then pkgs.stdenv.cc.libc.bin
|
|
else pkgs.glibc.bin;
|
|
defaultText = lib.literalExpression ''
|
|
if pkgs.stdenv.hostPlatform.libc == "glibc"
|
|
then pkgs.stdenv.cc.libc.bin
|
|
else pkgs.glibc.bin;
|
|
'';
|
|
description = lib.mdDoc ''
|
|
package containing the nscd binary to be used by the service.
|
|
Ignored when enableNsncd is set to true.
|
|
'';
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
###### implementation
|
|
|
|
config = mkIf cfg.enable {
|
|
environment.etc."nscd.conf".text = cfg.config;
|
|
|
|
users.users.${cfg.user} = {
|
|
isSystemUser = true;
|
|
group = cfg.group;
|
|
};
|
|
|
|
users.groups.${cfg.group} = { };
|
|
|
|
systemd.services.nscd =
|
|
{
|
|
description = "Name Service Cache Daemon"
|
|
+ lib.optionalString cfg.enableNsncd " (nsncd)";
|
|
|
|
before = [ "nss-lookup.target" "nss-user-lookup.target" ];
|
|
wants = [ "nss-lookup.target" "nss-user-lookup.target" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
requiredBy = [ "nss-lookup.target" "nss-user-lookup.target" ];
|
|
|
|
environment = { LD_LIBRARY_PATH = nssModulesPath; };
|
|
|
|
restartTriggers = lib.optionals (!cfg.enableNsncd) ([
|
|
config.environment.etc.hosts.source
|
|
config.environment.etc."nsswitch.conf".source
|
|
config.environment.etc."nscd.conf".source
|
|
] ++ optionals config.users.mysql.enable [
|
|
config.environment.etc."libnss-mysql.cfg".source
|
|
config.environment.etc."libnss-mysql-root.cfg".source
|
|
]);
|
|
|
|
# In some configurations, nscd needs to be started as root; it will
|
|
# drop privileges after all the NSS modules have read their
|
|
# configuration files. So prefix the ExecStart command with "!" to
|
|
# prevent systemd from dropping privileges early. See ExecStart in
|
|
# systemd.service(5). We use a static user, because some NSS modules
|
|
# sill want to read their configuration files after the privilege drop
|
|
# and so users can set the owner of those files to the nscd user.
|
|
serviceConfig =
|
|
{
|
|
ExecStart =
|
|
if cfg.enableNsncd then "${pkgs.nsncd}/bin/nsncd"
|
|
else "!@${cfg.package}/bin/nscd nscd";
|
|
Type = if cfg.enableNsncd then "notify" else "forking";
|
|
User = cfg.user;
|
|
Group = cfg.group;
|
|
RemoveIPC = true;
|
|
PrivateTmp = true;
|
|
NoNewPrivileges = true;
|
|
RestrictSUIDSGID = true;
|
|
ProtectSystem = "strict";
|
|
ProtectHome = "read-only";
|
|
RuntimeDirectory = "nscd";
|
|
PIDFile = "/run/nscd/nscd.pid";
|
|
Restart = "always";
|
|
ExecReload =
|
|
lib.optionals (!cfg.enableNsncd) [
|
|
"${cfg.package}/bin/nscd --invalidate passwd"
|
|
"${cfg.package}/bin/nscd --invalidate group"
|
|
"${cfg.package}/bin/nscd --invalidate hosts"
|
|
];
|
|
};
|
|
};
|
|
};
|
|
}
|