2014-04-14 16:26:48 +02:00
|
|
|
{ config, lib, pkgs, ... }:
|
2007-01-12 00:55:25 +01:00
|
|
|
|
2014-04-14 16:26:48 +02:00
|
|
|
with lib;
|
2009-12-16 21:51:25 +01:00
|
|
|
|
2009-03-06 13:27:40 +01:00
|
|
|
let
|
2009-07-15 13:34:55 +02:00
|
|
|
|
2009-03-06 13:27:40 +01:00
|
|
|
nssModulesPath = config.system.nssModules.path;
|
2014-01-31 14:07:44 +01:00
|
|
|
cfg = config.services.nscd;
|
2009-07-15 13:34:55 +02:00
|
|
|
|
2020-02-28 18:04:10 +01:00
|
|
|
nscd = if pkgs.stdenv.hostPlatform.libc == "glibc"
|
|
|
|
then pkgs.stdenv.cc.libc.bin
|
|
|
|
else pkgs.glibc.bin;
|
|
|
|
|
2009-03-06 13:27:40 +01:00
|
|
|
in
|
2007-01-12 00:55:25 +01:00
|
|
|
|
2009-03-06 13:27:40 +01:00
|
|
|
{
|
2009-12-16 21:51:25 +01:00
|
|
|
|
|
|
|
###### interface
|
|
|
|
|
|
|
|
options = {
|
|
|
|
|
|
|
|
services.nscd = {
|
|
|
|
|
|
|
|
enable = mkOption {
|
2013-10-30 17:37:45 +01:00
|
|
|
type = types.bool;
|
2009-12-16 21:51:25 +01:00
|
|
|
default = true;
|
2020-04-25 18:09:51 +02:00
|
|
|
description = ''
|
|
|
|
Whether to enable the Name Service Cache Daemon.
|
|
|
|
Disabling this is strongly discouraged, as this effectively disables NSS Lookups
|
|
|
|
from all non-glibc NSS modules, including the ones provided by systemd.
|
|
|
|
'';
|
2009-12-16 21:51:25 +01:00
|
|
|
};
|
|
|
|
|
2014-01-31 14:07:44 +01:00
|
|
|
config = mkOption {
|
|
|
|
type = types.lines;
|
|
|
|
default = builtins.readFile ./nscd.conf;
|
|
|
|
description = "Configuration to use for Name Service Cache Daemon.";
|
|
|
|
};
|
|
|
|
|
2009-12-16 21:51:25 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
2012-08-06 18:26:52 +02:00
|
|
|
|
2009-12-16 21:51:25 +01:00
|
|
|
###### implementation
|
|
|
|
|
2014-01-31 14:07:44 +01:00
|
|
|
config = mkIf cfg.enable {
|
2016-04-14 20:18:09 +02:00
|
|
|
environment.etc."nscd.conf".text = cfg.config;
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2013-01-16 12:33:18 +01:00
|
|
|
systemd.services.nscd =
|
2009-10-12 19:27:57 +02:00
|
|
|
{ description = "Name Service Cache Daemon";
|
2009-07-15 13:34:55 +02:00
|
|
|
|
2020-12-31 08:49:13 +01:00
|
|
|
wantedBy = [ "nss-lookup.target" "nss-user-lookup.target" ];
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2020-12-31 08:49:13 +01:00
|
|
|
environment = { LD_LIBRARY_PATH = nssModulesPath; };
|
2020-12-07 20:59:03 +01:00
|
|
|
|
2016-04-14 20:18:09 +02:00
|
|
|
restartTriggers = [
|
|
|
|
config.environment.etc.hosts.source
|
|
|
|
config.environment.etc."nsswitch.conf".source
|
|
|
|
config.environment.etc."nscd.conf".source
|
|
|
|
];
|
2013-06-11 16:15:24 +02:00
|
|
|
|
2019-07-12 21:07:45 +02:00
|
|
|
# We use DynamicUser because in default configurations nscd doesn't
|
|
|
|
# create any files that need to survive restarts. However, in some
|
|
|
|
# configurations, nscd needs to be started as root; it will drop
|
|
|
|
# privileges after all the NSS modules have read their configuration
|
|
|
|
# files. So prefix the ExecStart command with "!" to prevent systemd
|
|
|
|
# from dropping privileges early. See ExecStart in systemd.service(5).
|
2020-12-31 08:49:13 +01:00
|
|
|
serviceConfig =
|
|
|
|
{ ExecStart = "!@${nscd}/sbin/nscd nscd";
|
|
|
|
Type = "forking";
|
|
|
|
DynamicUser = true;
|
|
|
|
RuntimeDirectory = "nscd";
|
|
|
|
PIDFile = "/run/nscd/nscd.pid";
|
|
|
|
Restart = "always";
|
|
|
|
ExecReload =
|
|
|
|
[ "${nscd}/sbin/nscd --invalidate passwd"
|
|
|
|
"${nscd}/sbin/nscd --invalidate group"
|
|
|
|
"${nscd}/sbin/nscd --invalidate hosts"
|
|
|
|
];
|
|
|
|
};
|
2012-01-21 20:13:43 +01:00
|
|
|
};
|
2020-12-31 08:49:13 +01:00
|
|
|
|
2009-03-06 13:27:40 +01:00
|
|
|
};
|
2007-01-12 00:55:25 +01:00
|
|
|
}
|