nixpkgs/nixos/modules/services/security/munge.nix

76 lines
1.4 KiB
Nix
Raw Normal View History

2015-02-28 22:23:07 +01:00
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.munge;
in
{
###### interface
options = {
services.munge = {
enable = mkEnableOption "munge service";
password = mkOption {
default = "/etc/munge/munge.key";
type = types.string;
description = ''
The path to a daemon's secret key.
'';
};
};
};
###### implementation
config = mkIf cfg.enable {
environment.systemPackages = [ pkgs.munge ];
users.users.munge = {
description = "Munge daemon user";
isSystemUser = true;
group = "munge";
};
users.groups.munge = {};
systemd.services.munged = {
2015-02-28 22:23:07 +01:00
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
path = [ pkgs.munge pkgs.coreutils ];
preStart = ''
chmod 0700 ${cfg.password}
mkdir -p /var/lib/munge -m 0711
chown -R munge:munge /var/lib/munge
2015-02-28 22:23:07 +01:00
mkdir -p /var/log/munge -m 0700
chown -R munge:munge /var/log/munge
2015-02-28 22:23:07 +01:00
mkdir -p /run/munge -m 0755
chown -R munge:munge /run/munge
2015-02-28 22:23:07 +01:00
'';
serviceConfig = {
ExecStart = "${pkgs.munge}/bin/munged --syslog --key-file ${cfg.password}";
PIDFile = "/run/munge/munged.pid";
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
PermissionsStartOnly = "true";
User = "munge";
Group = "munge";
2015-02-28 22:23:07 +01:00
};
};
};
}