6afb255d97
these changes were generated with nixq 0.0.2, by running nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix two mentions of the mdDoc function remain in nixos/, both of which are inside of comments. Since lib.mdDoc is already defined as just id, this commit is a no-op as far as Nix (and the built manual) is concerned.
44 lines
930 B
Nix
44 lines
930 B
Nix
{ config, lib, pkgs, ... }:
|
||
|
||
with lib;
|
||
|
||
{
|
||
|
||
###### interface
|
||
|
||
options = {
|
||
|
||
services.oidentd.enable = mkOption {
|
||
default = false;
|
||
type = types.bool;
|
||
description = ''
|
||
Whether to enable ‘oidentd’, an implementation of the Ident
|
||
protocol (RFC 1413). It allows remote systems to identify the
|
||
name of the user associated with a TCP connection.
|
||
'';
|
||
};
|
||
|
||
};
|
||
|
||
|
||
###### implementation
|
||
|
||
config = mkIf config.services.oidentd.enable {
|
||
systemd.services.oidentd = {
|
||
after = [ "network.target" ];
|
||
wantedBy = [ "multi-user.target" ];
|
||
serviceConfig.Type = "forking";
|
||
script = "${pkgs.oidentd}/sbin/oidentd -u oidentd -g nogroup";
|
||
};
|
||
|
||
users.users.oidentd = {
|
||
description = "Ident Protocol daemon user";
|
||
group = "oidentd";
|
||
uid = config.ids.uids.oidentd;
|
||
};
|
||
|
||
users.groups.oidentd.gid = config.ids.gids.oidentd;
|
||
|
||
};
|
||
|
||
}
|