2009-05-28 13:24:56 +01:00
|
|
|
# Configuration for the pwdutils suite of tools: passwd, useradd, etc.
|
|
|
|
|
2016-06-12 20:03:14 +01:00
|
|
|
{ config, lib, utils, pkgs, ... }:
|
2009-05-28 13:24:56 +01:00
|
|
|
|
2014-04-14 15:26:48 +01:00
|
|
|
with lib;
|
2013-09-18 04:18:34 +01:00
|
|
|
|
2009-05-28 13:24:56 +01:00
|
|
|
let
|
|
|
|
|
2010-06-02 22:16:27 +01:00
|
|
|
loginDefs =
|
|
|
|
''
|
|
|
|
DEFAULT_HOME yes
|
|
|
|
|
2014-04-29 09:45:06 +01:00
|
|
|
SYS_UID_MIN 400
|
2010-06-02 22:16:27 +01:00
|
|
|
SYS_UID_MAX 499
|
|
|
|
UID_MIN 1000
|
|
|
|
UID_MAX 29999
|
|
|
|
|
2014-04-29 09:45:06 +01:00
|
|
|
SYS_GID_MIN 400
|
2010-06-02 22:16:27 +01:00
|
|
|
SYS_GID_MAX 499
|
|
|
|
GID_MIN 1000
|
|
|
|
GID_MAX 29999
|
|
|
|
|
|
|
|
TTYGROUP tty
|
|
|
|
TTYPERM 0620
|
|
|
|
|
2012-07-13 15:41:48 +01:00
|
|
|
# Ensure privacy for newly created home directories.
|
|
|
|
UMASK 077
|
|
|
|
|
2010-06-02 22:16:27 +01:00
|
|
|
# Uncomment this to allow non-root users to change their account
|
|
|
|
#information. This should be made configurable.
|
|
|
|
#CHFN_RESTRICT frwh
|
2012-10-23 14:10:48 +01:00
|
|
|
|
2010-06-02 22:16:27 +01:00
|
|
|
'';
|
|
|
|
|
2010-06-02 22:10:48 +01:00
|
|
|
in
|
|
|
|
|
|
|
|
{
|
|
|
|
|
|
|
|
###### interface
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2009-05-28 13:24:56 +01:00
|
|
|
options = {
|
|
|
|
|
2014-05-05 19:58:51 +01:00
|
|
|
users.defaultUserShell = lib.mkOption {
|
2009-05-28 13:24:56 +01:00
|
|
|
description = ''
|
2012-06-06 16:23:20 +01:00
|
|
|
This option defines the default shell assigned to user
|
2016-06-12 20:03:14 +01:00
|
|
|
accounts. This can be either a full system path or a shell package.
|
|
|
|
|
|
|
|
This must not be a store path, since the path is
|
2009-05-28 13:24:56 +01:00
|
|
|
used outside the store (in particular in /etc/passwd).
|
|
|
|
'';
|
2016-06-12 20:03:14 +01:00
|
|
|
example = literalExample "pkgs.zsh";
|
|
|
|
type = types.either types.path types.shellPackage;
|
2009-05-28 13:24:56 +01:00
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2009-05-28 13:24:56 +01:00
|
|
|
};
|
|
|
|
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2010-06-02 22:10:48 +01:00
|
|
|
###### implementation
|
2009-05-28 13:24:56 +01:00
|
|
|
|
2010-06-02 22:10:48 +01:00
|
|
|
config = {
|
|
|
|
|
2014-02-05 13:05:09 +00:00
|
|
|
environment.systemPackages =
|
2016-06-12 20:03:14 +01:00
|
|
|
lib.optional config.users.mutableUsers pkgs.shadow ++
|
|
|
|
lib.optional (types.shellPackage.check config.users.defaultUserShell)
|
|
|
|
config.users.defaultUserShell;
|
2010-06-02 22:10:48 +01:00
|
|
|
|
|
|
|
environment.etc =
|
|
|
|
[ { # /etc/login.defs: global configuration for pwdutils. You
|
2011-09-14 19:20:50 +01:00
|
|
|
# cannot login without it!
|
2010-06-02 22:16:27 +01:00
|
|
|
source = pkgs.writeText "login.defs" loginDefs;
|
2010-06-02 22:10:48 +01:00
|
|
|
target = "login.defs";
|
2011-09-14 19:20:50 +01:00
|
|
|
}
|
2010-06-02 22:10:48 +01:00
|
|
|
|
|
|
|
{ # /etc/default/useradd: configuration for useradd.
|
|
|
|
source = pkgs.writeText "useradd"
|
|
|
|
''
|
|
|
|
GROUP=100
|
|
|
|
HOME=/home
|
2016-06-12 20:03:14 +01:00
|
|
|
SHELL=${utils.toShellPath config.users.defaultUserShell}
|
2010-06-02 22:10:48 +01:00
|
|
|
'';
|
|
|
|
target = "default/useradd";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
|
|
|
|
security.pam.services =
|
2013-10-15 13:47:51 +01:00
|
|
|
{ chsh = { rootOK = true; };
|
|
|
|
chfn = { rootOK = true; };
|
2014-05-14 16:53:58 +01:00
|
|
|
su = { rootOK = true; forwardXAuth = true; logFailures = true; };
|
2013-10-15 13:47:51 +01:00
|
|
|
passwd = {};
|
2010-06-02 22:10:48 +01:00
|
|
|
# Note: useradd, groupadd etc. aren't setuid root, so it
|
|
|
|
# doesn't really matter what the PAM config says as long as it
|
|
|
|
# lets root in.
|
2013-10-15 13:47:51 +01:00
|
|
|
useradd = { rootOK = true; };
|
|
|
|
usermod = { rootOK = true; };
|
|
|
|
userdel = { rootOK = true; };
|
|
|
|
groupadd = { rootOK = true; };
|
|
|
|
groupmod = { rootOK = true; };
|
|
|
|
groupmems = { rootOK = true; };
|
|
|
|
groupdel = { rootOK = true; };
|
2014-04-11 10:47:01 +01:00
|
|
|
login = { startSession = true; allowNullPassword = true; showMotd = true; updateWtmp = true; };
|
Generate /etc/passwd and /etc/group at build time
This is a rather large commit that switches user/group creation from using
useradd/groupadd on activation to just generating the contents of /etc/passwd
and /etc/group, and then on activation merging the generated files with the
files that exist in the system. This makes the user activation process much
cleaner, in my opinion.
The users.extraUsers.<user>.uid and users.extraGroups.<group>.gid must all be
properly defined (if <user>.createUser is true, which it is by default). My
pull request adds a lot of uids/gids to config.ids to solve this problem for
existing nixos services, but there might be configurations that break because
this change. However, this will be discovered during the build.
Option changes introduced by this commit:
* Remove the options <user>.isSystemUser and <user>.isAlias since
they don't make sense when generating /etc/passwd statically.
* Add <group>.members as a complement to <user>.extraGroups.
* Add <user>.passwordFile for setting a user's password from an encrypted
(shadow-style) file.
* Add users.mutableUsers which is true by default. This means you can keep
managing your users as previously, by using useradd/groupadd manually. This is
accomplished by merging the generated passwd/group file with the existing files
in /etc on system activation. The merging of the files is simplistic. It just
looks at the user/group names. If a user/group exists both on the system and
in the generated files, the system entry will be kept un-changed and the
generated entries will be ignored. The merging itself is performed with the
help of vipw/vigr to properly lock the account files during edit.
If mutableUsers is set to false, the generated passwd and group files will not
be merged with the system files on activation. Instead they will simply replace
the system files, and overwrite any changes done on the running system. The
same logic holds for user password, if the <user>.password or
<user>.passwordFile options are used. If mutableUsers is false, password will
simply be replaced on activation. If true, the initial user passwords will be
set according to the configuration, but existing passwords will not be touched.
I have tested this on a couple of different systems and it seems to work fine
so far. If you think this is a good idea, please test it. This way of adding
local users has been discussed in issue #103 (and this commit solves that
issue).
2013-05-17 16:08:32 +01:00
|
|
|
chpasswd = { rootOK = true; };
|
2013-10-15 13:47:51 +01:00
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2017-01-29 11:44:29 +00:00
|
|
|
security.wrappers = {
|
|
|
|
su.source = "${pkgs.shadow.su}/bin/su";
|
|
|
|
chfn.source = "${pkgs.shadow.out}/bin/chfn";
|
|
|
|
newuidmap.source = "${pkgs.shadow.out}/bin/newuidmap";
|
|
|
|
newgidmap.source = "${pkgs.shadow.out}/bin/newgidmap";
|
2017-01-29 23:10:32 +00:00
|
|
|
} // (if config.users.mutableUsers then {
|
2017-01-29 11:44:29 +00:00
|
|
|
passwd.source = "${pkgs.shadow.out}/bin/passwd";
|
|
|
|
sg.source = "${pkgs.shadow.out}/bin/sg";
|
|
|
|
newgrp.source = "${pkgs.shadow.out}/bin/newgrp";
|
2017-01-29 23:10:32 +00:00
|
|
|
} else {});
|
2010-06-02 22:10:48 +01:00
|
|
|
};
|
2009-05-28 13:24:56 +01:00
|
|
|
}
|