316 lines
8.6 KiB
Nix
316 lines
8.6 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
|
|
inherit (pkgs) cups cups_filters;
|
|
|
|
cfg = config.services.printing;
|
|
|
|
additionalBackends = pkgs.runCommand "additional-cups-backends" { }
|
|
''
|
|
mkdir -p $out
|
|
if [ ! -e ${cups}/lib/cups/backend/smb ]; then
|
|
mkdir -p $out/lib/cups/backend
|
|
ln -sv ${pkgs.samba}/bin/smbspool $out/lib/cups/backend/smb
|
|
fi
|
|
|
|
# Provide support for printing via HTTPS.
|
|
if [ ! -e ${cups}/lib/cups/backend/https ]; then
|
|
mkdir -p $out/lib/cups/backend
|
|
ln -sv ${cups}/lib/cups/backend/ipp $out/lib/cups/backend/https
|
|
fi
|
|
'';
|
|
|
|
# Here we can enable additional backends, filters, etc. that are not
|
|
# part of CUPS itself, e.g. the SMB backend is part of Samba. Since
|
|
# we can't update ${cups}/lib/cups itself, we create a symlink tree
|
|
# here and add the additional programs. The ServerBin directive in
|
|
# cupsd.conf tells cupsd to use this tree.
|
|
bindir = pkgs.buildEnv {
|
|
name = "cups-progs";
|
|
paths = cfg.drivers;
|
|
pathsToLink = [ "/lib/cups" "/share/cups" "/bin" "/etc/cups" ];
|
|
postBuild = cfg.bindirCmds;
|
|
ignoreCollisions = true;
|
|
};
|
|
|
|
in
|
|
|
|
{
|
|
|
|
###### interface
|
|
|
|
options = {
|
|
services.printing = {
|
|
|
|
enable = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Whether to enable printing support through the CUPS daemon.
|
|
'';
|
|
};
|
|
|
|
listenAddresses = mkOption {
|
|
type = types.listOf types.str;
|
|
default = [ "127.0.0.1:631" ];
|
|
example = [ "*:631" ];
|
|
description = ''
|
|
A list of addresses and ports on which to listen.
|
|
'';
|
|
};
|
|
|
|
bindirCmds = mkOption {
|
|
type = types.lines;
|
|
internal = true;
|
|
default = "";
|
|
description = ''
|
|
Additional commands executed while creating the directory
|
|
containing the CUPS server binaries.
|
|
'';
|
|
};
|
|
|
|
cupsdConf = mkOption {
|
|
type = types.lines;
|
|
default = "";
|
|
example =
|
|
''
|
|
BrowsePoll cups.example.com
|
|
LogLevel debug
|
|
'';
|
|
description = ''
|
|
The contents of the configuration file of the CUPS daemon
|
|
(<filename>cupsd.conf</filename>).
|
|
'';
|
|
};
|
|
|
|
cupsFilesConf = mkOption {
|
|
type = types.lines;
|
|
default = "";
|
|
description = ''
|
|
The contents of the configuration file of the CUPS daemon
|
|
(<filename>cups-files.conf</filename>).
|
|
'';
|
|
};
|
|
|
|
extraConf = mkOption {
|
|
type = types.lines;
|
|
default = "";
|
|
example =
|
|
''
|
|
BrowsePoll cups.example.com
|
|
LogLevel debug
|
|
'';
|
|
description = ''
|
|
Extra contents of the configuration file of the CUPS daemon
|
|
(<filename>cupsd.conf</filename>).
|
|
'';
|
|
};
|
|
|
|
clientConf = mkOption {
|
|
type = types.lines;
|
|
default = "";
|
|
example =
|
|
''
|
|
ServerName server.example.com
|
|
Encryption Never
|
|
'';
|
|
description = ''
|
|
The contents of the client configuration.
|
|
(<filename>client.conf</filename>)
|
|
'';
|
|
};
|
|
|
|
browsedConf = mkOption {
|
|
type = types.lines;
|
|
default = "";
|
|
example =
|
|
''
|
|
BrowsePoll cups.example.com
|
|
'';
|
|
description = ''
|
|
The contents of the configuration. file of the CUPS Browsed daemon
|
|
(<filename>cups-browsed.conf</filename>)
|
|
'';
|
|
};
|
|
|
|
drivers = mkOption {
|
|
type = types.listOf types.path;
|
|
example = literalExample "[ pkgs.splix ]";
|
|
description = ''
|
|
CUPS drivers to use. Drivers provided by CUPS, cups-filters, Ghostscript
|
|
and Samba are added unconditionally.
|
|
'';
|
|
};
|
|
|
|
tempDir = mkOption {
|
|
type = types.path;
|
|
default = "/tmp";
|
|
example = "/tmp/cups";
|
|
description = ''
|
|
CUPSd temporary directory.
|
|
'';
|
|
};
|
|
};
|
|
|
|
};
|
|
|
|
|
|
###### implementation
|
|
|
|
config = mkIf config.services.printing.enable {
|
|
|
|
users.extraUsers = singleton
|
|
{ name = "cups";
|
|
uid = config.ids.uids.cups;
|
|
group = "lp";
|
|
description = "CUPS printing services";
|
|
};
|
|
|
|
environment.systemPackages = [ cups ];
|
|
|
|
environment.etc."cups/client.conf".text = cfg.clientConf;
|
|
environment.etc."cups/cups-files.conf".text = cfg.cupsFilesConf;
|
|
environment.etc."cups/cupsd.conf".text = cfg.cupsdConf;
|
|
environment.etc."cups/cups-browsed.conf".text = cfg.browsedConf;
|
|
|
|
services.dbus.packages = [ cups ];
|
|
|
|
# Cups uses libusb to talk to printers, and does not use the
|
|
# linux kernel driver. If the driver is not in a black list, it
|
|
# gets loaded, and then cups cannot access the printers.
|
|
boot.blacklistedKernelModules = [ "usblp" ];
|
|
|
|
systemd.services.cups =
|
|
{ description = "CUPS Printing Daemon";
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
wants = [ "network.target" ];
|
|
after = [ "network.target" ];
|
|
|
|
path = [ cups ];
|
|
|
|
preStart =
|
|
''
|
|
mkdir -m 0755 -p /etc/cups
|
|
mkdir -m 0700 -p /var/cache/cups
|
|
mkdir -m 0700 -p /var/spool/cups
|
|
mkdir -m 0755 -p ${cfg.tempDir}
|
|
'';
|
|
|
|
serviceConfig.Type = "forking";
|
|
serviceConfig.ExecStart = "@${cups}/sbin/cupsd cupsd";
|
|
|
|
restartTriggers =
|
|
[ config.environment.etc."cups/cups-files.conf".source
|
|
config.environment.etc."cups/cupsd.conf".source
|
|
];
|
|
};
|
|
|
|
systemd.services.cups-browsed =
|
|
{ description = "Make remote CUPS printers available locally";
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
wants = [ "cups.service" "avahi-daemon.service" ];
|
|
after = [ "cups.service" "avahi-daemon.service" ];
|
|
|
|
path = [ cups ];
|
|
|
|
serviceConfig.ExecStart = "${cups_filters}/bin/cups-browsed";
|
|
|
|
restartTriggers =
|
|
[ config.environment.etc."cups/cups-browsed.conf".source
|
|
];
|
|
};
|
|
|
|
services.printing.drivers =
|
|
[ cups pkgs.ghostscript pkgs.cups_filters additionalBackends
|
|
pkgs.perl pkgs.coreutils pkgs.gnused pkgs.bc pkgs.gawk pkgs.gnugrep
|
|
];
|
|
|
|
services.printing.cupsFilesConf =
|
|
''
|
|
SystemGroup root wheel
|
|
|
|
ServerBin ${bindir}/lib/cups
|
|
DataDir ${bindir}/share/cups
|
|
|
|
AccessLog syslog
|
|
ErrorLog syslog
|
|
PageLog syslog
|
|
|
|
TempDir ${cfg.tempDir}
|
|
|
|
# User and group used to run external programs, including
|
|
# those that actually send the job to the printer. Note that
|
|
# Udev sets the group of printer devices to `lp', so we want
|
|
# these programs to run as `lp' as well.
|
|
User cups
|
|
Group lp
|
|
'';
|
|
|
|
services.printing.cupsdConf =
|
|
''
|
|
LogLevel info
|
|
|
|
${concatMapStrings (addr: ''
|
|
Listen ${addr}
|
|
'') cfg.listenAddresses}
|
|
Listen /var/run/cups/cups.sock
|
|
|
|
SetEnv PATH ${bindir}/lib/cups/filter:${bindir}/bin:${bindir}/sbin
|
|
|
|
Browsing On
|
|
BrowseOrder allow,deny
|
|
BrowseAllow @LOCAL
|
|
|
|
DefaultAuthType Basic
|
|
|
|
<Location />
|
|
Order allow,deny
|
|
Allow localhost
|
|
</Location>
|
|
|
|
<Location /admin>
|
|
Order allow,deny
|
|
Allow localhost
|
|
</Location>
|
|
|
|
<Location /admin/conf>
|
|
AuthType Basic
|
|
Require user @SYSTEM
|
|
Order allow,deny
|
|
Allow localhost
|
|
</Location>
|
|
|
|
<Policy default>
|
|
<Limit Send-Document Send-URI Hold-Job Release-Job Restart-Job Purge-Jobs Set-Job-Attributes Create-Job-Subscription Renew-Subscription Cancel-Subscription Get-Notifications Reprocess-Job Cancel-Current-Job Suspend-Current-Job Resume-Job CUPS-Move-Job>
|
|
Require user @OWNER @SYSTEM
|
|
Order deny,allow
|
|
</Limit>
|
|
|
|
<Limit Pause-Printer Resume-Printer Set-Printer-Attributes Enable-Printer Disable-Printer Pause-Printer-After-Current-Job Hold-New-Jobs Release-Held-New-Jobs Deactivate-Printer Activate-Printer Restart-Printer Shutdown-Printer Startup-Printer Promote-Job Schedule-Job-After CUPS-Add-Printer CUPS-Delete-Printer CUPS-Add-Class CUPS-Delete-Class CUPS-Accept-Jobs CUPS-Reject-Jobs CUPS-Set-Default>
|
|
AuthType Basic
|
|
Require user @SYSTEM
|
|
Order deny,allow
|
|
</Limit>
|
|
|
|
<Limit Cancel-Job CUPS-Authenticate-Job>
|
|
Require user @OWNER @SYSTEM
|
|
Order deny,allow
|
|
</Limit>
|
|
|
|
<Limit All>
|
|
Order deny,allow
|
|
</Limit>
|
|
</Policy>
|
|
|
|
${cfg.extraConf}
|
|
'';
|
|
|
|
security.pam.services.cups = {};
|
|
|
|
};
|
|
}
|