97 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
		
		
			
		
	
	
			97 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| 
								 | 
							
								{ config, lib, pkgs, ... }:
							 | 
						||
| 
								 | 
							
								with lib;
							 | 
						||
| 
								 | 
							
								let
							 | 
						||
| 
								 | 
							
								  cfg = config.services.sssd;
							 | 
						||
| 
								 | 
							
								  nscd = config.services.nscd;
							 | 
						||
| 
								 | 
							
								in {
							 | 
						||
| 
								 | 
							
								  options = {
							 | 
						||
| 
								 | 
							
								    services.sssd = {
							 | 
						||
| 
								 | 
							
								      enable = mkEnableOption "the System Security Services Daemon.";
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      config = mkOption {
							 | 
						||
| 
								 | 
							
								        type = types.lines;
							 | 
						||
| 
								 | 
							
								        description = "Contents of <filename>sssd.conf</filename>.";
							 | 
						||
| 
								 | 
							
								        default = ''
							 | 
						||
| 
								 | 
							
								          [sssd]
							 | 
						||
| 
								 | 
							
								          config_file_version = 2
							 | 
						||
| 
								 | 
							
								          services = nss, pam
							 | 
						||
| 
								 | 
							
								          domains = shadowutils
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								          [nss]
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								          [pam]
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								          [domain/shadowutils]
							 | 
						||
| 
								 | 
							
								          id_provider = proxy
							 | 
						||
| 
								 | 
							
								          proxy_lib_name = files
							 | 
						||
| 
								 | 
							
								          auth_provider = proxy
							 | 
						||
| 
								 | 
							
								          proxy_pam_target = sssd-shadowutils
							 | 
						||
| 
								 | 
							
								          proxy_fast_alias = True
							 | 
						||
| 
								 | 
							
								        '';
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      sshAuthorizedKeysIntegration = mkOption {
							 | 
						||
| 
								 | 
							
								        type = types.bool;
							 | 
						||
| 
								 | 
							
								        default = false;
							 | 
						||
| 
								 | 
							
								        description = ''
							 | 
						||
| 
								 | 
							
								          Whether to make sshd look up authorized keys from SSS.
							 | 
						||
| 
								 | 
							
								          For this to work, the <literal>ssh</literal> SSS service must be enabled in the sssd configuration.
							 | 
						||
| 
								 | 
							
								        '';
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								    };
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								  config = mkMerge [
							 | 
						||
| 
								 | 
							
								    (mkIf cfg.enable {
							 | 
						||
| 
								 | 
							
								      assertions = singleton {
							 | 
						||
| 
								 | 
							
								        assertion = nscd.enable;
							 | 
						||
| 
								 | 
							
								        message = "nscd must be enabled through `services.nscd.enable` for SSSD to work.";
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      systemd.services.sssd = {
							 | 
						||
| 
								 | 
							
								        description = "System Security Services Daemon";
							 | 
						||
| 
								 | 
							
								        wantedBy    = [ "multi-user.target" ];
							 | 
						||
| 
								 | 
							
								        before = [ "systemd-user-sessions.service" "nss-user-lookup.target" ];
							 | 
						||
| 
								 | 
							
								        after = [ "network-online.target" "nscd.service" ];
							 | 
						||
| 
								 | 
							
								        requires = [ "network-online.target" "nscd.service" ];
							 | 
						||
| 
								 | 
							
								        wants = [ "nss-user-lookup.target" ];
							 | 
						||
| 
								 | 
							
								        restartTriggers = [
							 | 
						||
| 
								 | 
							
								          config.environment.etc."nscd.conf".source
							 | 
						||
| 
								 | 
							
								          config.environment.etc."sssd/sssd.conf".source
							 | 
						||
| 
								 | 
							
								        ];
							 | 
						||
| 
								 | 
							
								        script = ''
							 | 
						||
| 
								 | 
							
								          export LDB_MODULES_PATH+="''${LDB_MODULES_PATH+:}${pkgs.ldb}/modules/ldb:${pkgs.sssd}/modules/ldb"
							 | 
						||
| 
								 | 
							
								          mkdir -p /var/lib/sss/{pubconf,db,mc,pipes,gpo_cache,secrets} /var/lib/sss/pipes/private /var/lib/sss/pubconf/krb5.include.d
							 | 
						||
| 
								 | 
							
								          ${pkgs.sssd}/bin/sssd -D
							 | 
						||
| 
								 | 
							
								        '';
							 | 
						||
| 
								 | 
							
								        serviceConfig = {
							 | 
						||
| 
								 | 
							
								          Type = "forking";
							 | 
						||
| 
								 | 
							
								          PIDFile = "/run/sssd.pid";
							 | 
						||
| 
								 | 
							
								        };
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      environment.etc."sssd/sssd.conf" = {
							 | 
						||
| 
								 | 
							
								        text = cfg.config;
							 | 
						||
| 
								 | 
							
								        mode = "0400";
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      system.nssModules = optional cfg.enable pkgs.sssd;
							 | 
						||
| 
								 | 
							
								      services.dbus.packages = [ pkgs.sssd ];
							 | 
						||
| 
								 | 
							
								    })
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    (mkIf cfg.sshAuthorizedKeysIntegration {
							 | 
						||
| 
								 | 
							
								    # Ugly: sshd refuses to start if a store path is given because /nix/store is group-writable.
							 | 
						||
| 
								 | 
							
								    # So indirect by a symlink.
							 | 
						||
| 
								 | 
							
								    environment.etc."ssh/authorized_keys_command" = {
							 | 
						||
| 
								 | 
							
								      mode = "0755";
							 | 
						||
| 
								 | 
							
								      text = ''
							 | 
						||
| 
								 | 
							
								        #!/bin/sh
							 | 
						||
| 
								 | 
							
								        exec ${pkgs.sssd}/bin/sss_ssh_authorizedkeys "$@"
							 | 
						||
| 
								 | 
							
								      '';
							 | 
						||
| 
								 | 
							
								    };
							 | 
						||
| 
								 | 
							
								    services.openssh.extraConfig = ''
							 | 
						||
| 
								 | 
							
								      AuthorizedKeysCommand /etc/ssh/authorized_keys_command
							 | 
						||
| 
								 | 
							
								      AuthorizedKeysCommandUser nobody
							 | 
						||
| 
								 | 
							
								    '';
							 | 
						||
| 
								 | 
							
								  })];
							 | 
						||
| 
								 | 
							
								}
							 |