modules: add kanidm-client module
This commit is contained in:
parent
45abb88221
commit
5da958c996
8 changed files with 124 additions and 26 deletions
|
@ -6,5 +6,6 @@
|
|||
./prometheus.nix
|
||||
./hedgedoc.nix
|
||||
./sing-box.nix
|
||||
./kanidm-client.nix
|
||||
];
|
||||
}
|
||||
|
|
64
modules/nixos/kanidm-client.nix
Normal file
64
modules/nixos/kanidm-client.nix
Normal file
|
@ -0,0 +1,64 @@
|
|||
{ config, pkgs, lib, ... }:
|
||||
with lib;
|
||||
|
||||
let
|
||||
cfg = config.custom.kanidm-client;
|
||||
in
|
||||
{
|
||||
options = {
|
||||
custom.kanidm-client = {
|
||||
enable = mkEnableOption "Kanidm client service";
|
||||
asSSHAuth = mkOption {
|
||||
type = types.submodule {
|
||||
options = {
|
||||
enable = mkEnableOption "Kanidm as system authentication source";
|
||||
allowedGroups = mkOption {
|
||||
type = types.listOf types.str;
|
||||
example = [ "linux_users" ];
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
sudoers = mkOption {
|
||||
type = types.listOf types.str;
|
||||
default = [ ];
|
||||
};
|
||||
uri = mkOption {
|
||||
type = types.str;
|
||||
};
|
||||
};
|
||||
};
|
||||
config = mkIf cfg.enable {
|
||||
services.kanidm = mkMerge
|
||||
[ (mkIf cfg.enable {
|
||||
enableClient = true;
|
||||
clientSettings = {
|
||||
uri = cfg.uri;
|
||||
};
|
||||
})
|
||||
(mkIf cfg.asSSHAuth.enable {
|
||||
enablePam = true;
|
||||
unixSettings = {
|
||||
pam_allowed_login_groups = cfg.asSSHAuth.allowedGroups;
|
||||
default_shell = "/bin/sh";
|
||||
};
|
||||
})
|
||||
];
|
||||
services.openssh = mkIf cfg.asSSHAuth.enable {
|
||||
enable = true;
|
||||
authorizedKeysCommand = "/etc/ssh/auth %u";
|
||||
authorizedKeysCommandUser = "kanidm-ssh-runner";
|
||||
};
|
||||
environment.etc."ssh/auth" = mkIf cfg.asSSHAuth.enable {
|
||||
mode = "0555";
|
||||
text = ''
|
||||
#!${pkgs.stdenv.shell}
|
||||
${pkgs.kanidm}/bin/kanidm_ssh_authorizedkeys $1
|
||||
'';
|
||||
};
|
||||
users.groups.wheel.members = cfg.sudoers;
|
||||
users.groups.kanidm-ssh-runner = { };
|
||||
users.users.kanidm-ssh-runner = { isSystemUser = true; group = "kanidm-ssh-runner"; };
|
||||
};
|
||||
}
|
||||
|
Loading…
Add table
Add a link
Reference in a new issue