modules: add kanidm-client module

This commit is contained in:
xinyangli 2024-01-09 12:27:51 +08:00
parent 45abb88221
commit 5da958c996
No known key found for this signature in database
8 changed files with 124 additions and 26 deletions

View file

@ -115,7 +115,6 @@
massicot = { name, nodes, pkgs, ... }: with inputs; { massicot = { name, nodes, pkgs, ... }: with inputs; {
deployment.targetHost = "49.13.13.122"; deployment.targetHost = "49.13.13.122";
deployment.targetUser = "xin";
imports = [ imports = [
{ nixpkgs.system = "aarch64-linux"; } { nixpkgs.system = "aarch64-linux"; }

View file

@ -119,13 +119,9 @@
services.kanidm = { services.kanidm = {
enableClient = true; enableClient = true;
enablePam = true;
clientSettings = { clientSettings = {
uri = "https://auth.xinyang.life"; uri = "https://auth.xinyang.life";
}; };
unixSettings = {
pam_allowed_login_groups = [ "linux_users" "xin@auth.xinyang.life" "test" ];
};
}; };
# Enable automatic login for the user. # Enable automatic login for the user.

View file

@ -46,6 +46,32 @@
}; };
}; };
custom.kanidm-client = {
enable = true;
uri = "https://auth.xinyang.life/";
asSSHAuth = {
enable = true;
allowedGroups = [ "linux_users" ];
};
sudoers = [ "xin@auth.xinyang.life" ];
};
services.openssh = {
settings = {
PasswordAuthentication = false;
KbdInteractiveAuthentication = false;
PermitRootLogin = lib.mkForce "no";
GSSAPIAuthentication = "no";
KerberosAuthentication = "no";
};
};
services.fail2ban.enable = true;
security.sudo = {
execWheelOnly = true;
wheelNeedsPassword = false;
};
services.sing-box = let services.sing-box = let
singTls = { singTls = {
enabled = true; enabled = true;

View file

@ -62,31 +62,33 @@
hostName = "massicot"; hostName = "massicot";
}; };
custom.kanidm-client = {
enable = true;
uri = "https://auth.xinyang.life/";
asSSHAuth = {
enable = true;
allowedGroups = [ "linux_users" ];
};
sudoers = [ "xin@auth.xinyang.life" ];
};
security.sudo = {
execWheelOnly = true;
wheelNeedsPassword = false;
};
services.openssh = { services.openssh = {
enable = true; enable = true;
settings = { settings = {
PasswordAuthentication = false; PasswordAuthentication = false;
KbdInteractiveAuthentication = false;
PermitRootLogin = "no";
GSSAPIAuthentication = "no";
KerberosAuthentication = "no";
}; };
}; };
services.fail2ban.enable = true;
systemd.services.sshd.wantedBy = pkgs.lib.mkForce [ "multi-user.target" ]; systemd.services.sshd.wantedBy = pkgs.lib.mkForce [ "multi-user.target" ];
users.users.xin = {
isNormalUser = true;
extraGroups = [ "wheel" "networkmanager" ];
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPBcSvUQnmMFtpftFKIsDqeyUyZHzRg5ewgn3VEcLnss"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIInPn+7cMbH7zCEPJArU/Ot6oq8NHo8a2rYaCfTp7zgd"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPeNQ43f/ce4VxVPsAaKPPTp8rokQpmwNIsOX7JBZq4A"
];
hashedPassword = "$y$j9T$JOJn97hZndiDamUmmT.iq.$ue7gNZz/b14ur8GhyutOCvFjsv.3rcsHmk7m.WRk6u7";
};
security.sudo.extraRules = [
{ users = [ "xin" ];
commands = [ { command = "ALL"; options = [ "NOPASSWD" ]; } ];
}
];
} }

View file

@ -40,7 +40,7 @@ in
value = { value = {
device = "//u380335-sub1.your-storagebox.de/u380335-sub1/${share}"; device = "//u380335-sub1.your-storagebox.de/u380335-sub1/${share}";
fsType = "cifs"; fsType = "cifs";
options = ["uid=${share},gid=${share},credentials=${config.sops.secrets.storage_box_mount.path}"]; options = ["uid=${share},gid=${share},credentials=${config.sops.secrets.storage_box_mount.path},rw,x-systemd.automount"];
}; };
}) [ "forgejo" "gotosocial" "conduit" "hedgedoc" ] ); }) [ "forgejo" "gotosocial" "conduit" "hedgedoc" ] );
@ -112,6 +112,7 @@ in
ROOT_URL = "https://git.xinyang.life/"; ROOT_URL = "https://git.xinyang.life/";
START_SSH_SERVER = true; START_SSH_SERVER = true;
BUILTIN_SSH_SERVER_USER = "git"; BUILTIN_SSH_SERVER_USER = "git";
SSH_USER = "git";
SSH_DOMAIN = "ssh.xinyang.life"; SSH_DOMAIN = "ssh.xinyang.life";
SSH_PORT = 2222; SSH_PORT = 2222;
LFS_MAX_FILE_SIZE = 10737418240; LFS_MAX_FILE_SIZE = 10737418240;
@ -138,6 +139,15 @@ in
}; };
}; };
users.users.git = {
isSystemUser = true;
useDefaultShell = true;
group = "git";
extraGroups = [ "forgejo" ];
};
users.groups.git = { };
services.caddy = { services.caddy = {
enable = true; enable = true;
virtualHosts."xinyang.life:443".extraConfig = '' virtualHosts."xinyang.life:443".extraConfig = ''

View file

@ -67,7 +67,7 @@ in
80 80
]; ];
"editor.mouseWheelZoom" = true; "editor.mouseWheelZoom" = true;
"git.autofetch" = true; "git.autofetch" = false;
"window.zoomLevel" = -1; "window.zoomLevel" = -1;
"nix.enableLanguageServer" = true; "nix.enableLanguageServer" = true;

View file

@ -6,5 +6,6 @@
./prometheus.nix ./prometheus.nix
./hedgedoc.nix ./hedgedoc.nix
./sing-box.nix ./sing-box.nix
./kanidm-client.nix
]; ];
} }

View file

@ -0,0 +1,64 @@
{ config, pkgs, lib, ... }:
with lib;
let
cfg = config.custom.kanidm-client;
in
{
options = {
custom.kanidm-client = {
enable = mkEnableOption "Kanidm client service";
asSSHAuth = mkOption {
type = types.submodule {
options = {
enable = mkEnableOption "Kanidm as system authentication source";
allowedGroups = mkOption {
type = types.listOf types.str;
example = [ "linux_users" ];
};
};
};
};
sudoers = mkOption {
type = types.listOf types.str;
default = [ ];
};
uri = mkOption {
type = types.str;
};
};
};
config = mkIf cfg.enable {
services.kanidm = mkMerge
[ (mkIf cfg.enable {
enableClient = true;
clientSettings = {
uri = cfg.uri;
};
})
(mkIf cfg.asSSHAuth.enable {
enablePam = true;
unixSettings = {
pam_allowed_login_groups = cfg.asSSHAuth.allowedGroups;
default_shell = "/bin/sh";
};
})
];
services.openssh = mkIf cfg.asSSHAuth.enable {
enable = true;
authorizedKeysCommand = "/etc/ssh/auth %u";
authorizedKeysCommandUser = "kanidm-ssh-runner";
};
environment.etc."ssh/auth" = mkIf cfg.asSSHAuth.enable {
mode = "0555";
text = ''
#!${pkgs.stdenv.shell}
${pkgs.kanidm}/bin/kanidm_ssh_authorizedkeys $1
'';
};
users.groups.wheel.members = cfg.sudoers;
users.groups.kanidm-ssh-runner = { };
users.users.kanidm-ssh-runner = { isSystemUser = true; group = "kanidm-ssh-runner"; };
};
}