nixos/sssd: add an option to enable KCM support
This commit is contained in:
@@ -38,6 +38,15 @@ in {
|
|||||||
For this to work, the <literal>ssh</literal> SSS service must be enabled in the sssd configuration.
|
For this to work, the <literal>ssh</literal> SSS service must be enabled in the sssd configuration.
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
|
kcm = mkOption {
|
||||||
|
type = types.bool;
|
||||||
|
default = false;
|
||||||
|
description = ''
|
||||||
|
Whether to use SSS as a Kerberos Cache Manager (KCM).
|
||||||
|
Kerberos will be configured to cache credentials in SSS.
|
||||||
|
'';
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
config = mkMerge [
|
config = mkMerge [
|
||||||
@@ -79,6 +88,28 @@ in {
|
|||||||
services.dbus.packages = [ pkgs.sssd ];
|
services.dbus.packages = [ pkgs.sssd ];
|
||||||
})
|
})
|
||||||
|
|
||||||
|
(mkIf cfg.kcm {
|
||||||
|
systemd.services.sssd-kcm = {
|
||||||
|
description = "SSSD Kerberos Cache Manager";
|
||||||
|
requires = [ "sssd-kcm.socket" ];
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStartPre = "-${pkgs.sssd}/bin/sssd --genconf-section=kcm";
|
||||||
|
ExecStart = "${pkgs.sssd}/libexec/sssd/sssd_kcm --uid 0 --gid 0";
|
||||||
|
};
|
||||||
|
restartTriggers = [
|
||||||
|
config.environment.etc."sssd/sssd.conf".source
|
||||||
|
];
|
||||||
|
};
|
||||||
|
systemd.sockets.sssd-kcm = {
|
||||||
|
description = "SSSD Kerberos Cache Manager responder socket";
|
||||||
|
wantedBy = [ "sockets.target" ];
|
||||||
|
# Matches the default in MIT krb5 and Heimdal:
|
||||||
|
# https://github.com/krb5/krb5/blob/krb5-1.19.3-final/src/include/kcm.h#L43
|
||||||
|
listenStreams = [ "/var/run/.heim_org.h5l.kcm-socket" ];
|
||||||
|
};
|
||||||
|
krb5.libdefaults.default_ccache_name = "KCM:";
|
||||||
|
})
|
||||||
|
|
||||||
(mkIf cfg.sshAuthorizedKeysIntegration {
|
(mkIf cfg.sshAuthorizedKeysIntegration {
|
||||||
# Ugly: sshd refuses to start if a store path is given because /nix/store is group-writable.
|
# Ugly: sshd refuses to start if a store path is given because /nix/store is group-writable.
|
||||||
# So indirect by a symlink.
|
# So indirect by a symlink.
|
||||||
|
|||||||
Reference in New Issue
Block a user