176 lines
4.7 KiB
Nix
Raw Normal View History

2025-06-08 03:04:14 +02:00
{
inputs,
lib,
pkgs,
config,
...
}:
with lib;
let
cfg = config.modules.domain;
domain = inputs.secrets.lab.domain;
domainUpper = lib.strings.toUpper domain;
in
{
options.modules.domain = {
enable = mkEnableOption "Domain Integration";
join = {
userFile = mkOption {
type = types.str;
description = "File containing the user used to join the computer.";
};
passwordFile = mkOption {
type = types.str;
description = "File containing the password for the join user.";
};
domainOUFile = mkOption {
type = types.str;
description = "The OU to join the computer to.";
};
};
};
config = mkIf cfg.enable {
# Set network domain
networking.domain = domain;
networking.search = [ domain ];
# Automatically join the domain
systemd.services.adcli-join = {
description = "Automatically join the domain";
wantedBy = [ "default.target" ];
after = [
2025-06-08 03:39:12 +02:00
"network-online.target"
];
requires = [
"network-online.target"
2025-06-08 03:04:14 +02:00
];
serviceConfig = {
type = "oneshot";
};
script = ''
ADCLI_JOIN_USER=$(cat ${cfg.join.userFile})
ADCLI_JOIN_OU=$(cat ${cfg.join.domainOUFile})
${pkgs.adcli}/bin/adcli join -D ${domain} \
-U $ADCLI_JOIN_USER \
2025-06-08 03:22:10 +02:00
-O $ADCLI_JOIN_OU \
--stdin-password < ${cfg.join.passwordFile}
2025-06-08 03:04:14 +02:00
'';
};
2025-06-08 03:39:12 +02:00
2025-06-09 01:47:48 +02:00
# Set up Kerberos
security.krb5 = {
enable = true;
settings = {
libdefaults = {
default_realm = domainUpper;
};
2025-06-09 01:54:39 +02:00
realms.${domainUpper} = {
};
2025-06-09 01:47:48 +02:00
domain_realm = {
"${domain}" = domainUpper;
".${domain}" = domainUpper;
};
};
};
2025-06-08 03:39:12 +02:00
# Set up SSSD
services.sssd = {
enable = true;
2025-06-09 02:36:07 +02:00
sshAuthorizedKeysIntegration = true;
2025-06-08 03:39:12 +02:00
config = ''
[sssd]
domains = ${domain}
config_file_version = 2
services = nss, pam, ssh
[nss]
filter_users = ${concatStringsSep "," (lib.attrNames config.users.users)}
filter_groups = ${concatStringsSep "," (lib.attrNames config.users.groups)}
2025-06-08 03:39:12 +02:00
[domain/${domain}]
2025-06-09 03:09:14 +02:00
enumerate = False
2025-06-08 03:39:12 +02:00
ad_domain = ${domain}
krb5_realm = ${domainUpper}H
2025-06-08 03:39:12 +02:00
id_provider = ad
auth_provider = ad
access_provider = ad
chpass_provider = ad
2025-06-09 03:09:14 +02:00
use_fully_qualified_names = False
2025-06-09 01:34:29 +02:00
ldap_schema = ad
2025-06-09 03:09:14 +02:00
ldap_id_mapping = True
2025-06-09 01:34:29 +02:00
ad_gpo_access_control = enforcing
2025-06-09 03:09:14 +02:00
ad_gpo_implicit_deny = True
2025-06-08 03:45:33 +02:00
dyndns_update = true
dyndns_refresh_interval = 3600
2025-06-09 03:09:14 +02:00
dyndns_update_ptr = false
2025-06-08 03:45:33 +02:00
dyndns_ttl = 3600
2025-06-09 02:36:07 +02:00
ldap_user_extra_attrs = altSecurityIdentities:altSecurityIdentities
ldap_user_ssh_public_key = altSecurityIdentities
2025-06-08 03:39:12 +02:00
'';
};
systemd.services.sssd = {
after = [ "adcli-join.service" ];
requires = [ "adcli-join.service" ];
};
2025-06-09 04:05:52 +02:00
security.pam.services.login.sssdStrictAccess = true;
2025-06-09 03:42:25 +02:00
security.pam.services.sshd.sssdStrictAccess = true;
2025-06-09 02:17:05 +02:00
# Set up Sudo
security.sudo =
let
admin_group = (lib.replaceStrings [ "-" ] [ "_" ] config.networking.hostName) + "_admin";
in
{
extraConfig = ''
%${admin_group} ALL=(ALL) SETENV: ALL
'';
};
2025-06-09 04:05:52 +02:00
# Set up home directory
2025-06-09 04:07:18 +02:00
security.pam.services.login.makeHomeDir = true;
security.pam.services.sshd.makeHomeDir = true;
2025-06-09 13:24:58 +02:00
environment.etc.profile.text =
let
# TODO: Activate configuration based on AD group
homeConfiguration = inputs.home-manager.lib.homeManagerConfiguration {
inherit pkgs;
modules = [
(
{ ... }:
{
home.stateVersion = "24.11";
home.username = "$USER";
home.homeDirectory = "/.$HOME";
2025-06-09 13:06:29 +02:00
modules.profiles.base.enable = true;
}
)
] ++ config.home-manager.sharedModules;
};
in
2025-06-09 13:24:58 +02:00
mkAfter ''
# Activate Home Manager configuration for domain users
if id | egrep -o 'groups=.*' | sed 's/,/\n/g' | cut -d'(' -f2 | sed 's/)//' | egrep -o "^domain users$"; then
echo "Setting up environment for domain user"
2025-06-09 13:06:29 +02:00
SKIP_SANITY_CHECKS=1 ${homeConfiguration.activationPackage}/activate
2025-06-09 13:24:58 +02:00
. $HOME/.bashrc
fi
'';
2025-06-10 01:15:50 +02:00
# Mount home directory
services.autofs = {
enable = true;
autoMaster =
let
networkMap = pkgs.writeText "auto" ''
2025-06-10 01:27:47 +02:00
home -fstype=cifs,multiuser,cruid=''${UID},sec=krb5 ://${inputs.secrets.lab.nas.host}/home
2025-06-10 01:15:50 +02:00
'';
in
''
2025-06-10 01:27:47 +02:00
/network ${networkMap}
2025-06-10 01:15:50 +02:00
'';
};
2025-06-08 03:04:14 +02:00
};
}