132 lines
3.3 KiB
Nix
Raw Normal View History

2025-06-08 03:04:14 +02:00
{
inputs,
lib,
pkgs,
config,
...
}:
with lib;
let
cfg = config.modules.domain;
domain = inputs.secrets.lab.domain;
domainUpper = lib.strings.toUpper domain;
in
{
options.modules.domain = {
enable = mkEnableOption "Domain Integration";
join = {
userFile = mkOption {
type = types.str;
description = "File containing the user used to join the computer.";
};
passwordFile = mkOption {
type = types.str;
description = "File containing the password for the join user.";
};
domainOUFile = mkOption {
type = types.str;
description = "The OU to join the computer to.";
};
};
};
config = mkIf cfg.enable {
# Set network domain
networking.domain = domain;
networking.search = [ domain ];
# Automatically join the domain
systemd.services.adcli-join = {
description = "Automatically join the domain";
wantedBy = [ "default.target" ];
after = [
2025-06-08 03:39:12 +02:00
"network-online.target"
];
requires = [
"network-online.target"
2025-06-08 03:04:14 +02:00
];
serviceConfig = {
type = "oneshot";
};
script = ''
ADCLI_JOIN_USER=$(cat ${cfg.join.userFile})
ADCLI_JOIN_OU=$(cat ${cfg.join.domainOUFile})
${pkgs.adcli}/bin/adcli join -D ${domain} \
-U $ADCLI_JOIN_USER \
2025-06-08 03:22:10 +02:00
-O $ADCLI_JOIN_OU \
--stdin-password < ${cfg.join.passwordFile}
2025-06-08 03:04:14 +02:00
'';
};
2025-06-08 03:39:12 +02:00
2025-06-09 01:47:48 +02:00
# Set up Kerberos
security.krb5 = {
enable = true;
settings = {
libdefaults = {
default_realm = domainUpper;
};
2025-06-09 01:54:39 +02:00
realms.${domainUpper} = {
};
2025-06-09 01:47:48 +02:00
domain_realm = {
"${domain}" = domainUpper;
".${domain}" = domainUpper;
};
};
};
2025-06-08 03:39:12 +02:00
# Set up SSSD
services.sssd = {
enable = true;
2025-06-09 02:36:07 +02:00
sshAuthorizedKeysIntegration = true;
2025-06-08 03:39:12 +02:00
config = ''
[sssd]
domains = ${domain}
config_file_version = 2
services = nss, pam, ssh
[domain/${domain}]
2025-06-09 03:09:14 +02:00
enumerate = False
2025-06-08 03:39:12 +02:00
ad_domain = ${domain}
krb5_realm = ${domainUpper}
id_provider = ad
auth_provider = ad
access_provider = ad
chpass_provider = ad
2025-06-09 03:09:14 +02:00
use_fully_qualified_names = False
2025-06-09 01:34:29 +02:00
ldap_schema = ad
2025-06-09 03:09:14 +02:00
ldap_id_mapping = True
2025-06-09 01:34:29 +02:00
ad_gpo_access_control = enforcing
2025-06-09 03:09:14 +02:00
ad_gpo_implicit_deny = True
2025-06-08 03:45:33 +02:00
dyndns_update = true
dyndns_refresh_interval = 3600
2025-06-09 03:09:14 +02:00
dyndns_update_ptr = false
2025-06-08 03:45:33 +02:00
dyndns_ttl = 3600
2025-06-09 02:36:07 +02:00
ldap_user_extra_attrs = altSecurityIdentities:altSecurityIdentities
ldap_user_ssh_public_key = altSecurityIdentities
2025-06-08 03:39:12 +02:00
'';
};
systemd.services.sssd = {
after = [ "adcli-join.service" ];
requires = [ "adcli-join.service" ];
};
2025-06-09 04:05:52 +02:00
security.pam.services.login.sssdStrictAccess = true;
2025-06-09 03:42:25 +02:00
security.pam.services.sshd.sssdStrictAccess = true;
2025-06-09 02:17:05 +02:00
# Set up Sudo
security.sudo =
let
admin_group = (lib.replaceStrings [ "-" ] [ "_" ] config.networking.hostName) + "_admin";
in
{
extraConfig = ''
%${admin_group} ALL=(ALL) SETENV: ALL
'';
};
2025-06-09 04:05:52 +02:00
# Set up home directory
2025-06-09 04:07:18 +02:00
security.pam.services.login.makeHomeDir = true;
security.pam.services.sshd.makeHomeDir = true;
2025-06-08 03:04:14 +02:00
};
}