1
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-06-20 16:39:31 +03:00

nixos/sssd: Add secrets handling

Currently, it is not possible to supply sensitive credentials like
`ldap_default_authtok` without writing them to the nix store. This
This commit introduces a new option `environmentFile` where those
credentials can be supplied via environment substitution.
This commit is contained in:
Lara 2021-09-20 08:53:29 +02:00 committed by Maximilian Bosch
parent 22562e9a1c
commit 87942da08e
No known key found for this signature in database
GPG key ID: 9A6EEA275CA5BE0A

View file

@ -3,6 +3,10 @@ with lib;
let let
cfg = config.services.sssd; cfg = config.services.sssd;
nscd = config.services.nscd; nscd = config.services.nscd;
dataDir = "/var/lib/sssd";
settingsFile = "${dataDir}/sssd.conf";
settingsFileUnsubstituted = pkgs.writeText "${dataDir}/sssd-unsubsituted.conf" cfg.config;
in { in {
options = { options = {
services.sssd = { services.sssd = {
@ -47,6 +51,30 @@ in {
Kerberos will be configured to cache credentials in SSS. Kerberos will be configured to cache credentials in SSS.
''; '';
}; };
environmentFile = mkOption {
type = types.nullOr types.path;
default = null;
description = ''
Environment file as defined in <citerefentry>
<refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>.
Secrets may be passed to the service without adding them to the world-readable
Nix store, by specifying placeholder variables as the option value in Nix and
setting these variables accordingly in the environment file.
<programlisting>
# snippet of sssd-related config
[domain/LDAP]
ldap_default_authtok = $SSSD_LDAP_DEFAULT_AUTHTOK
</programlisting>
<programlisting>
# contents of the environment file
SSSD_LDAP_DEFAULT_AUTHTOK=verysecretpassword
</programlisting>
'';
};
}; };
}; };
config = mkMerge [ config = mkMerge [
@ -60,22 +88,28 @@ in {
wants = [ "nss-user-lookup.target" ]; wants = [ "nss-user-lookup.target" ];
restartTriggers = [ restartTriggers = [
config.environment.etc."nscd.conf".source config.environment.etc."nscd.conf".source
config.environment.etc."sssd/sssd.conf".source settingsFileUnsubstituted
]; ];
script = '' script = ''
export LDB_MODULES_PATH+="''${LDB_MODULES_PATH+:}${pkgs.ldb}/modules/ldb:${pkgs.sssd}/modules/ldb" export LDB_MODULES_PATH+="''${LDB_MODULES_PATH+:}${pkgs.ldb}/modules/ldb:${pkgs.sssd}/modules/ldb"
mkdir -p /var/lib/sss/{pubconf,db,mc,pipes,gpo_cache,secrets} /var/lib/sss/pipes/private /var/lib/sss/pubconf/krb5.include.d mkdir -p /var/lib/sss/{pubconf,db,mc,pipes,gpo_cache,secrets} /var/lib/sss/pipes/private /var/lib/sss/pubconf/krb5.include.d
${pkgs.sssd}/bin/sssd -D ${pkgs.sssd}/bin/sssd -D -c ${settingsFile}
''; '';
serviceConfig = { serviceConfig = {
Type = "forking"; Type = "forking";
PIDFile = "/run/sssd.pid"; PIDFile = "/run/sssd.pid";
StateDirectory = baseNameOf dataDir;
EnvironmentFile = lib.mkIf (cfg.environmentFile != null) cfg.environmentFile;
}; };
}; preStart = ''
[ -f ${settingsFile} ] && rm -f ${settingsFile}
environment.etc."sssd/sssd.conf" = { old_umask=$(umask)
text = cfg.config; umask 0177
mode = "0400"; ${pkgs.envsubst}/bin/envsubst \
-o ${settingsFile} \
-i ${settingsFileUnsubstituted}
umask $old_umask
'';
}; };
system.nssModules = [ pkgs.sssd ]; system.nssModules = [ pkgs.sssd ];