diff options
author | Martin Weinelt <hexa@darmstadt.ccc.de> | 2023-08-01 12:56:10 +0200 |
---|---|---|
committer | Martin Weinelt <hexa@darmstadt.ccc.de> | 2023-08-01 17:13:58 +0200 |
commit | 184d15cc068def96972c88a4d4a80336fe13bc88 (patch) | |
tree | b7630cf4cb5fe6949b61ad357db9f1ae942bc188 /nixos | |
parent | b6fbd87328f8eabd82d65cc8f75dfb74341b0ace (diff) | |
download | nixlib-184d15cc068def96972c88a4d4a80336fe13bc88.tar nixlib-184d15cc068def96972c88a4d4a80336fe13bc88.tar.gz nixlib-184d15cc068def96972c88a4d4a80336fe13bc88.tar.bz2 nixlib-184d15cc068def96972c88a4d4a80336fe13bc88.tar.lz nixlib-184d15cc068def96972c88a4d4a80336fe13bc88.tar.xz nixlib-184d15cc068def96972c88a4d4a80336fe13bc88.tar.zst nixlib-184d15cc068def96972c88a4d4a80336fe13bc88.zip |
kanidm: 1.1.0-alpha.12 -> 1.1.0-beta.13
https://github.com/kanidm/kanidm/releases/tag/v1.1.0-beta.13 The kanidmd process now creates a unix socket, over which admin tasks can be done, without having to shut kanidm down first. The kanidm_unixd process now wants access to /etc/shadow and /etc/group, so it can rule out collisions with the host system.
Diffstat (limited to 'nixos')
-rw-r--r-- | nixos/modules/services/security/kanidm.nix | 17 | ||||
-rw-r--r-- | nixos/tests/kanidm.nix | 9 |
2 files changed, 17 insertions, 9 deletions
diff --git a/nixos/modules/services/security/kanidm.nix b/nixos/modules/services/security/kanidm.nix index cea2a56bdcd1..6fb9f71a489e 100644 --- a/nixos/modules/services/security/kanidm.nix +++ b/nixos/modules/services/security/kanidm.nix @@ -122,8 +122,8 @@ in }; log_level = lib.mkOption { description = lib.mdDoc "Log level of the server."; - default = "default"; - type = lib.types.enum [ "default" "verbose" "perfbasic" "perffull" ]; + default = "info"; + type = lib.types.enum [ "info" "debug" "trace" ]; }; role = lib.mkOption { description = lib.mdDoc "The role of this server. This affects the replication relationship and thereby available features."; @@ -236,17 +236,23 @@ in { StateDirectory = "kanidm"; StateDirectoryMode = "0700"; + RuntimeDirectory = "kanidmd"; ExecStart = "${pkgs.kanidm}/bin/kanidmd server -c ${serverConfigFile}"; User = "kanidm"; Group = "kanidm"; + BindPaths = [ + # To create the socket + "/run/kanidmd:/run/kanidmd" + ]; + AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ]; CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" ]; # This would otherwise override the CAP_NET_BIND_SERVICE capability. PrivateUsers = lib.mkForce false; # Port needs to be exposed to the host network PrivateNetwork = lib.mkForce false; - RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ]; + RestrictAddressFamilies = [ "AF_INET" "AF_INET6" "AF_UNIX" ]; TemporaryFileSystem = "/:ro"; } ]; @@ -273,6 +279,8 @@ in "-/etc/static/kanidm" "-/etc/ssl" "-/etc/static/ssl" + "-/etc/passwd" + "-/etc/group" ]; BindPaths = [ # To create the socket @@ -327,6 +335,9 @@ in # These paths are hardcoded environment.etc = lib.mkMerge [ + (lib.mkIf cfg.enableServer { + "kanidm/server.toml".source = serverConfigFile; + }) (lib.mkIf options.services.kanidm.clientSettings.isDefined { "kanidm/config".source = clientConfigFile; }) diff --git a/nixos/tests/kanidm.nix b/nixos/tests/kanidm.nix index 673a65174dfe..3f5bca397740 100644 --- a/nixos/tests/kanidm.nix +++ b/nixos/tests/kanidm.nix @@ -67,9 +67,10 @@ import ./make-test-python.nix ({ pkgs, ... }: '' start_all() server.wait_for_unit("kanidm.service") + client.wait_for_unit("network-online.target") with subtest("Test HTTP interface"): - server.wait_until_succeeds("curl -sf https://${serverDomain} | grep Kanidm") + server.wait_until_succeeds("curl -Lsf https://${serverDomain} | grep Kanidm") with subtest("Test LDAP interface"): server.succeed("ldapsearch -H ldaps://${serverDomain}:636 -b '${ldapBaseDN}' -x '(name=test)'") @@ -80,15 +81,11 @@ import ./make-test-python.nix ({ pkgs, ... }: client.succeed("kanidm logout") with subtest("Recover idm_admin account"): - # Must stop the server for account recovery or else kanidmd fails with - # "unable to lock kanidm exclusive lock at /var/lib/kanidm/kanidm.db.klock". - server.succeed("systemctl stop kanidm") idm_admin_password = server.succeed("su - kanidm -c 'kanidmd recover-account -c ${serverConfigFile} idm_admin 2>&1 | rg -o \'[A-Za-z0-9]{48}\' '").strip().removeprefix("'").removesuffix("'") - server.succeed("systemctl start kanidm") with subtest("Test unixd connection"): client.wait_for_unit("kanidm-unixd.service") - # TODO: client.wait_for_file("/run/kanidm-unixd/sock") + client.wait_for_file("/run/kanidm-unixd/sock") client.wait_until_succeeds("kanidm-unix status | grep working!") with subtest("Test user creation"): |