Merge branch 'collabora-admin' into 'collabora'

feat: add authentification for collabora admin page via pam

See merge request nounous/nixos!52
merge-requests/52/merge
PyJaC++ 2025-12-22 14:28:13 +01:00
commit a38aa972a0
1 changed files with 31 additions and 1 deletions

View File

@ -1,5 +1,15 @@
{ config, ... }:
{ config, pkgs, ... }:
let
authorizedGroupsFile = pkgs.writeText "collabora-admin-groups" ''
root
_nounou
'';
pam_modules_path = "${pkgs.pam}/lib/security";
# nixos/modules/security/pam.nix
pam_ldap = "${if config.users.ldap.daemon.enable then pkgs.nss_pam_ldapd else pkgs.pam_ldap}/lib/security";
in
{
services.collabora-online = {
enable = true;
@ -21,10 +31,30 @@
host = ["nextcloud.crans.org" "nextcloud.adm.crans.org"];
};
admin_console.enable_pam = true;
server_name = "collabora.crans.org";
};
};
# Authentification pour la console d'administration (accès pour les nounous)
security.pam.services.coolwsd.text = ''
# Accounts
account sufficient ${pam_ldap}/pam_ldap.so
account required ${pam_modules_path}/pam_unix.so
# Authentification
# On teste un compte unix. Si on en a un, on passe la règle ldap et on lance la règle des groupes.
auth [success=1 new_authtok_reqd=1 default=ignore] ${pam_modules_path}/pam_unix.so likeauth try_first_pass
# On tente le ldap et on fail sinon.
auth requisite ${pam_ldap}/pam_ldap.so use_first_pass
# On vérifie le groupe de l'utilisateur
auth [success=done new_authtok_reqd=done default=die] ${pam_modules_path}/pam_listfile.so item=group sense=allow file=${authorizedGroupsFile} onerr=fail
# session et password ne sont pas pertinents pour de l'authentification de coolwsd.
'';
services.nginx = {
enable = true;