2024-10-08 21:36:52 +02:00
|
|
|
{ config, pkgs, ... }:
|
2022-12-17 17:42:10 +01:00
|
|
|
let
|
2023-09-17 20:10:55 +02:00
|
|
|
domain = "auth.${config.networking.domain}";
|
2024-03-05 15:10:20 +01:00
|
|
|
seedSettings = {
|
2023-07-07 17:13:17 +02:00
|
|
|
groups = [
|
|
|
|
{
|
|
|
|
name = "admins";
|
|
|
|
long_name = "Portunus Admin";
|
|
|
|
members = [ "admin" ];
|
|
|
|
permissions.portunus.is_admin = true;
|
|
|
|
}
|
|
|
|
{
|
|
|
|
name = "search";
|
|
|
|
long_name = "LDAP search group";
|
|
|
|
members = [ "search" ];
|
|
|
|
permissions.ldap.can_read = true;
|
|
|
|
}
|
|
|
|
{
|
|
|
|
name = "fsr";
|
|
|
|
long_name = "Mitglieder des iFSR";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
users = [
|
|
|
|
{
|
|
|
|
login_name = "admin";
|
|
|
|
given_name = "admin";
|
|
|
|
family_name = "admin";
|
|
|
|
password.from_command = [
|
|
|
|
"${pkgs.coreutils}/bin/cat"
|
|
|
|
config.sops.secrets."portunus/admin-password".path
|
|
|
|
];
|
|
|
|
}
|
|
|
|
{
|
|
|
|
login_name = "search";
|
|
|
|
given_name = "search";
|
|
|
|
family_name = "search";
|
|
|
|
password.from_command = [
|
|
|
|
"${pkgs.coreutils}/bin/cat"
|
|
|
|
config.sops.secrets."portunus/search-password".path
|
|
|
|
];
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
2022-12-17 17:42:10 +01:00
|
|
|
in
|
|
|
|
{
|
2023-01-18 14:12:03 +01:00
|
|
|
sops.secrets = {
|
2023-07-07 17:12:59 +02:00
|
|
|
"portunus/admin-password".owner = config.services.portunus.user;
|
|
|
|
"portunus/search-password".owner = config.services.portunus.user;
|
2022-12-02 14:25:55 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
services.portunus = {
|
|
|
|
enable = true;
|
2023-09-17 20:14:32 +02:00
|
|
|
package = pkgs.portunus.overrideAttrs (_old: {
|
2023-07-23 22:28:16 +02:00
|
|
|
patches = [
|
|
|
|
./0001-update-user-validation-regex.patch
|
|
|
|
./0002-both-ldap-and-ldaps.patch
|
2023-09-01 00:14:41 +02:00
|
|
|
./0003-gecos-ascii-escape.patch
|
2023-09-15 13:26:45 +02:00
|
|
|
./0004-make-givenName-optional.patch
|
2023-07-23 22:28:16 +02:00
|
|
|
];
|
2024-03-05 15:10:20 +01:00
|
|
|
doCheck = false; # posix regex related tests break
|
2023-07-04 17:06:18 +02:00
|
|
|
});
|
2023-01-18 14:12:03 +01:00
|
|
|
|
2024-03-05 15:10:20 +01:00
|
|
|
inherit domain seedSettings;
|
2023-07-07 17:12:59 +02:00
|
|
|
port = 8681;
|
|
|
|
ldap = {
|
2022-12-17 19:21:16 +01:00
|
|
|
suffix = "dc=ifsr,dc=de";
|
2023-01-18 14:12:03 +01:00
|
|
|
searchUserName = "search";
|
|
|
|
|
2023-07-23 22:28:16 +02:00
|
|
|
# normally disables port 389 (but not with our patch), use 636 with tls
|
2023-01-18 14:12:03 +01:00
|
|
|
# `portunus.domain` resolves to localhost
|
2023-07-23 22:28:16 +02:00
|
|
|
tls = true;
|
2022-12-02 14:25:55 +01:00
|
|
|
};
|
2023-07-07 17:12:59 +02:00
|
|
|
};
|
2022-12-02 14:25:55 +01:00
|
|
|
|
2023-08-22 15:25:33 +02:00
|
|
|
security.pam.services.sshd.makeHomeDir = true;
|
2023-02-15 11:29:47 +01:00
|
|
|
|
2022-12-17 13:58:06 +01:00
|
|
|
services.nginx = {
|
|
|
|
enable = true;
|
|
|
|
virtualHosts."${config.services.portunus.domain}" = {
|
|
|
|
locations = {
|
|
|
|
"/".proxyPass = "http://localhost:${toString config.services.portunus.port}";
|
|
|
|
};
|
|
|
|
};
|
2022-12-02 14:25:55 +01:00
|
|
|
};
|
2023-11-28 23:00:41 +01:00
|
|
|
networking.firewall = {
|
|
|
|
extraInputRules = ''
|
2024-05-19 11:15:58 +02:00
|
|
|
ip saddr { 141.30.86.192/26, 141.76.100.128/25, 141.30.30.169, 10.88.0.1/16 } tcp dport 636 accept comment "Allow ldaps access from office nets and podman"
|
2023-11-28 23:00:41 +01:00
|
|
|
'';
|
|
|
|
};
|
2022-12-02 14:25:55 +01:00
|
|
|
}
|