2023-07-07 17:12:59 +02:00
|
|
|
{ config, lib, pkgs, ... }:
|
2022-12-17 17:42:10 +01:00
|
|
|
let
|
2022-12-17 19:21:16 +01:00
|
|
|
domain = "auth.${config.fsr.domain}";
|
2023-07-07 17:13:17 +02:00
|
|
|
seed = {
|
|
|
|
groups = [
|
|
|
|
{
|
|
|
|
name = "admins";
|
|
|
|
long_name = "Portunus Admin";
|
|
|
|
members = [ "admin" ];
|
|
|
|
permissions.portunus.is_admin = true;
|
|
|
|
}
|
|
|
|
{
|
|
|
|
name = "search";
|
|
|
|
long_name = "LDAP search group";
|
|
|
|
members = [ "search" ];
|
|
|
|
permissions.ldap.can_read = true;
|
|
|
|
}
|
|
|
|
{
|
|
|
|
name = "fsr";
|
|
|
|
long_name = "Mitglieder des iFSR";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
users = [
|
|
|
|
{
|
|
|
|
login_name = "admin";
|
|
|
|
given_name = "admin";
|
|
|
|
family_name = "admin";
|
|
|
|
password.from_command = [
|
|
|
|
"${pkgs.coreutils}/bin/cat"
|
|
|
|
config.sops.secrets."portunus/admin-password".path
|
|
|
|
];
|
|
|
|
}
|
|
|
|
{
|
|
|
|
login_name = "search";
|
|
|
|
given_name = "search";
|
|
|
|
family_name = "search";
|
|
|
|
password.from_command = [
|
|
|
|
"${pkgs.coreutils}/bin/cat"
|
|
|
|
config.sops.secrets."portunus/search-password".path
|
|
|
|
];
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
2022-12-17 17:42:10 +01:00
|
|
|
in
|
|
|
|
{
|
2023-01-18 14:12:03 +01:00
|
|
|
sops.secrets = {
|
2023-07-07 17:12:59 +02:00
|
|
|
"portunus/admin-password".owner = config.services.portunus.user;
|
|
|
|
"portunus/search-password".owner = config.services.portunus.user;
|
|
|
|
"dex/environment".owner = config.systemd.services.dex.serviceConfig.User;
|
|
|
|
nslcd_ldap_search = {
|
|
|
|
key = "portunus/search-password";
|
|
|
|
owner = config.systemd.services.nslcd.serviceConfig.User;
|
2023-01-18 14:12:03 +01:00
|
|
|
};
|
2022-12-02 14:25:55 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
services.portunus = {
|
|
|
|
enable = true;
|
2023-07-04 17:06:18 +02:00
|
|
|
package = pkgs.portunus.overrideAttrs (old: {
|
|
|
|
patches = [ ./0001-update-user-validation-regex.patch ];
|
|
|
|
});
|
2023-01-18 14:12:03 +01:00
|
|
|
|
2023-07-07 17:12:59 +02:00
|
|
|
inherit domain;
|
|
|
|
port = 8681;
|
|
|
|
dex.enable = true;
|
2023-07-07 17:13:17 +02:00
|
|
|
seedPath = pkgs.writeText "portunus-seed.json" (builtins.toJSON seed);
|
2023-01-18 14:12:03 +01:00
|
|
|
|
2023-07-07 17:12:59 +02:00
|
|
|
ldap = {
|
2022-12-17 19:21:16 +01:00
|
|
|
suffix = "dc=ifsr,dc=de";
|
2023-01-18 14:12:03 +01:00
|
|
|
searchUserName = "search";
|
|
|
|
|
|
|
|
# disables port 389, use 636 with tls
|
|
|
|
# `portunus.domain` resolves to localhost
|
2023-02-15 11:29:47 +01:00
|
|
|
#tls = true;
|
2022-12-02 14:25:55 +01:00
|
|
|
};
|
2023-07-07 17:12:59 +02:00
|
|
|
};
|
2022-12-02 14:25:55 +01:00
|
|
|
|
2023-07-07 17:12:59 +02:00
|
|
|
services.dex.settings.oauth2.skipApprovalScreen = true;
|
|
|
|
|
|
|
|
systemd.services.dex.serviceConfig = {
|
|
|
|
DynamicUser = lib.mkForce false;
|
|
|
|
EnvironmentFile = config.sops.secrets."dex/environment".path;
|
|
|
|
StateDirectory = "dex";
|
|
|
|
User = "dex";
|
2022-12-02 14:25:55 +01:00
|
|
|
};
|
|
|
|
|
2023-07-07 17:12:59 +02:00
|
|
|
users = {
|
|
|
|
users.dex = {
|
|
|
|
group = "dex";
|
|
|
|
isSystemUser = true;
|
2023-02-15 11:29:47 +01:00
|
|
|
};
|
2023-07-07 17:12:59 +02:00
|
|
|
groups.dex = { };
|
|
|
|
|
|
|
|
ldap =
|
|
|
|
let portunus = config.services.portunus;
|
|
|
|
in rec {
|
|
|
|
enable = true;
|
|
|
|
server = "ldap://localhost";
|
|
|
|
base = "ou=users,${portunus.ldap.suffix}";
|
|
|
|
bind = {
|
|
|
|
distinguishedName = "uid=${portunus.ldap.searchUserName},${base}";
|
|
|
|
passwordFile = config.sops.secrets.nslcd_ldap_search.path;
|
|
|
|
};
|
|
|
|
daemon.enable = true;
|
|
|
|
};
|
|
|
|
};
|
2023-02-03 15:40:42 +01:00
|
|
|
|
2023-03-10 16:38:57 +01:00
|
|
|
security.pam.services.sshd.text = ''
|
2023-03-10 16:15:53 +01:00
|
|
|
# Account management.
|
|
|
|
account sufficient ${pkgs.nss_pam_ldapd}/lib/security/pam_ldap.so
|
|
|
|
account required pam_unix.so
|
|
|
|
|
|
|
|
# Authentication management.
|
2023-03-10 16:38:57 +01:00
|
|
|
auth sufficient pam_unix.so likeauth try_first_pass
|
2023-03-10 16:15:53 +01:00
|
|
|
auth sufficient ${pkgs.nss_pam_ldapd}/lib/security/pam_ldap.so use_first_pass
|
|
|
|
auth required pam_deny.so
|
|
|
|
|
|
|
|
# Password management.
|
|
|
|
password sufficient pam_unix.so nullok sha512
|
|
|
|
password sufficient ${pkgs.nss_pam_ldapd}/lib/security/pam_ldap.so
|
|
|
|
|
|
|
|
# Session management.
|
|
|
|
session required pam_env.so conffile=/etc/pam/environment readenv=0
|
|
|
|
session required pam_unix.so
|
|
|
|
session required pam_loginuid.so
|
|
|
|
session optional pam_mkhomedir.so
|
|
|
|
session optional ${pkgs.nss_pam_ldapd}/lib/security/pam_ldap.so
|
|
|
|
session optional ${pkgs.systemd}/lib/security/pam_systemd.so
|
|
|
|
'';
|
2023-02-15 11:29:47 +01:00
|
|
|
|
2022-12-17 13:58:06 +01:00
|
|
|
services.nginx = {
|
|
|
|
enable = true;
|
|
|
|
virtualHosts."${config.services.portunus.domain}" = {
|
|
|
|
forceSSL = true;
|
|
|
|
enableACME = true;
|
|
|
|
locations = {
|
|
|
|
"/".proxyPass = "http://localhost:${toString config.services.portunus.port}";
|
2023-07-07 17:12:59 +02:00
|
|
|
"/dex".proxyPass = "http://localhost:${toString config.services.portunus.dex.port}";
|
2022-12-17 13:58:06 +01:00
|
|
|
};
|
|
|
|
};
|
2022-12-02 14:25:55 +01:00
|
|
|
};
|
|
|
|
}
|