using dex for auth in portunus
This commit is contained in:
parent
09330c5204
commit
79b4de5165
4 changed files with 68 additions and 55 deletions
24
flake.lock
generated
24
flake.lock
generated
|
@ -71,11 +71,11 @@
|
||||||
},
|
},
|
||||||
"nixpkgs-stable": {
|
"nixpkgs-stable": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1681005198,
|
"lastModified": 1683504292,
|
||||||
"narHash": "sha256-5LrnBeXR7Hv8OXh6eany7br4qBW+ZNl4LKf1CJu9zbg=",
|
"narHash": "sha256-jlZbBIKGa6IMGkcJkQ08pbKnouTAPfeq1fD5I7l/rBw=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "e45cc0138829ad86e7ff17a76acf2d05e781e30a",
|
"rev": "ba0086c178d4ed60a7899f739caea553eca2e046",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -87,16 +87,16 @@
|
||||||
},
|
},
|
||||||
"nixpkgs_2": {
|
"nixpkgs_2": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1681269223,
|
"lastModified": 1682690464,
|
||||||
"narHash": "sha256-i6OeI2f7qGvmLfD07l1Az5iBL+bFeP0RHixisWtpUGo=",
|
"narHash": "sha256-GGbMZLYG7/4oZupWeBbw7qx7QEnDDyVE0IEmnsy+NnY=",
|
||||||
"owner": "nixos",
|
"owner": "revol-xut",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "87edbd74246ccdfa64503f334ed86fa04010bab9",
|
"rev": "a381a30411963ccb19030b8b49e071bd21aa8517",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nixos",
|
"owner": "revol-xut",
|
||||||
"ref": "nixos-22.11",
|
"ref": "master",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
|
@ -116,11 +116,11 @@
|
||||||
"nixpkgs-stable": "nixpkgs-stable"
|
"nixpkgs-stable": "nixpkgs-stable"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1681209176,
|
"lastModified": 1683545104,
|
||||||
"narHash": "sha256-wyQokPpkNZnsl/bVf8m1428tfA0hJ0w/qexq4EizhTc=",
|
"narHash": "sha256-48wC0zzHAej/wLFWIgV+uj63AvQ2UUk85g7wmXJzTqk=",
|
||||||
"owner": "Mic92",
|
"owner": "Mic92",
|
||||||
"repo": "sops-nix",
|
"repo": "sops-nix",
|
||||||
"rev": "00d5fd73756d424de5263b92235563bc06f2c6e1",
|
"rev": "36b062a2c85a0efb37de1300c79c54602a094fab",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
{
|
{
|
||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs.url = github:nixos/nixpkgs/nixos-22.11;
|
nixpkgs.url = github:revol-xut/nixpkgs/master;
|
||||||
sops-nix.url = github:Mic92/sops-nix;
|
sops-nix.url = github:Mic92/sops-nix;
|
||||||
sops-nix.inputs.nixpkgs.follows = "nixpkgs";
|
sops-nix.inputs.nixpkgs.follows = "nixpkgs";
|
||||||
fsr-infoscreen.url = github:fsr/infoscreen;
|
fsr-infoscreen.url = github:fsr/infoscreen;
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{ config, pkgs, ... }:
|
{ config, lib, pkgs, ... }:
|
||||||
let
|
let
|
||||||
domain = "auth.${config.fsr.domain}";
|
domain = "auth.${config.fsr.domain}";
|
||||||
|
|
||||||
|
@ -9,50 +9,33 @@ let
|
||||||
ldapGroup = "openldap";
|
ldapGroup = "openldap";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
sops.secrets.unix_ldap_search = {
|
|
||||||
key = "portunus_search";
|
|
||||||
owner = config.systemd.services.nslcd.serviceConfig.User;
|
|
||||||
};
|
|
||||||
|
|
||||||
|
|
||||||
users.users."${portunusUser}" = {
|
|
||||||
isSystemUser = true;
|
|
||||||
group = "${portunusGroup}";
|
|
||||||
};
|
|
||||||
|
|
||||||
users.groups."${portunusGroup}" = {
|
|
||||||
name = "${portunusGroup}";
|
|
||||||
members = [ "${portunusUser}" ];
|
|
||||||
};
|
|
||||||
|
|
||||||
users.users."${ldapUser}" = {
|
|
||||||
isSystemUser = true;
|
|
||||||
group = "${ldapGroup}";
|
|
||||||
};
|
|
||||||
|
|
||||||
users.groups."${ldapGroup}" = {
|
|
||||||
name = "${ldapGroup}";
|
|
||||||
members = [ "${ldapUser}" ];
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets = {
|
sops.secrets = {
|
||||||
"portunus_admin" = {
|
"portunus/users/admin-password" = {
|
||||||
owner = "${portunusUser}";
|
owner = "${portunusUser}";
|
||||||
group = "${portunusGroup}";
|
group = "${portunusGroup}";
|
||||||
};
|
};
|
||||||
"portunus_search" = {
|
"portunus/users/search-password" = {
|
||||||
owner = "${portunusUser}";
|
owner = "${portunusUser}";
|
||||||
group = "${portunusGroup}";
|
group = "${portunusGroup}";
|
||||||
};
|
};
|
||||||
|
"dex/environment" = {
|
||||||
|
owner = config.systemd.services.dex.serviceConfig.User;
|
||||||
|
group = "dex";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
services.dex.settings.oauth2.skipApprovalScreen = true;
|
||||||
|
|
||||||
services.portunus = {
|
services.portunus = {
|
||||||
enable = true;
|
enable = true;
|
||||||
user = "${portunusUser}";
|
user = "${portunusUser}";
|
||||||
group = "${portunusGroup}";
|
group = "${portunusGroup}";
|
||||||
domain = "${domain}";
|
domain = "${domain}";
|
||||||
port = 8081;
|
port = 8081;
|
||||||
|
userRegex = "[a-z_][a-z0-9_.-]*\$?";
|
||||||
|
dex = {
|
||||||
|
enable = true;
|
||||||
|
};
|
||||||
ldap = {
|
ldap = {
|
||||||
user = "${ldapUser}";
|
user = "${ldapUser}";
|
||||||
group = "${ldapGroup}";
|
group = "${ldapGroup}";
|
||||||
|
@ -62,18 +45,47 @@ in
|
||||||
|
|
||||||
# disables port 389, use 636 with tls
|
# disables port 389, use 636 with tls
|
||||||
# `portunus.domain` resolves to localhost
|
# `portunus.domain` resolves to localhost
|
||||||
#tls = true;
|
tls = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
seedPath = ../config/portunus_seeds.json;
|
seedPath = ../config/portunus_seeds.json;
|
||||||
};
|
};
|
||||||
|
systemd.services.dex.serviceConfig = {
|
||||||
|
DynamicUser = lib.mkForce false;
|
||||||
|
EnvironmentFile = config.sops.secrets."dex/environment".path;
|
||||||
|
StateDirectory = "dex";
|
||||||
|
User = "dex";
|
||||||
|
};
|
||||||
|
|
||||||
#users.ldap = {
|
users = {
|
||||||
#enable = true;
|
groups = {
|
||||||
#server = "ldap://localhost";
|
dex = {};
|
||||||
#base = "${config.services.portunus.ldap.suffix}";
|
|
||||||
#};
|
"${portunusGroup}" = {
|
||||||
users.ldap =
|
name = "${portunusGroup}";
|
||||||
|
members = [ "${portunusUser}" ];
|
||||||
|
};
|
||||||
|
"${ldapGroup}" = {
|
||||||
|
name = "${ldapGroup}";
|
||||||
|
members = [ "${ldapUser}" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
users = {
|
||||||
|
dex = {
|
||||||
|
group = "dex";
|
||||||
|
isSystemUser = true;
|
||||||
|
};
|
||||||
|
"${portunusUser}" = {
|
||||||
|
isSystemUser = true;
|
||||||
|
group = "${portunusGroup}";
|
||||||
|
};
|
||||||
|
|
||||||
|
"${ldapUser}" = {
|
||||||
|
isSystemUser = true;
|
||||||
|
group = "${ldapGroup}";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
ldap =
|
||||||
let
|
let
|
||||||
portunus = config.services.portunus;
|
portunus = config.services.portunus;
|
||||||
base = "ou=users,${portunus.ldap.suffix}";
|
base = "ou=users,${portunus.ldap.suffix}";
|
||||||
|
@ -84,10 +96,11 @@ in
|
||||||
base = base;
|
base = base;
|
||||||
bind = {
|
bind = {
|
||||||
distinguishedName = "uid=${portunus.ldap.searchUserName},${base}";
|
distinguishedName = "uid=${portunus.ldap.searchUserName},${base}";
|
||||||
passwordFile = config.sops.secrets.unix_ldap_search.path;
|
passwordFile = config.sops.secrets."portunus/users/search-password".path;
|
||||||
};
|
};
|
||||||
daemon.enable = true;
|
daemon.enable = true;
|
||||||
};
|
};
|
||||||
|
};
|
||||||
|
|
||||||
security.pam.services.sshd.text = ''
|
security.pam.services.sshd.text = ''
|
||||||
# Account management.
|
# Account management.
|
||||||
|
@ -123,7 +136,6 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
nixpkgs.overlays = [
|
nixpkgs.overlays = [
|
||||||
(self: super:
|
(self: super:
|
||||||
{
|
{
|
||||||
|
@ -131,10 +143,11 @@ in
|
||||||
src = super.fetchFromGitHub {
|
src = super.fetchFromGitHub {
|
||||||
owner = "revol-xut";
|
owner = "revol-xut";
|
||||||
repo = "portunus";
|
repo = "portunus";
|
||||||
rev = "4dc29febacb11c613785bc95352fa00e0ca9b14a";
|
rev = "8bad0661ecca9276991447f8e585c20c450ad57a";
|
||||||
sha256 = "sha256-6O2392aHXhgvgZf6ftDY5Bh6hG3OzzCnlriig/Vkkz8=";
|
sha256 = "sha256-59AvNWhnsvtrVmAJRcHeNOYOlHCx1ZZSqwFvyAM+Ye8=";
|
||||||
};
|
};
|
||||||
});
|
});
|
||||||
})
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -20,8 +20,8 @@
|
||||||
name = "FSR Wiki";
|
name = "FSR Wiki";
|
||||||
passwordFile = config.sops.secrets."mediawiki/initial_admin".path;
|
passwordFile = config.sops.secrets."mediawiki/initial_admin".path;
|
||||||
database = {
|
database = {
|
||||||
|
createLocally = false;
|
||||||
type = "postgres";
|
type = "postgres";
|
||||||
# socket = "/run/postgresql";
|
|
||||||
user = "mediawiki";
|
user = "mediawiki";
|
||||||
name = "mediawiki";
|
name = "mediawiki";
|
||||||
host = "localhost";
|
host = "localhost";
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue