using dex for auth in portunus

This commit is contained in:
revol-xut 2023-05-08 20:34:57 +02:00
parent 09330c5204
commit 79b4de5165
No known key found for this signature in database
GPG key ID: 4F56FF7759627D07
4 changed files with 68 additions and 55 deletions

24
flake.lock generated
View file

@ -71,11 +71,11 @@
}, },
"nixpkgs-stable": { "nixpkgs-stable": {
"locked": { "locked": {
"lastModified": 1681005198, "lastModified": 1683504292,
"narHash": "sha256-5LrnBeXR7Hv8OXh6eany7br4qBW+ZNl4LKf1CJu9zbg=", "narHash": "sha256-jlZbBIKGa6IMGkcJkQ08pbKnouTAPfeq1fD5I7l/rBw=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "e45cc0138829ad86e7ff17a76acf2d05e781e30a", "rev": "ba0086c178d4ed60a7899f739caea553eca2e046",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -87,16 +87,16 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1681269223, "lastModified": 1682690464,
"narHash": "sha256-i6OeI2f7qGvmLfD07l1Az5iBL+bFeP0RHixisWtpUGo=", "narHash": "sha256-GGbMZLYG7/4oZupWeBbw7qx7QEnDDyVE0IEmnsy+NnY=",
"owner": "nixos", "owner": "revol-xut",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "87edbd74246ccdfa64503f334ed86fa04010bab9", "rev": "a381a30411963ccb19030b8b49e071bd21aa8517",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "nixos", "owner": "revol-xut",
"ref": "nixos-22.11", "ref": "master",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }
@ -116,11 +116,11 @@
"nixpkgs-stable": "nixpkgs-stable" "nixpkgs-stable": "nixpkgs-stable"
}, },
"locked": { "locked": {
"lastModified": 1681209176, "lastModified": 1683545104,
"narHash": "sha256-wyQokPpkNZnsl/bVf8m1428tfA0hJ0w/qexq4EizhTc=", "narHash": "sha256-48wC0zzHAej/wLFWIgV+uj63AvQ2UUk85g7wmXJzTqk=",
"owner": "Mic92", "owner": "Mic92",
"repo": "sops-nix", "repo": "sops-nix",
"rev": "00d5fd73756d424de5263b92235563bc06f2c6e1", "rev": "36b062a2c85a0efb37de1300c79c54602a094fab",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -1,6 +1,6 @@
{ {
inputs = { inputs = {
nixpkgs.url = github:nixos/nixpkgs/nixos-22.11; nixpkgs.url = github:revol-xut/nixpkgs/master;
sops-nix.url = github:Mic92/sops-nix; sops-nix.url = github:Mic92/sops-nix;
sops-nix.inputs.nixpkgs.follows = "nixpkgs"; sops-nix.inputs.nixpkgs.follows = "nixpkgs";
fsr-infoscreen.url = github:fsr/infoscreen; fsr-infoscreen.url = github:fsr/infoscreen;

View file

@ -1,4 +1,4 @@
{ config, pkgs, ... }: { config, lib, pkgs, ... }:
let let
domain = "auth.${config.fsr.domain}"; domain = "auth.${config.fsr.domain}";
@ -9,50 +9,33 @@ let
ldapGroup = "openldap"; ldapGroup = "openldap";
in in
{ {
sops.secrets.unix_ldap_search = {
key = "portunus_search";
owner = config.systemd.services.nslcd.serviceConfig.User;
};
users.users."${portunusUser}" = {
isSystemUser = true;
group = "${portunusGroup}";
};
users.groups."${portunusGroup}" = {
name = "${portunusGroup}";
members = [ "${portunusUser}" ];
};
users.users."${ldapUser}" = {
isSystemUser = true;
group = "${ldapGroup}";
};
users.groups."${ldapGroup}" = {
name = "${ldapGroup}";
members = [ "${ldapUser}" ];
};
sops.secrets = { sops.secrets = {
"portunus_admin" = { "portunus/users/admin-password" = {
owner = "${portunusUser}"; owner = "${portunusUser}";
group = "${portunusGroup}"; group = "${portunusGroup}";
}; };
"portunus_search" = { "portunus/users/search-password" = {
owner = "${portunusUser}"; owner = "${portunusUser}";
group = "${portunusGroup}"; group = "${portunusGroup}";
}; };
"dex/environment" = {
owner = config.systemd.services.dex.serviceConfig.User;
group = "dex";
};
}; };
services.dex.settings.oauth2.skipApprovalScreen = true;
services.portunus = { services.portunus = {
enable = true; enable = true;
user = "${portunusUser}"; user = "${portunusUser}";
group = "${portunusGroup}"; group = "${portunusGroup}";
domain = "${domain}"; domain = "${domain}";
port = 8081; port = 8081;
userRegex = "[a-z_][a-z0-9_.-]*\$?";
dex = {
enable = true;
};
ldap = { ldap = {
user = "${ldapUser}"; user = "${ldapUser}";
group = "${ldapGroup}"; group = "${ldapGroup}";
@ -62,18 +45,47 @@ in
# disables port 389, use 636 with tls # disables port 389, use 636 with tls
# `portunus.domain` resolves to localhost # `portunus.domain` resolves to localhost
#tls = true; tls = true;
}; };
seedPath = ../config/portunus_seeds.json; seedPath = ../config/portunus_seeds.json;
}; };
systemd.services.dex.serviceConfig = {
DynamicUser = lib.mkForce false;
EnvironmentFile = config.sops.secrets."dex/environment".path;
StateDirectory = "dex";
User = "dex";
};
#users.ldap = { users = {
#enable = true; groups = {
#server = "ldap://localhost"; dex = {};
#base = "${config.services.portunus.ldap.suffix}";
#}; "${portunusGroup}" = {
users.ldap = name = "${portunusGroup}";
members = [ "${portunusUser}" ];
};
"${ldapGroup}" = {
name = "${ldapGroup}";
members = [ "${ldapUser}" ];
};
};
users = {
dex = {
group = "dex";
isSystemUser = true;
};
"${portunusUser}" = {
isSystemUser = true;
group = "${portunusGroup}";
};
"${ldapUser}" = {
isSystemUser = true;
group = "${ldapGroup}";
};
};
ldap =
let let
portunus = config.services.portunus; portunus = config.services.portunus;
base = "ou=users,${portunus.ldap.suffix}"; base = "ou=users,${portunus.ldap.suffix}";
@ -84,10 +96,11 @@ in
base = base; base = base;
bind = { bind = {
distinguishedName = "uid=${portunus.ldap.searchUserName},${base}"; distinguishedName = "uid=${portunus.ldap.searchUserName},${base}";
passwordFile = config.sops.secrets.unix_ldap_search.path; passwordFile = config.sops.secrets."portunus/users/search-password".path;
}; };
daemon.enable = true; daemon.enable = true;
}; };
};
security.pam.services.sshd.text = '' security.pam.services.sshd.text = ''
# Account management. # Account management.
@ -123,7 +136,6 @@ in
}; };
}; };
}; };
nixpkgs.overlays = [ nixpkgs.overlays = [
(self: super: (self: super:
{ {
@ -131,10 +143,11 @@ in
src = super.fetchFromGitHub { src = super.fetchFromGitHub {
owner = "revol-xut"; owner = "revol-xut";
repo = "portunus"; repo = "portunus";
rev = "4dc29febacb11c613785bc95352fa00e0ca9b14a"; rev = "8bad0661ecca9276991447f8e585c20c450ad57a";
sha256 = "sha256-6O2392aHXhgvgZf6ftDY5Bh6hG3OzzCnlriig/Vkkz8="; sha256 = "sha256-59AvNWhnsvtrVmAJRcHeNOYOlHCx1ZZSqwFvyAM+Ye8=";
}; };
}); });
}) })
]; ];
} }

View file

@ -20,8 +20,8 @@
name = "FSR Wiki"; name = "FSR Wiki";
passwordFile = config.sops.secrets."mediawiki/initial_admin".path; passwordFile = config.sops.secrets."mediawiki/initial_admin".path;
database = { database = {
createLocally = false;
type = "postgres"; type = "postgres";
# socket = "/run/postgresql";
user = "mediawiki"; user = "mediawiki";
name = "mediawiki"; name = "mediawiki";
host = "localhost"; host = "localhost";