switch to ldaps
This commit is contained in:
parent
6bed81c8a9
commit
c6ebb06f68
6 changed files with 19 additions and 22 deletions
|
@ -44,15 +44,17 @@ in
|
||||||
allowAnonymousEdits = true;
|
allowAnonymousEdits = true;
|
||||||
defaultPermission = "limited";
|
defaultPermission = "limited";
|
||||||
# ldap auth
|
# ldap auth
|
||||||
ldap = rec {
|
ldap =
|
||||||
url = "ldap://localhost";
|
let portunus = config.services.portunus;
|
||||||
searchBase = "ou=users,${config.services.portunus.ldap.suffix}";
|
in rec {
|
||||||
searchFilter = "(uid={{username}})";
|
url = "ldaps://${portunus.domain}";
|
||||||
bindDn = "uid=${config.services.portunus.ldap.searchUserName},${searchBase}";
|
searchBase = "ou=users,${portunus.ldap.suffix}";
|
||||||
bindCredentials = "\${LDAP_CREDENTIALS}";
|
searchFilter = "(uid={{username}})";
|
||||||
useridField = "uid";
|
bindDn = "uid=${portunus.ldap.searchUserName},${searchBase}";
|
||||||
providerName = "iFSR";
|
bindCredentials = "\${LDAP_CREDENTIALS}";
|
||||||
};
|
useridField = "uid";
|
||||||
|
providerName = "iFSR";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -7,18 +7,13 @@ let
|
||||||
name = "admins";
|
name = "admins";
|
||||||
long_name = "Portunus Admin";
|
long_name = "Portunus Admin";
|
||||||
members = [ "admin" ];
|
members = [ "admin" ];
|
||||||
permissions = {
|
permissions.portunus.is_admin = true;
|
||||||
portunus.is_admin = true;
|
|
||||||
ldap.can_read = true;
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
name = "search";
|
name = "search";
|
||||||
long_name = "LDAP search group";
|
long_name = "LDAP search group";
|
||||||
members = [ "search" ];
|
members = [ "search" ];
|
||||||
permissions = {
|
permissions.ldap.can_read = true;
|
||||||
ldap.can_read = true;
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
name = "fsr";
|
name = "fsr";
|
||||||
|
@ -73,7 +68,7 @@ in
|
||||||
|
|
||||||
# disables port 389, use 636 with tls
|
# disables port 389, use 636 with tls
|
||||||
# `portunus.domain` resolves to localhost
|
# `portunus.domain` resolves to localhost
|
||||||
tls = false;
|
tls = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
seedPath = pkgs.writeText "portunus-seed.json" (builtins.toJSON seed);
|
seedPath = pkgs.writeText "portunus-seed.json" (builtins.toJSON seed);
|
||||||
|
@ -113,7 +108,7 @@ in
|
||||||
let portunus = config.services.portunus;
|
let portunus = config.services.portunus;
|
||||||
in rec {
|
in rec {
|
||||||
enable = true;
|
enable = true;
|
||||||
server = "ldap://localhost";
|
server = "ldaps://${portunus.domain}";
|
||||||
base = "ou=users,${portunus.ldap.suffix}";
|
base = "ou=users,${portunus.ldap.suffix}";
|
||||||
bind = {
|
bind = {
|
||||||
distinguishedName = "uid=${portunus.ldap.searchUserName},${base}";
|
distinguishedName = "uid=${portunus.ldap.searchUserName},${base}";
|
||||||
|
|
|
@ -11,7 +11,7 @@ let
|
||||||
#result_attribute=mail
|
#result_attribute=mail
|
||||||
#'';
|
#'';
|
||||||
dovecot-ldap-args = pkgs.writeText "ldap-args" ''
|
dovecot-ldap-args = pkgs.writeText "ldap-args" ''
|
||||||
uris = ldap://localhost
|
uris = ldaps://${config.services.portunus.domain}
|
||||||
dn = uid=search, ou=users, dc=ifsr, dc=de
|
dn = uid=search, ou=users, dc=ifsr, dc=de
|
||||||
auth_bind = yes
|
auth_bind = yes
|
||||||
!include ${config.sops.secrets."dovecot_ldap_search".path}
|
!include ${config.sops.secrets."dovecot_ldap_search".path}
|
||||||
|
|
|
@ -13,7 +13,7 @@
|
||||||
siteOwner = "root@${config.fsr.domain}";
|
siteOwner = "root@${config.fsr.domain}";
|
||||||
ldap = {
|
ldap = {
|
||||||
enable = true;
|
enable = true;
|
||||||
serverUri = "ldap://localhost";
|
serverUri = "ldaps://${config.services.portunus.domain}";
|
||||||
bindDn = "uid=search, ou=users, dc=ifsr, dc=de";
|
bindDn = "uid=search, ou=users, dc=ifsr, dc=de";
|
||||||
bindPasswordFile = config.sops.secrets.mailman_ldap_search.path;
|
bindPasswordFile = config.sops.secrets.mailman_ldap_search.path;
|
||||||
userSearch = {
|
userSearch = {
|
||||||
|
|
|
@ -101,7 +101,7 @@ in
|
||||||
- module: ldap_auth_provider.LdapAuthProviderModule
|
- module: ldap_auth_provider.LdapAuthProviderModule
|
||||||
config:
|
config:
|
||||||
enabled: true
|
enabled: true
|
||||||
uri: ldap://localhost
|
uri: ldaps://${portunus.domain}
|
||||||
base: ou=users,${portunus.ldap.suffix}
|
base: ou=users,${portunus.ldap.suffix}
|
||||||
# taken from kaki config
|
# taken from kaki config
|
||||||
attributes:
|
attributes:
|
||||||
|
|
|
@ -28,7 +28,7 @@ in
|
||||||
baseDN = "ou=users, dc=ifsr, dc=de";
|
baseDN = "ou=users, dc=ifsr, dc=de";
|
||||||
bindDN = "uid=search, ou=users, dc=ifsr, dc=de";
|
bindDN = "uid=search, ou=users, dc=ifsr, dc=de";
|
||||||
bindPassword = LDAP_SEARCH;
|
bindPassword = LDAP_SEARCH;
|
||||||
hostname = "ldap://localhost";
|
hostname = "ldaps://${config.services.portunus.domain}";
|
||||||
canAuthenticate = YES;
|
canAuthenticate = YES;
|
||||||
id = directory;
|
id = directory;
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue