Matrix configuration #13
|
@ -26,6 +26,15 @@
|
|||
"portunus": { "is_admin": false },
|
||||
"ldap": { "can_read": false }
|
||||
}
|
||||
},
|
||||
{
|
||||
"name": "search",
|
||||
"long_name": "LDAP search group",
|
||||
"members": ["search"],
|
||||
"permissions": {
|
||||
"portunus": { "is_admin": false },
|
||||
"ldap": { "can_read": true }
|
||||
}
|
||||
}
|
||||
],
|
||||
"users": [
|
||||
|
@ -34,6 +43,12 @@
|
|||
"given_name": "admin",
|
||||
"family_name": "admin",
|
||||
"password": { "from_command": ["/usr/bin/env", "cat", "/run/secrets/portunus_admin"] }
|
||||
},
|
||||
{
|
||||
"login_name": "search",
|
||||
"given_name": "search",
|
||||
"family_name": "search",
|
||||
"password": { "from_command": ["/usr/bin/env", "cat", "/run/secrets/portunus_search"] }
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
18
flake.lock
|
@ -71,11 +71,11 @@
|
|||
},
|
||||
"nixpkgs-stable": {
|
||||
"locked": {
|
||||
"lastModified": 1670146390,
|
||||
"narHash": "sha256-XrEoDpuloRHHbUkbPnhF2bQ0uwHllXq3NHxtuVe/QK4=",
|
||||
"lastModified": 1673740915,
|
||||
"narHash": "sha256-MMH8zONfqahgHly3K8/A++X34800rajA/XgZ2DzNL/M=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "86370507cb20c905800527539fc049a2bf09c667",
|
||||
"rev": "7c65528c3f8462b902e09d1ccca23bb9034665c2",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
@ -87,11 +87,11 @@
|
|||
},
|
||||
"nixpkgs_2": {
|
||||
"locked": {
|
||||
"lastModified": 1671215800,
|
||||
"narHash": "sha256-2W54K41A7MefEaWzgL/TsaWlhKRK/RhWUybyOW4i0K8=",
|
||||
"lastModified": 1673800717,
|
||||
"narHash": "sha256-SFHraUqLSu5cC6IxTprex/nTsI81ZQAtDvlBvGDWfnA=",
|
||||
"owner": "nixos",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "9d692a724e74d2a49f7c985132972f991d144254",
|
||||
"rev": "2f9fd351ec37f5d479556cd48be4ca340da59b8f",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
@ -116,11 +116,11 @@
|
|||
"nixpkgs-stable": "nixpkgs-stable"
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1670149631,
|
||||
"narHash": "sha256-rwmtlxx45PvOeZNP51wql/cWjY3rqzIR3Oj2Y+V7jM0=",
|
||||
"lastModified": 1673752321,
|
||||
"narHash": "sha256-EFfXY1ZHJq4FNaNQA9x0djtu/jiOhBbT0Xi+BT06cJw=",
|
||||
"owner": "Mic92",
|
||||
"repo": "sops-nix",
|
||||
"rev": "da98a111623101c64474a14983d83dad8f09f93d",
|
||||
"rev": "e18eefd2b133a58309475298052c341c08470717",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
|
|
@ -29,9 +29,15 @@ in
|
|||
members = [ "${ldapUser}" ];
|
||||
};
|
||||
|
||||
sops.secrets."portunus_admin" = {
|
||||
owner = "${portunusUser}";
|
||||
group = "${portunusGroup}";
|
||||
sops.secrets = {
|
||||
"portunus_admin" = {
|
||||
owner = "${portunusUser}";
|
||||
group = "${portunusGroup}";
|
||||
};
|
||||
"portunus_search" = {
|
||||
owner = "${portunusUser}";
|
||||
group = "${portunusGroup}";
|
||||
};
|
||||
};
|
||||
|
||||
services.portunus = {
|
||||
|
@ -40,10 +46,16 @@ in
|
|||
group = "${portunusGroup}";
|
||||
domain = "${domain}";
|
||||
port = 8081;
|
||||
|
||||
ldap = {
|
||||
user = "${ldapUser}";
|
||||
group = "${ldapGroup}";
|
||||
|
||||
suffix = "dc=ifsr,dc=de";
|
||||
searchUserName = "search";
|
||||
|
||||
# disables port 389, use 636 with tls
|
||||
# `portunus.domain` resolves to localhost
|
||||
tls = true;
|
||||
};
|
||||
|
||||
|
@ -60,9 +72,4 @@ in
|
|||
};
|
||||
};
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [
|
||||
80 # http
|
||||
443 # https
|
||||
];
|
||||
}
|
||||
|
|
|
@ -8,7 +8,6 @@ let
|
|||
nixos domain option nixos domain option
|
||||
base_url = "https://${domainServer}:443";
|
||||
server_name = domainServer;
|
||||
};
|
||||
"m.identity_server" = { };
|
||||
nixos domain option nixos domain option
|
||||
};
|
||||
serverConfig = {
|
||||
"m.server" = "${domainServer}:443";
|
||||
|
@ -21,21 +20,17 @@ let
|
|||
nixos domain option nixos domain option
nixos domain option nixos domain option
|
||||
'';
|
||||
in
|
||||
{
|
||||
# sops.secrets = {
|
||||
nixos domain option nixos domain option
|
||||
# synapse_registration_secret = {
|
||||
nixos domain option nixos domain option
|
||||
# owner = "matrix-synapse";
|
||||
nixos domain option nixos domain option
|
||||
# group = "matrix-synapse";
|
||||
nixos domain option nixos domain option
|
||||
# };
|
||||
nixos domain option nixos domain option
|
||||
# };
|
||||
nixos domain option nixos domain option
|
||||
sops.secrets.matrix_ldap_search = {
|
||||
nixos domain option nixos domain option
|
||||
key = "portunus_search";
|
||||
nixos domain option nixos domain option
|
||||
owner = config.systemd.services.matrix-synapse.serviceConfig.User;
|
||||
nixos domain option nixos domain option
|
||||
};
|
||||
nixos domain option nixos domain option
|
||||
|
||||
services = {
|
||||
postgresql = {
|
||||
enable = true;
|
||||
ensureUsers = [
|
||||
nixos domain option nixos domain option
|
||||
{
|
||||
nixos domain option nixos domain option
|
||||
name = "matrix-synapse";
|
||||
nixos domain option nixos domain option
|
||||
}
|
||||
nixos domain option nixos domain option
|
||||
];
|
||||
nixos domain option nixos domain option
|
||||
ensureUsers = [{
|
||||
nixos domain option nixos domain option
|
||||
name = "matrix-synapse";
|
||||
nixos domain option nixos domain option
|
||||
}];
|
||||
nixos domain option nixos domain option
|
||||
};
|
||||
|
||||
nginx = {
|
||||
|
@ -66,6 +61,7 @@ in
|
|||
nixos domain option nixos domain option
nixos domain option nixos domain option
|
||||
root = pkgs.element-web.override {
|
||||
conf = {
|
||||
default_server_config = clientConfig;
|
||||
disable_3pid_login = true;
|
||||
nixos domain option nixos domain option
|
||||
};
|
||||
};
|
||||
};
|
||||
|
@ -75,6 +71,10 @@ in
|
|||
nixos domain option nixos domain option
nixos domain option nixos domain option
|
||||
matrix-synapse = {
|
||||
enable = true;
|
||||
|
||||
plugins = with config.services.matrix-synapse.package.plugins; [
|
||||
nixos domain option nixos domain option
|
||||
matrix-synapse-ldap3
|
||||
nixos domain option nixos domain option
|
||||
];
|
||||
nixos domain option nixos domain option
|
||||
|
||||
nixos domain option nixos domain option
|
||||
settings = {
|
||||
server_name = domainServer;
|
||||
|
||||
|
@ -89,17 +89,32 @@ in
|
|||
nixos domain option nixos domain option
nixos domain option nixos domain option
|
||||
compress = false;
|
||||
}];
|
||||
}];
|
||||
|
||||
nixos domain option nixos domain option
|
||||
# TODO: ldap
|
||||
nixos domain option nixos domain option
|
||||
registration_shared_secret = "registration_shared_secret";
|
||||
nixos domain option nixos domain option
|
||||
};
|
||||
# extraConfigFiles = [
|
||||
nixos domain option nixos domain option
|
||||
# (pkgs.writeTextFile {
|
||||
nixos domain option nixos domain option
|
||||
# name = "matrix-synapse-extra-config.yml";
|
||||
nixos domain option nixos domain option
|
||||
# text = ''
|
||||
nixos domain option nixos domain option
|
||||
# '';
|
||||
nixos domain option nixos domain option
|
||||
# })
|
||||
nixos domain option nixos domain option
|
||||
# ];
|
||||
nixos domain option nixos domain option
|
||||
|
||||
nixos domain option nixos domain option
|
||||
extraConfigFiles = [
|
||||
nixos domain option nixos domain option
|
||||
(pkgs.writeTextFile {
|
||||
nixos domain option nixos domain option
|
||||
name = "matrix-synapse-extra-config.yml";
|
||||
nixos domain option nixos domain option
|
||||
text = ''
|
||||
nixos domain option nixos domain option
|
||||
# `password_providers` is deprecated but `modules` is not supported yet.
|
||||
nixos domain option nixos domain option
|
||||
password_providers:
|
||||
nixos domain option nixos domain option
|
||||
- module: ldap_auth_provider.LdapAuthProvider
|
||||
nixos domain option nixos domain option
|
||||
config:
|
||||
nixos domain option nixos domain option
|
||||
enabled: true
|
||||
nixos domain option nixos domain option
|
||||
# have to use fqdn here for tls (still connects to localhost)
|
||||
nixos domain option nixos domain option
|
||||
uri: ldaps://auth.nix.fugi.dev:636
|
||||
nixos domain option nixos domain option
|
||||
base: ou=users,dc=ifsr,dc=de
|
||||
nixos domain option nixos domain option
|
||||
# taken from kaki config
|
||||
nixos domain option nixos domain option
|
||||
attributes:
|
||||
nixos domain option nixos domain option
|
||||
uid: uid
|
||||
nixos domain option nixos domain option
|
||||
mail: uid
|
||||
nixos domain option nixos domain option
|
||||
name: cn
|
||||
nixos domain option nixos domain option
|
||||
bind_dn: uid=search,ou=users,dc=ifsr,dc=de
|
||||
nixos domain option nixos domain option
|
||||
# TODO: password file not yet supported - update matrix-synapse-ldap3 or use workaround
|
||||
nixos domain option nixos domain option
|
||||
bind_password: portunus_search
|
||||
nixos domain option nixos domain option
|
||||
# bind_password_file: ${config.sops.secrets.portunus_search.path}
|
||||
nixos domain option nixos domain option
|
||||
'';
|
||||
nixos domain option nixos domain option
|
||||
})
|
||||
nixos domain option nixos domain option
|
||||
];
|
||||
nixos domain option nixos domain option
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -113,7 +128,7 @@ in
|
|||
nixos domain option nixos domain option
nixos domain option nixos domain option
|
||||
|
||||
path = [ pkgs.sudo config.services.postgresql.package ];
|
||||
|
||||
# create database for synapse. will silently fail if already exists
|
||||
nixos domain option nixos domain option
|
||||
# create database for synapse. will silently fail if it already exists
|
||||
nixos domain option nixos domain option
|
||||
script = ''
|
||||
sudo -u ${config.services.postgresql.superUser} psql <<SQL
|
||||
CREATE DATABASE "matrix-synapse" WITH OWNER "matrix-synapse"
|
||||
|
|
|||
nixos domain option nixos domain option
nixos domain option nixos domain option
|
|
@ -5,6 +5,7 @@ nextcloud_adminpass: ENC[AES256_GCM,data:EMvcFOGJz45P4nvJ5Yy4SziWa2pUWBqt4ZZdde6
|
|||
hedgedoc_session_secret: ENC[AES256_GCM,data:uz7KggZqeZ2eqiCnOcnYh2I1p5BBXTQbC8PUhB2kM2U=,iv:aJDHKCPkccCT/OF6AGZMfRESNmoV9muGHbuCUfLQhH8=,tag:uEVXylpE8MSebqRr+4mQOw==,type:str]
|
||||
wg-seckey: ENC[AES256_GCM,data:NHk6E5uu3CshC/0//LoGk6iCGKWbx49wVVkjoMqF19gc7MhdHAn9aJD+0Zc=,iv:N3PuU7+QSW9aD0ZhTI7CmMI3drLIzO7XaW3mgEDp/sk=,tag:fxH4eRIboy9O15oul7JOTw==,type:str]
|
||||
portunus_admin: ENC[AES256_GCM,data:bPuYdfpWJtYib9lUcXHVZeGerskd5vs5IOe+DE9Q7OOPkAwp,iv:6ZjjfQ3E1xxYjmEg7o849RZzUt8dyXjI84DSfPYGUWQ=,tag:JJpOLjPs8YdEBl3xGGAzbg==,type:str]
|
||||
portunus_search: ENC[AES256_GCM,data:WEpw/Ii8UI9TpTSQSU/QVhnhU0huAhhVwRlnWaqD4yg=,iv:kLgoXHIqRDOEzPCgKBqkouJu+Wu8RLxL54P/jykqCC8=,tag:iOxrKhTuHGoTxD86Ae9hnA==,type:str]
|
||||
mediawiki:
|
||||
postgres: ENC[AES256_GCM,data:XRfUc2PRMJcoILAnm5MWr2Cg5u4e/IhGMUnz/oIQSzY=,iv:8U+qlD1SQzxUyD/6QK4SdwRCDyMODK/lP0IDrLlcQ4U=,tag:2spNMj9dY2wWilOusq24yQ==,type:str]
|
||||
initial_admin: ENC[AES256_GCM,data:iET5rz9rygx49NDBjKwqAlRgpeS+jq5iM5zmjnoKcyk=,iv:11iDbCrpzjCdyAB22R8NknJ6vzcpVZXCXB3iWsGWXw0=,tag:1RCyg1ysOWaXKdqqdHqRrw==,type:str]
|
||||
|
@ -24,8 +25,8 @@ sops:
|
|||
Z212K3JDWmRsZmVpdjBaUE1kL3phMm8K/x3Ssn0LEO7BfTUoOJQ6h88vlwA/AvQj
|
||||
KsosHSWO7vsgqKPPO+OPbHV1y8OTAKubcrk5szTUWBNOvggIw3nWDA==
|
||||
-----END AGE ENCRYPTED FILE-----
|
||||
lastmodified: "2022-12-17T17:42:18Z"
|
||||
mac: ENC[AES256_GCM,data:qLBASH8XmcHjTFrxdEqyk7KwXHEGx9hT6Jvqw1JMtZDhP95OjKNRySh5fptG1+Jz1ZIaG5zwDWdzV2/GXGru06dDR8bZYoXCboa0YR1NSESZ9f95n9v1HYQf/oSww8KHTP3METZ/1oS7i1nQdL5FxLFTK+nx77uQ1VxX7Ztl85Y=,iv:jEWOsxeTamGGNVw8OXFQT9o5MIyE7EMPAYEdfQesLZw=,tag:vUZK+H93qUursPwfoTpEJg==,type:str]
|
||||
lastmodified: "2023-01-17T22:50:14Z"
|
||||
mac: ENC[AES256_GCM,data:+I8oEl35XylSZVi4m6vY/Z9wsMqt2BER04gu7aXt9+cjg4X2NBEFE9qjZKB9vVLaC1D1El7UUs4oZcAu1bpJ9IGL5eBy1nT9Ei8cxRRlbh3cDnC6QIOE66fcq/gDJHnT7u3figsO/MKZenIpfKbEA+88iJkGm8/61qjESPGUjpk=,iv:ZDkAjdpFU3IMVJkzKAXNtD5nAn9USbRb0pUXDfKEWto=,tag:b7ybgB85dEBKWADLyWi36g==,type:str]
|
||||
pgp:
|
||||
- created_at: "2022-11-18T16:37:48Z"
|
||||
enc: |
|
||||
|
|
|
@ -5,6 +5,7 @@ nextcloud_adminpass: ENC[AES256_GCM,data:G3FcJIAl0HmpCu4JAXQOZPmWCg==,iv:Bgk7j3E
|
|||
hedgedoc_session_secret: ENC[AES256_GCM,data:wi2hWcIAU2u2t0hJkSUBI5pp2T29V/M=,iv:Iph099lne6cH6V1gnobcGZl/mfJZiw1bFJMdSTiVsxE=,tag:xGI+S3Uygzmdnmd0l1kCaQ==,type:str]
|
||||
wg-seckey: ENC[AES256_GCM,data:wuDmkZgUzzK5,iv:sa2I3qVkXWddcZlItfmKj3K5vT10WE/knoVOaA/HrIQ=,tag:SzGnDifhyol63eQKeJevcA==,type:str]
|
||||
portunus_admin: ENC[AES256_GCM,data:2X7cz7nRN2lvubR0e+8=,iv:NRXWAbK6DouyGzW6yiJ8tNYKcXNWbt7uy3eTMmybrRk=,tag:7itZnw28EQCmGBBF9Ctb3A==,type:str]
|
||||
portunus_search: ENC[AES256_GCM,data:nqCvit2p8YE8XJ3Z+PEP,iv:k2dC6TTI70M8raOTNnp1TsPiDmF3ssPPhIe6cjMevBA=,tag:CG1uvLQSxSQzVsGYxG7YUw==,type:str]
|
||||
mediawiki:
|
||||
postgres: ENC[AES256_GCM,data:bna6ksGVOHWor7OqVL/jgeDIxA==,iv:bgkQh+NgPE/hr4N4YOCzSCfs7vaOx4pSWlc8WxI8qMc=,tag:WIjyu1i0M7flGFFovH5jWQ==,type:str]
|
||||
initial_admin: ENC[AES256_GCM,data:YRd3O5774NTmshxbQPbFjg==,iv:/Ra3WbZKcnUMf99ujN9qd/+DkOkFKv4cIEfUdmxpqMw=,tag:gj7ZbwIB1HLuPpGTgiz7Vg==,type:str]
|
||||
|
@ -24,8 +25,8 @@ sops:
|
|||
MERVUkh2ck9YWnJ5TXJDVmxpem1kTXMKCeOyjV/se1nRXsi15m/3i48hP7As6SEk
|
||||
ygtLt+UueHStX/b/OzrXk8IC5dj/mARGIJI5S61IKln6SZFbJGT6cQ==
|
||||
-----END AGE ENCRYPTED FILE-----
|
||||
lastmodified: "2022-12-17T20:37:05Z"
|
||||
mac: ENC[AES256_GCM,data:zRn9Y43k9jEYmI9gU5vKPAEcG0N+O7ILFisyttXDHbdaiYJfAWu8556Hkofq1hS6WByB/ZE+BZO9vJ9JFzGxodCDeOTF0XLmFeb5frL7Vb9u2MXvT+z640kwA9VJUoLligoqmVt4O+ba3Tr+wU1qy85vLxyDFeEIj6ATo68E8b0=,iv:LaB6cJx5oXGVNNWvfwIievTm8KmVCAJ1j6RVOwFsyBU=,tag:3H7PnmpU65ub6ysVLsB3bQ==,type:str]
|
||||
lastmodified: "2023-01-17T22:26:52Z"
|
||||
mac: ENC[AES256_GCM,data:0Ngy2Ixk+HUsGbAMvNLCKGn7iCIZeOGjYsyzjwwRt/ATnOVVvcdSi9P1Ib4vcRl4OJJKO9fMVIJFkXutZYPiT2JnnPRWIokr39a7wMMMgljDrxS8Nzry2CJkELRpuu9vd/tkSc6dcmhnK1wraI1YRf23HIuukmLxei9BkS+dB+M=,iv:92za85tuTI6NtCqx+K6/MXME6+2vHpGhBVZrlwqMp0I=,tag:h8aWvsJ0t3SyY0tNtEIxLw==,type:str]
|
||||
pgp:
|
||||
- created_at: "2022-11-18T16:37:58Z"
|
||||
enc: |
|
||||
|
|
nixos domain option