128 lines
3.1 KiB
Nix
128 lines
3.1 KiB
Nix
{ config, pkgs, ... }:
|
|
let
|
|
domain = "auth.${config.fsr.domain}";
|
|
|
|
portunusUser = "portunus";
|
|
portunusGroup = "portunus";
|
|
|
|
ldapUser = "openldap";
|
|
ldapGroup = "openldap";
|
|
in
|
|
{
|
|
sops.secrets.unix_ldap_search = {
|
|
key = "portunus_search";
|
|
owner = config.systemd.services.nslcd.serviceConfig.User;
|
|
};
|
|
|
|
|
|
users.users."${portunusUser}" = {
|
|
isSystemUser = true;
|
|
group = "${portunusGroup}";
|
|
};
|
|
|
|
users.groups."${portunusGroup}" = {
|
|
name = "${portunusGroup}";
|
|
members = [ "${portunusUser}" ];
|
|
};
|
|
|
|
users.users."${ldapUser}" = {
|
|
isSystemUser = true;
|
|
group = "${ldapGroup}";
|
|
};
|
|
|
|
users.groups."${ldapGroup}" = {
|
|
name = "${ldapGroup}";
|
|
members = [ "${ldapUser}" ];
|
|
};
|
|
|
|
sops.secrets = {
|
|
"portunus_admin" = {
|
|
owner = "${portunusUser}";
|
|
group = "${portunusGroup}";
|
|
};
|
|
"portunus_search" = {
|
|
owner = "${portunusUser}";
|
|
group = "${portunusGroup}";
|
|
};
|
|
};
|
|
|
|
services.portunus = {
|
|
enable = true;
|
|
user = "${portunusUser}";
|
|
group = "${portunusGroup}";
|
|
domain = "${domain}";
|
|
port = 8081;
|
|
|
|
ldap = {
|
|
user = "${ldapUser}";
|
|
group = "${ldapGroup}";
|
|
|
|
suffix = "dc=ifsr,dc=de";
|
|
searchUserName = "search";
|
|
|
|
# disables port 389, use 636 with tls
|
|
# `portunus.domain` resolves to localhost
|
|
#tls = true;
|
|
};
|
|
|
|
seedPath = ../config/portunus_seeds.json;
|
|
};
|
|
|
|
#users.ldap = {
|
|
#enable = true;
|
|
#server = "ldap://localhost";
|
|
#base = "${config.services.portunus.ldap.suffix}";
|
|
#};
|
|
users.ldap =
|
|
let
|
|
portunus = config.services.portunus;
|
|
base = "ou=users,${portunus.ldap.suffix}";
|
|
in
|
|
{
|
|
enable = true;
|
|
server = "ldap://localhost";
|
|
base = base;
|
|
bind = {
|
|
distinguishedName = "uid=${portunus.ldap.searchUserName},${base}";
|
|
passwordFile = config.sops.secrets.unix_ldap_search.path;
|
|
};
|
|
daemon.enable = true;
|
|
};
|
|
|
|
security.pam.services.login.text = ''
|
|
# Account management.
|
|
account sufficient ${pkgs.nss_pam_ldapd}/lib/security/pam_ldap.so
|
|
account required pam_unix.so
|
|
|
|
# Authentication management.
|
|
auth sufficient pam_unix.so nullok likeauth try_first_pass
|
|
auth sufficient ${pkgs.nss_pam_ldapd}/lib/security/pam_ldap.so use_first_pass
|
|
auth required pam_deny.so
|
|
|
|
# Password management.
|
|
password sufficient pam_unix.so nullok sha512
|
|
password sufficient ${pkgs.nss_pam_ldapd}/lib/security/pam_ldap.so
|
|
|
|
# Session management.
|
|
session required pam_env.so conffile=/etc/pam/environment readenv=0
|
|
session required pam_unix.so
|
|
session required pam_loginuid.so
|
|
session required ${pkgs.linux-pam}/lib/security/pam_lastlog.so silent
|
|
session optional pam_mkhomedir.so
|
|
session optional ${pkgs.nss_pam_ldapd}/lib/security/pam_ldap.so
|
|
session optional ${pkgs.systemd}/lib/security/pam_systemd.so
|
|
|
|
'';
|
|
|
|
services.nginx = {
|
|
enable = true;
|
|
virtualHosts."${config.services.portunus.domain}" = {
|
|
forceSSL = true;
|
|
enableACME = true;
|
|
locations = {
|
|
"/".proxyPass = "http://localhost:${toString config.services.portunus.port}";
|
|
};
|
|
};
|
|
};
|
|
}
|