2025-06-18 19:53:44 +03:00
|
|
|
{
|
|
|
|
config,
|
|
|
|
lib,
|
|
|
|
pkgs,
|
|
|
|
...
|
|
|
|
}:
|
2024-11-01 21:26:34 +04:00
|
|
|
let
|
2024-12-26 18:27:25 +04:00
|
|
|
domain = config.selfprivacy.domain;
|
2025-02-03 01:35:21 +04:00
|
|
|
subdomain = "auth";
|
|
|
|
auth-fqdn = subdomain + "." + domain;
|
2025-01-31 14:26:55 +04:00
|
|
|
|
|
|
|
ldap-host = "127.0.0.1";
|
|
|
|
ldap-port = 3636;
|
|
|
|
|
2025-03-16 19:50:41 +04:00
|
|
|
keys-path = "/run/keys";
|
|
|
|
|
2025-01-31 14:26:55 +04:00
|
|
|
admins-group = "sp.admins";
|
|
|
|
full-users-group = "sp.full_users";
|
2024-11-01 21:26:34 +04:00
|
|
|
|
2024-12-26 18:27:25 +04:00
|
|
|
kanidm-bind-address = "127.0.0.1:3013";
|
|
|
|
|
2025-02-12 15:50:15 +04:00
|
|
|
selfprivacy-group = config.users.users."selfprivacy-api".group;
|
|
|
|
|
2025-04-21 20:21:55 +04:00
|
|
|
kanidmMigrateDbScript = pkgs.writeShellScript "kanidm-db-migration-script" ''
|
|
|
|
# handle a case when kanidm database is not yet created (the first startup)
|
|
|
|
if [ -f ${config.services.kanidm.serverSettings.db_path} ]
|
|
|
|
then
|
|
|
|
set -o xtrace
|
|
|
|
# since it's the last command, it produces an exit code for systemd as well
|
|
|
|
${lib.getExe pkgs.sqlite} ${config.services.kanidm.serverSettings.db_path} < ${./kanidm-db-migration.sql}
|
|
|
|
fi
|
|
|
|
'';
|
|
|
|
|
2025-03-16 19:50:41 +04:00
|
|
|
# lua stuff for nginx for debugging only
|
2024-12-20 16:13:59 +04:00
|
|
|
lua_core_path = "${pkgs.luajitPackages.lua-resty-core}/lib/lua/5.1/?.lua";
|
|
|
|
lua_lrucache_path = "${pkgs.luajitPackages.lua-resty-lrucache}/lib/lua/5.1/?.lua";
|
|
|
|
lua_path = "${lua_core_path};${lua_lrucache_path};";
|
2024-11-01 21:26:34 +04:00
|
|
|
in
|
2025-03-16 19:50:41 +04:00
|
|
|
lib.mkIf config.selfprivacy.sso.enable {
|
2025-03-28 17:08:37 +03:00
|
|
|
networking.hosts = {
|
|
|
|
# Allow the services to communicate with kanidm even if
|
|
|
|
# there is no DNS record yet
|
|
|
|
"127.0.0.1" = [ auth-fqdn ];
|
|
|
|
};
|
|
|
|
|
2025-03-16 19:50:41 +04:00
|
|
|
# kanidm uses TLS in internal connection with nginx too
|
|
|
|
# FIXME revise this: maybe kanidm must not have access to a public TLS
|
|
|
|
users.groups."acmereceivers".members = [ "kanidm" ];
|
|
|
|
|
|
|
|
# for ExecStartPost scripts to have access to /run/keys/*
|
|
|
|
users.groups.keys.members = [ "kanidm" ];
|
|
|
|
|
2025-04-21 19:07:16 +04:00
|
|
|
systemd.tmpfiles.settings."kanidm-secrets" = {
|
|
|
|
"${keys-path}/${selfprivacy-group}".d = {
|
|
|
|
user = "kanidm";
|
|
|
|
group = selfprivacy-group;
|
|
|
|
mode = "2750";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2025-03-16 19:50:41 +04:00
|
|
|
services.kanidm = {
|
|
|
|
enableServer = true;
|
|
|
|
|
|
|
|
# kanidm with Rust code patches for OAuth and admin passwords provisioning
|
2025-07-03 17:37:48 +03:00
|
|
|
package = pkgs.kanidm_1_6.withSecretProvisioning;
|
2025-03-16 19:50:41 +04:00
|
|
|
|
|
|
|
serverSettings = {
|
|
|
|
inherit domain;
|
|
|
|
# The origin for webauthn. This is the url to the server, with the port
|
|
|
|
# included if it is non-standard (any port except 443). This must match or
|
|
|
|
# be a descendent of the domain name you configure above. If these two
|
|
|
|
# items are not consistent, the server WILL refuse to start!
|
|
|
|
origin = "https://" + auth-fqdn;
|
|
|
|
|
|
|
|
# TODO revise this: maybe kanidm must not have access to a public TLS
|
2025-06-18 19:53:44 +03:00
|
|
|
tls_chain = "${config.security.acme.certs.${domain}.directory}/fullchain.pem";
|
|
|
|
tls_key = "${config.security.acme.certs.${domain}.directory}/key.pem";
|
2025-03-16 19:50:41 +04:00
|
|
|
|
|
|
|
# nginx should proxy requests to it
|
|
|
|
bindaddress = kanidm-bind-address;
|
|
|
|
|
2025-06-18 19:53:44 +03:00
|
|
|
ldapbindaddress = "${ldap-host}:${toString ldap-port}";
|
2025-03-16 19:50:41 +04:00
|
|
|
|
|
|
|
# kanidm is behind a proxy
|
|
|
|
trust_x_forward_for = true;
|
|
|
|
|
|
|
|
log_level = if config.selfprivacy.sso.debug then "trace" else "info";
|
2024-11-01 21:26:34 +04:00
|
|
|
};
|
2025-03-16 19:50:41 +04:00
|
|
|
provision = {
|
2024-11-01 21:26:34 +04:00
|
|
|
enable = true;
|
2025-03-16 19:50:41 +04:00
|
|
|
autoRemove = true; # if false, obsolete oauth2 scopeMaps remain
|
2025-09-02 12:16:12 +03:00
|
|
|
groups.${admins-group} = {
|
|
|
|
present = true;
|
|
|
|
overwriteMembers = false;
|
|
|
|
};
|
|
|
|
groups.${full-users-group} = {
|
|
|
|
present = true;
|
|
|
|
members = [
|
|
|
|
admins-group # admins are full users too.
|
|
|
|
];
|
|
|
|
overwriteMembers = false;
|
|
|
|
};
|
|
|
|
groups.idm_all_persons = {
|
|
|
|
present = true;
|
|
|
|
overwriteMembers = false;
|
|
|
|
};
|
2025-03-16 19:50:41 +04:00
|
|
|
};
|
|
|
|
enableClient = true;
|
|
|
|
clientSettings = {
|
|
|
|
uri = "https://" + auth-fqdn;
|
|
|
|
verify_ca = false; # FIXME
|
|
|
|
verify_hostnames = false; # FIXME
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
services.nginx = {
|
|
|
|
enable = true;
|
2025-06-18 19:53:44 +03:00
|
|
|
additionalModules = lib.mkIf config.selfprivacy.sso.debug [ pkgs.nginxModules.lua ];
|
2025-03-16 19:50:41 +04:00
|
|
|
commonHttpConfig = lib.mkIf config.selfprivacy.sso.debug ''
|
|
|
|
log_format kanidm escape=none '$request $status\n'
|
|
|
|
'[Request body]: $request_body\n'
|
|
|
|
'[Header]: $resp_header\n'
|
|
|
|
'[Response Body]: $resp_body\n\n';
|
|
|
|
lua_package_path "${lua_path}";
|
|
|
|
'';
|
|
|
|
virtualHosts.${auth-fqdn} = {
|
|
|
|
useACMEHost = domain;
|
|
|
|
forceSSL = true;
|
|
|
|
locations."/" = {
|
|
|
|
extraConfig = lib.mkIf config.selfprivacy.sso.debug ''
|
|
|
|
access_log /var/log/nginx/kanidm.log kanidm;
|
|
|
|
|
|
|
|
lua_need_request_body on;
|
|
|
|
|
|
|
|
# log header
|
|
|
|
set $req_header "";
|
|
|
|
set $resp_header "";
|
|
|
|
header_filter_by_lua '
|
|
|
|
local h = ngx.req.get_headers()
|
|
|
|
for k, v in pairs(h) do
|
|
|
|
if type(v) == "table" then
|
|
|
|
ngx.var.req_header = ngx.var.req_header .. k .. "=" .. table.concat(v, ", ") .. " "
|
|
|
|
else
|
|
|
|
ngx.var.req_header = ngx.var.req_header .. k .. "=" .. v .. " "
|
2024-12-20 16:13:59 +04:00
|
|
|
end
|
2025-03-16 19:50:41 +04:00
|
|
|
end
|
|
|
|
local rh = ngx.resp.get_headers()
|
|
|
|
for k, v in pairs(rh) do
|
|
|
|
if type(v) == "table" then
|
|
|
|
ngx.var.resp_header = ngx.var.resp_header .. k .. "=" .. table.concat(v, ", ") .. " "
|
|
|
|
else
|
|
|
|
ngx.var.resp_header = ngx.var.resp_header .. k .. "=" .. v .. " "
|
2024-12-20 16:13:59 +04:00
|
|
|
end
|
2025-03-16 19:50:41 +04:00
|
|
|
end
|
|
|
|
';
|
|
|
|
|
|
|
|
# log body
|
|
|
|
set $resp_body "";
|
|
|
|
body_filter_by_lua '
|
|
|
|
local resp_body = string.sub(ngx.arg[1], 1, 4000)
|
|
|
|
ngx.ctx.buffered = (ngx.ctx.buffered or "") .. resp_body
|
|
|
|
if ngx.arg[2] then
|
|
|
|
ngx.var.resp_body = ngx.ctx.buffered
|
|
|
|
end
|
|
|
|
';
|
|
|
|
'';
|
|
|
|
proxyPass = "https://${kanidm-bind-address}";
|
2024-11-01 21:26:34 +04:00
|
|
|
};
|
|
|
|
};
|
2025-03-16 19:50:41 +04:00
|
|
|
};
|
2024-11-01 21:26:34 +04:00
|
|
|
|
2025-09-02 12:16:12 +03:00
|
|
|
systemd.services.kanidm.serviceConfig = {
|
|
|
|
BindPaths = [
|
|
|
|
keys-path
|
|
|
|
];
|
|
|
|
# mkForce is used there to overwrite paths to secrets provisioning will use because those are created in ExecStartPre and systemd sandbox breaks.
|
|
|
|
BindReadOnlyPaths = lib.mkForce [
|
|
|
|
"/nix/store"
|
|
|
|
"/run/systemd/notify" # For healthcheck notifications
|
|
|
|
"-/etc/resolv.conf"
|
|
|
|
"-/etc/nsswitch.conf"
|
|
|
|
"-/etc/hosts"
|
|
|
|
"-/etc/localtime"
|
|
|
|
"-/etc/passwd"
|
|
|
|
"-/etc/group"
|
|
|
|
config.services.kanidm.serverSettings.tls_chain
|
|
|
|
config.services.kanidm.serverSettings.tls_key
|
|
|
|
];
|
|
|
|
ExecStartPre =
|
|
|
|
# idempotent script to run on each startup only for kanidm v1.5.0
|
|
|
|
lib.mkIf (lib.versionAtLeast config.services.kanidm.package.version "1.5.0") (
|
|
|
|
lib.mkBefore [ kanidmMigrateDbScript ]
|
|
|
|
);
|
|
|
|
};
|
2025-04-21 20:21:55 +04:00
|
|
|
|
2025-03-16 19:50:41 +04:00
|
|
|
selfprivacy.passthru.auth = {
|
|
|
|
inherit
|
|
|
|
admins-group
|
|
|
|
auth-fqdn
|
|
|
|
full-users-group
|
|
|
|
ldap-host
|
|
|
|
ldap-port
|
2025-03-16 19:51:18 +04:00
|
|
|
keys-path
|
2025-03-16 19:50:41 +04:00
|
|
|
;
|
|
|
|
oauth2-introspection-url-prefix = client_id: "https://${client_id}:";
|
2025-06-18 19:53:44 +03:00
|
|
|
oauth2-introspection-url-postfix = "@${auth-fqdn}/oauth2/token/introspect";
|
|
|
|
oauth2-discovery-url =
|
|
|
|
client_id: "https://${auth-fqdn}/oauth2/openid/${client_id}/.well-known/openid-configuration";
|
2025-03-16 19:50:41 +04:00
|
|
|
oauth2-provider-name = "Kanidm";
|
|
|
|
oauth2-systemd-service = "kanidm.service";
|
|
|
|
|
|
|
|
# e.g. "dc=mydomain,dc=com"
|
2025-06-18 19:53:44 +03:00
|
|
|
ldap-base-dn = lib.strings.concatMapStringsSep "," (x: "dc=" + x) (
|
|
|
|
lib.strings.splitString "." domain
|
|
|
|
);
|
2025-03-16 19:51:18 +04:00
|
|
|
|
|
|
|
# TODO consider to pass a value or throw exception if token is not generated
|
2025-06-18 19:53:44 +03:00
|
|
|
mkServiceAccountTokenFP = linuxGroup: "${keys-path}/${linuxGroup}/kanidm-service-account-token";
|
2025-03-16 19:51:18 +04:00
|
|
|
|
2025-06-18 19:53:44 +03:00
|
|
|
mkOAuth2ClientSecretFP = linuxGroup: "${keys-path}/${linuxGroup}/kanidm-oauth-client-secret";
|
2024-11-01 21:26:34 +04:00
|
|
|
};
|
|
|
|
}
|