auth: ldap-dovecot.nix, clean code
This commit is contained in:
35
sp-modules/auth/common.nix
Normal file
35
sp-modules/auth/common.nix
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
{ config, lib, pkgs, ... }:
|
||||||
|
rec {
|
||||||
|
domain = config.selfprivacy.domain;
|
||||||
|
cfg = config.selfprivacy.modules.auth;
|
||||||
|
passthru = config.passthru.selfprivacy.auth;
|
||||||
|
auth-fqdn = cfg.subdomain + "." + domain;
|
||||||
|
|
||||||
|
kanidm_ldap_port = 3636;
|
||||||
|
|
||||||
|
# e.g. "dc=mydomain,dc=com"
|
||||||
|
ldap_base_dn =
|
||||||
|
lib.strings.concatMapStringsSep
|
||||||
|
","
|
||||||
|
(x: "dc=" + x)
|
||||||
|
(lib.strings.splitString "." domain);
|
||||||
|
|
||||||
|
appendLdapBindPwd =
|
||||||
|
{ name, file, prefix, suffix ? "", passwordFile, destination }:
|
||||||
|
pkgs.writeScript "append-ldap-bind-pwd-in-${name}" ''
|
||||||
|
#!${pkgs.stdenv.shell}
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
baseDir=$(dirname ${destination})
|
||||||
|
if (! test -d "$baseDir"); then
|
||||||
|
mkdir -p $baseDir
|
||||||
|
chmod 755 $baseDir
|
||||||
|
fi
|
||||||
|
|
||||||
|
cat ${file} > ${destination}
|
||||||
|
echo -n '${prefix}' >> ${destination}
|
||||||
|
cat ${passwordFile} >> ${destination}
|
||||||
|
echo -n '${suffix}' >> ${destination}
|
||||||
|
chmod 600 ${destination}
|
||||||
|
'';
|
||||||
|
}
|
@@ -2,6 +2,7 @@
|
|||||||
["mailserver", "fqdn"],
|
["mailserver", "fqdn"],
|
||||||
["mailserver", "ldap"],
|
["mailserver", "ldap"],
|
||||||
["mailserver", "vmailUID"],
|
["mailserver", "vmailUID"],
|
||||||
|
["passthru", "selfprivacy", "auth"],
|
||||||
["security", "acme", "certs"],
|
["security", "acme", "certs"],
|
||||||
["selfprivacy", "domain"],
|
["selfprivacy", "domain"],
|
||||||
["selfprivacy", "modules"],
|
["selfprivacy", "modules"],
|
||||||
|
@@ -36,11 +36,12 @@
|
|||||||
+ /nixos/modules/services/security/oauth2-proxy-nginx.nix)
|
+ /nixos/modules/services/security/oauth2-proxy-nginx.nix)
|
||||||
./module.nix
|
./module.nix
|
||||||
./ldap-postfix.nix
|
./ldap-postfix.nix
|
||||||
|
./ldap-dovecot.nix
|
||||||
];
|
];
|
||||||
nixpkgs.overlays = [ self.overlays.default ];
|
nixpkgs.overlays = [ self.overlays.default ];
|
||||||
|
|
||||||
selfprivacy.modules.auth.enable = true;
|
selfprivacy.modules.auth.enable = true;
|
||||||
selfprivacy.modules.auth.debug = true;
|
selfprivacy.modules.auth.debug = false;
|
||||||
};
|
};
|
||||||
|
|
||||||
configPathsNeeded =
|
configPathsNeeded =
|
||||||
|
129
sp-modules/auth/ldap-dovecot.nix
Normal file
129
sp-modules/auth/ldap-dovecot.nix
Normal file
@@ -0,0 +1,129 @@
|
|||||||
|
{ config, lib, pkgs, ... }@nixos-args:
|
||||||
|
let
|
||||||
|
inherit (import ./common.nix nixos-args)
|
||||||
|
appendLdapBindPwd
|
||||||
|
cfg
|
||||||
|
domain
|
||||||
|
passthru
|
||||||
|
;
|
||||||
|
|
||||||
|
ldapConfFile = "/run/dovecot2/dovecot-ldap.conf.ext"; # FIXME get "dovecot2" from `config`
|
||||||
|
mkLdapSearchScope = scope: (
|
||||||
|
if scope == "sub" then "subtree"
|
||||||
|
else if scope == "one" then "onelevel"
|
||||||
|
else scope
|
||||||
|
);
|
||||||
|
dovecot-ldap-config = pkgs.writeTextFile {
|
||||||
|
name = "dovecot-ldap.conf.ext.template";
|
||||||
|
text = ''
|
||||||
|
ldap_version = 3
|
||||||
|
uris = ${lib.concatStringsSep " " config.mailserver.ldap.uris}
|
||||||
|
${lib.optionalString config.mailserver.ldap.startTls ''
|
||||||
|
tls = yes
|
||||||
|
''}
|
||||||
|
# tls_require_cert = hard
|
||||||
|
# tls_ca_cert_file = ${config.mailserver.ldap.tlsCAFile}
|
||||||
|
dn = ${config.mailserver.ldap.bind.dn}
|
||||||
|
sasl_bind = no
|
||||||
|
auth_bind = no
|
||||||
|
base = ${config.mailserver.ldap.searchBase}
|
||||||
|
scope = ${mkLdapSearchScope config.mailserver.ldap.searchScope}
|
||||||
|
${lib.optionalString (config.mailserver.ldap.dovecot.userAttrs != null) ''
|
||||||
|
user_attrs = ${config.mailserver.ldap.dovecot.userAttrs}
|
||||||
|
''}
|
||||||
|
user_filter = ${config.mailserver.ldap.dovecot.userFilter}
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
setPwdInLdapConfFile = appendLdapBindPwd {
|
||||||
|
name = "ldap-conf-file";
|
||||||
|
file = dovecot-ldap-config;
|
||||||
|
prefix = ''dnpass = "'';
|
||||||
|
suffix = ''"'';
|
||||||
|
passwordFile = config.mailserver.ldap.bind.passwordFile;
|
||||||
|
destination = ldapConfFile;
|
||||||
|
};
|
||||||
|
dovecot-oauth2-conf-file = pkgs.writeTextFile {
|
||||||
|
name = "dovecot-oauth2.conf.ext";
|
||||||
|
text = ''
|
||||||
|
introspection_mode = post
|
||||||
|
introspection_url = ${passthru.oauth2-introspection-url "roundcube" "VERYSTRONGSECRETFORROUNDCUBE"}
|
||||||
|
client_id = roundcube
|
||||||
|
client_secret = VERYSTRONGSECRETFORROUNDCUBE # FIXME
|
||||||
|
username_attribute = username
|
||||||
|
# scope = email groups profile openid dovecotprofile
|
||||||
|
scope = email profile openid
|
||||||
|
tls_ca_cert_file = /etc/ssl/certs/ca-certificates.crt
|
||||||
|
active_attribute = active
|
||||||
|
active_value = true
|
||||||
|
openid_configuration_url = ${passthru.oauth2-discovery-url "roundcube"}
|
||||||
|
debug = ${if cfg.debug then "yes" else "no"}
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
in
|
||||||
|
{
|
||||||
|
mailserver.ldap = {
|
||||||
|
# note: in `ldapsearch` first comes filter, then attributes
|
||||||
|
dovecot.userAttrs = "+"; # all operational attributes
|
||||||
|
# TODO: investigate whether "mail=%u" is better than:
|
||||||
|
# dovecot.userFilter = "(&(class=person)(uid=%n))";
|
||||||
|
};
|
||||||
|
|
||||||
|
services.dovecot2.extraConfig = ''
|
||||||
|
auth_mechanisms = xoauth2 oauthbearer
|
||||||
|
|
||||||
|
passdb {
|
||||||
|
driver = oauth2
|
||||||
|
mechanisms = xoauth2 oauthbearer
|
||||||
|
args = ${dovecot-oauth2-conf-file}
|
||||||
|
}
|
||||||
|
|
||||||
|
userdb {
|
||||||
|
driver = static
|
||||||
|
args = uid=virtualMail gid=virtualMail home=/var/vmail/${domain}/%u
|
||||||
|
}
|
||||||
|
|
||||||
|
# provide SASL via unix socket to postfix
|
||||||
|
service auth {
|
||||||
|
unix_listener /var/lib/postfix/private-auth {
|
||||||
|
mode = 0660
|
||||||
|
user = postfix
|
||||||
|
group = postfix
|
||||||
|
}
|
||||||
|
}
|
||||||
|
service auth {
|
||||||
|
unix_listener auth-userdb {
|
||||||
|
mode = 0660
|
||||||
|
user = dovecot2
|
||||||
|
}
|
||||||
|
unix_listener dovecot-auth {
|
||||||
|
mode = 0660
|
||||||
|
# Assuming the default Postfix user and group
|
||||||
|
user = postfix
|
||||||
|
group = postfix
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
userdb {
|
||||||
|
driver = ldap
|
||||||
|
args = ${ldapConfFile}
|
||||||
|
default_fields = home=/var/vmail/${domain}/%u uid=${toString config.mailserver.vmailUID} gid=${toString config.mailserver.vmailUID}
|
||||||
|
}
|
||||||
|
|
||||||
|
#auth_username_format = %Ln
|
||||||
|
|
||||||
|
# FIXME
|
||||||
|
auth_debug = yes
|
||||||
|
auth_debug_passwords = yes # Be cautious with this in production as it logs passwords
|
||||||
|
auth_verbose = yes
|
||||||
|
mail_debug = yes
|
||||||
|
'';
|
||||||
|
services.dovecot2.enablePAM = false;
|
||||||
|
systemd.services.dovecot2 = {
|
||||||
|
# TODO does it merge with existing preStart?
|
||||||
|
preStart = setPwdInLdapConfFile + "\n";
|
||||||
|
};
|
||||||
|
|
||||||
|
# does it merge with existing restartTriggers?
|
||||||
|
systemd.services.postfix.restartTriggers = [ setPwdInLdapConfFile ];
|
||||||
|
|
||||||
|
}
|
@@ -1,26 +1,11 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
{ config, lib, pkgs, ... }@nixos-args:
|
||||||
let
|
let
|
||||||
|
inherit (import ./common.nix nixos-args)
|
||||||
|
appendLdapBindPwd
|
||||||
|
;
|
||||||
|
|
||||||
cfg = config.mailserver;
|
cfg = config.mailserver;
|
||||||
|
|
||||||
appendLdapBindPwd =
|
|
||||||
{ name, file, prefix, suffix ? "", passwordFile, destination }:
|
|
||||||
pkgs.writeScript "append-ldap-bind-pwd-in-${name}" ''
|
|
||||||
#!${pkgs.stdenv.shell}
|
|
||||||
set -euo pipefail
|
|
||||||
|
|
||||||
baseDir=$(dirname ${destination})
|
|
||||||
if (! test -d "$baseDir"); then
|
|
||||||
mkdir -p $baseDir
|
|
||||||
chmod 755 $baseDir
|
|
||||||
fi
|
|
||||||
|
|
||||||
cat ${file} > ${destination}
|
|
||||||
echo -n '${prefix}' >> ${destination}
|
|
||||||
cat ${passwordFile} >> ${destination}
|
|
||||||
echo -n '${suffix}' >> ${destination}
|
|
||||||
chmod 600 ${destination}
|
|
||||||
'';
|
|
||||||
|
|
||||||
ldapSenderLoginMapFile = "/run/postfix/ldap-sender-login-map.cf";
|
ldapSenderLoginMapFile = "/run/postfix/ldap-sender-login-map.cf";
|
||||||
submissionOptions.smtpd_sender_login_maps =
|
submissionOptions.smtpd_sender_login_maps =
|
||||||
lib.mkForce "hash:/etc/postfix/vaccounts,ldap:${ldapSenderLoginMapFile}";
|
lib.mkForce "hash:/etc/postfix/vaccounts,ldap:${ldapSenderLoginMapFile}";
|
||||||
@@ -65,6 +50,10 @@ let
|
|||||||
};
|
};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
mailserver.ldap = {
|
||||||
|
postfix.mailAttribute = "mail";
|
||||||
|
postfix.uidAttribute = "uid";
|
||||||
|
};
|
||||||
systemd.services.postfix-setup = {
|
systemd.services.postfix-setup = {
|
||||||
preStart = ''
|
preStart = ''
|
||||||
${appendPwdInVirtualMailboxMap}
|
${appendPwdInVirtualMailboxMap}
|
||||||
@@ -75,7 +64,12 @@ in
|
|||||||
services.postfix = {
|
services.postfix = {
|
||||||
# the list should be merged with other options from nixos-mailserver
|
# the list should be merged with other options from nixos-mailserver
|
||||||
config.virtual_mailbox_maps = [ "ldap:${ldapVirtualMailboxMapFile}" ];
|
config.virtual_mailbox_maps = [ "ldap:${ldapVirtualMailboxMapFile}" ];
|
||||||
submissionOptions = submissionOptions;
|
inherit submissionOptions;
|
||||||
submissionsOptions = submissionOptions;
|
submissionsOptions = submissionOptions;
|
||||||
|
# extraConfig = ''
|
||||||
|
# debug_peer_list =
|
||||||
|
# debug_peer_level = 3
|
||||||
|
# smtp_tls_security_level = encrypt
|
||||||
|
# '';
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@@ -1,96 +1,17 @@
|
|||||||
{ config, lib, pkgs, ... }:
|
{ config, lib, pkgs, ... }@nixos-args:
|
||||||
let
|
let
|
||||||
domain = config.selfprivacy.domain;
|
inherit (import ./common.nix nixos-args)
|
||||||
cfg = config.selfprivacy.modules.auth;
|
auth-fqdn
|
||||||
auth-fqdn = cfg.subdomain + "." + domain;
|
cfg
|
||||||
oauth2-introspection-url = client_id: client_secret:
|
domain
|
||||||
"https://${client_id}:${client_secret}@${auth-fqdn}/oauth2/token/introspect";
|
kanidm_ldap_port
|
||||||
oauth2-discovery-url = client_id: "https://${auth-fqdn}/oauth2/openid/${client_id}/.well-known/openid-configuration";
|
ldap_base_dn
|
||||||
|
passthru
|
||||||
kanidm-bind-address = "127.0.0.1:3013";
|
;
|
||||||
ldap_host = "127.0.0.1";
|
|
||||||
ldap_port = 3636;
|
|
||||||
# e.g. "dc=mydomain,dc=com"
|
|
||||||
ldap_base_dn =
|
|
||||||
lib.strings.concatMapStringsSep
|
|
||||||
","
|
|
||||||
(x: "dc=" + x)
|
|
||||||
(lib.strings.splitString "." domain);
|
|
||||||
|
|
||||||
dovecot-oauth2-conf-file = pkgs.writeTextFile {
|
|
||||||
name = "dovecot-oauth2.conf.ext";
|
|
||||||
text = ''
|
|
||||||
introspection_mode = post
|
|
||||||
introspection_url = ${oauth2-introspection-url "roundcube" "VERYSTRONGSECRETFORROUNDCUBE"}
|
|
||||||
client_id = roundcube
|
|
||||||
client_secret = VERYSTRONGSECRETFORROUNDCUBE # FIXME
|
|
||||||
username_attribute = username
|
|
||||||
# scope = email groups profile openid dovecotprofile
|
|
||||||
scope = email profile openid
|
|
||||||
tls_ca_cert_file = /etc/ssl/certs/ca-certificates.crt
|
|
||||||
active_attribute = active
|
|
||||||
active_value = true
|
|
||||||
openid_configuration_url = ${oauth2-discovery-url "roundcube"}
|
|
||||||
debug = ${if cfg.debug then "yes" else "no"}
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
lua_core_path = "${pkgs.luajitPackages.lua-resty-core}/lib/lua/5.1/?.lua";
|
lua_core_path = "${pkgs.luajitPackages.lua-resty-core}/lib/lua/5.1/?.lua";
|
||||||
lua_lrucache_path = "${pkgs.luajitPackages.lua-resty-lrucache}/lib/lua/5.1/?.lua";
|
lua_lrucache_path = "${pkgs.luajitPackages.lua-resty-lrucache}/lib/lua/5.1/?.lua";
|
||||||
lua_path = "${lua_core_path};${lua_lrucache_path};";
|
lua_path = "${lua_core_path};${lua_lrucache_path};";
|
||||||
ldapConfFile = "/run/dovecot2/dovecot-ldap.conf.ext"; # FIXME get "dovecot2" from `config`
|
|
||||||
mkLdapSearchScope = scope: (
|
|
||||||
if scope == "sub" then "subtree"
|
|
||||||
else if scope == "one" then "onelevel"
|
|
||||||
else scope
|
|
||||||
);
|
|
||||||
appendLdapBindPwd =
|
|
||||||
{ name, file, prefix, suffix ? "", passwordFile, destination }:
|
|
||||||
pkgs.writeScript "append-ldap-bind-pwd-in-${name}" ''
|
|
||||||
#!${pkgs.stdenv.shell}
|
|
||||||
set -euo pipefail
|
|
||||||
|
|
||||||
baseDir=$(dirname ${destination})
|
|
||||||
if (! test -d "$baseDir"); then
|
|
||||||
mkdir -p $baseDir
|
|
||||||
chmod 755 $baseDir
|
|
||||||
fi
|
|
||||||
|
|
||||||
cat ${file} > ${destination}
|
|
||||||
echo -n '${prefix}' >> ${destination}
|
|
||||||
cat ${passwordFile} >> ${destination}
|
|
||||||
echo -n '${suffix}' >> ${destination}
|
|
||||||
chmod 600 ${destination}
|
|
||||||
'';
|
|
||||||
dovecot-ldap-config = pkgs.writeTextFile {
|
|
||||||
name = "dovecot-ldap.conf.ext.template";
|
|
||||||
text = ''
|
|
||||||
ldap_version = 3
|
|
||||||
uris = ${lib.concatStringsSep " " config.mailserver.ldap.uris}
|
|
||||||
${lib.optionalString config.mailserver.ldap.startTls ''
|
|
||||||
tls = yes
|
|
||||||
''}
|
|
||||||
# tls_require_cert = hard
|
|
||||||
# tls_ca_cert_file = ${config.mailserver.ldap.tlsCAFile}
|
|
||||||
dn = ${config.mailserver.ldap.bind.dn}
|
|
||||||
sasl_bind = no
|
|
||||||
auth_bind = no
|
|
||||||
base = ${config.mailserver.ldap.searchBase}
|
|
||||||
scope = ${mkLdapSearchScope config.mailserver.ldap.searchScope}
|
|
||||||
${lib.optionalString (config.mailserver.ldap.dovecot.userAttrs != null) ''
|
|
||||||
user_attrs = ${config.mailserver.ldap.dovecot.userAttrs}
|
|
||||||
''}
|
|
||||||
user_filter = ${config.mailserver.ldap.dovecot.userFilter}
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
setPwdInLdapConfFile = appendLdapBindPwd {
|
|
||||||
name = "ldap-conf-file";
|
|
||||||
file = dovecot-ldap-config;
|
|
||||||
prefix = ''dnpass = "'';
|
|
||||||
suffix = ''"'';
|
|
||||||
passwordFile = config.mailserver.ldap.bind.passwordFile;
|
|
||||||
destination = ldapConfFile;
|
|
||||||
};
|
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options.selfprivacy.modules.auth = {
|
options.selfprivacy.modules.auth = {
|
||||||
@@ -118,16 +39,6 @@ in
|
|||||||
|
|
||||||
# kanidm with Rust code patches for OAuth and admin passwords provisioning
|
# kanidm with Rust code patches for OAuth and admin passwords provisioning
|
||||||
package = pkgs.kanidm.withSecretProvisioning;
|
package = pkgs.kanidm.withSecretProvisioning;
|
||||||
# package = pkgs.kanidm.withSecretProvisioning.overrideAttrs (_: {
|
|
||||||
# version = "git";
|
|
||||||
# src = pkgs.fetchFromGitHub {
|
|
||||||
# owner = "AleXoundOS";
|
|
||||||
# repo = "kanidm";
|
|
||||||
# rev = "a1a55f2e53facbfa504c7d64c44c3b5d0eb796c2";
|
|
||||||
# hash = "sha256-ADh4Zwn6EMt4CiOrvgG0RbmNMeR5i0ilVTxF46t/wm8=";
|
|
||||||
# };
|
|
||||||
# doCheck = false;
|
|
||||||
# });
|
|
||||||
|
|
||||||
serverSettings = {
|
serverSettings = {
|
||||||
inherit domain;
|
inherit domain;
|
||||||
@@ -143,13 +54,15 @@ in
|
|||||||
tls_key =
|
tls_key =
|
||||||
"${config.security.acme.certs.${domain}.directory}/key.pem";
|
"${config.security.acme.certs.${domain}.directory}/key.pem";
|
||||||
|
|
||||||
bindaddress = kanidm-bind-address; # nginx should connect to it
|
# nginx should proxy requests to it
|
||||||
ldapbindaddress = "${ldap_host}:${toString ldap_port}";
|
bindaddress = passthru.kanidm-bind-address;
|
||||||
|
|
||||||
|
ldapbindaddress = "127.0.0.1:${toString kanidm_ldap_port}";
|
||||||
|
|
||||||
# kanidm is behind a proxy
|
# kanidm is behind a proxy
|
||||||
trust_x_forward_for = true;
|
trust_x_forward_for = true;
|
||||||
|
|
||||||
log_level = "trace"; # FIXME
|
log_level = if cfg.debug then "trace" else "info";
|
||||||
};
|
};
|
||||||
provision = {
|
provision = {
|
||||||
enable = true;
|
enable = true;
|
||||||
@@ -162,24 +75,6 @@ in
|
|||||||
verify_hostnames = false; # FIXME
|
verify_hostnames = false; # FIXME
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
# systemd.services.kanidm.serviceConfig.ExecStartPost = lib.mkBefore ''
|
|
||||||
# # check kanidm online here with curl again?
|
|
||||||
# # use API key for group creation?
|
|
||||||
# '';
|
|
||||||
# services.phpfpm.pools.roundcube.settings = {
|
|
||||||
# catch_workers_output = true;
|
|
||||||
# "php_admin_value[error_log]" = "stdout";
|
|
||||||
# "php_admin_flag[log_errors]" = true;
|
|
||||||
# "php_admin_value[log_level]" = "debug";
|
|
||||||
# };
|
|
||||||
services.phpfpm.phpOptions = ''
|
|
||||||
error_reporting = E_ALL
|
|
||||||
display_errors = on;
|
|
||||||
'';
|
|
||||||
systemd.services.phpfpm-roundcube.serviceConfig = {
|
|
||||||
StandardError = "journal";
|
|
||||||
StandardOutput = "journal";
|
|
||||||
};
|
|
||||||
|
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
enable = true;
|
enable = true;
|
||||||
@@ -196,11 +91,6 @@ in
|
|||||||
useACMEHost = domain;
|
useACMEHost = domain;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
# extraConfig = ''
|
|
||||||
# if ($args != $new_args) {
|
|
||||||
# rewrite ^ /ui/oauth2?$new_args? last;
|
|
||||||
# }
|
|
||||||
# '';
|
|
||||||
extraConfig = lib.strings.optionalString cfg.debug ''
|
extraConfig = lib.strings.optionalString cfg.debug ''
|
||||||
access_log /var/log/nginx/kanidm.log kanidm;
|
access_log /var/log/nginx/kanidm.log kanidm;
|
||||||
|
|
||||||
@@ -230,16 +120,9 @@ in
|
|||||||
end
|
end
|
||||||
';
|
';
|
||||||
'';
|
'';
|
||||||
proxyPass = "https://${kanidm-bind-address}";
|
proxyPass = "https://${passthru.kanidm-bind-address}";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
# appendHttpConfig = ''
|
|
||||||
# # Define a map to modify redirect_uri and append %2F if missing
|
|
||||||
# map $args $new_args {
|
|
||||||
# ~^((.*)(redirect_uri=[^&]+)(?!%2F)(.*))$ $2$3%2F$4;
|
|
||||||
# default $args;
|
|
||||||
# }
|
|
||||||
# '';
|
|
||||||
};
|
};
|
||||||
|
|
||||||
# TODO move to mailserver module everything below
|
# TODO move to mailserver module everything below
|
||||||
@@ -248,7 +131,7 @@ in
|
|||||||
|
|
||||||
mailserver.loginAccounts = lib.mkForce { };
|
mailserver.loginAccounts = lib.mkForce { };
|
||||||
mailserver.extraVirtualAliases = lib.mkForce { };
|
mailserver.extraVirtualAliases = lib.mkForce { };
|
||||||
# LDAP is needed for Postfix to query Kanidm about email address ownership
|
# LDAP is needed for Postfix to query Kanidm about email address ownership.
|
||||||
# LDAP is needed for Dovecot also.
|
# LDAP is needed for Dovecot also.
|
||||||
mailserver.ldap = {
|
mailserver.ldap = {
|
||||||
enable = false;
|
enable = false;
|
||||||
@@ -256,94 +139,24 @@ in
|
|||||||
bind.dn = "dn=token";
|
bind.dn = "dn=token";
|
||||||
# TODO change in this file should trigger system restart dovecot
|
# TODO change in this file should trigger system restart dovecot
|
||||||
bind.passwordFile = "/run/keys/dovecot/kanidm-service-account-token"; # FIXME
|
bind.passwordFile = "/run/keys/dovecot/kanidm-service-account-token"; # FIXME
|
||||||
|
|
||||||
# searchBase = "ou=persons," + ldap_base_dn;
|
# searchBase = "ou=persons," + ldap_base_dn;
|
||||||
searchBase = ldap_base_dn;
|
searchBase = ldap_base_dn; # TODO refine this
|
||||||
# searchScope = "sub";
|
|
||||||
uris = [ "ldaps://localhost:${toString ldap_port}" ];
|
|
||||||
|
|
||||||
# note: in `ldapsearch` first comes filter, then attributes
|
# NOTE: 127.0.0.1 instead of localhost does not work for unknown reason
|
||||||
dovecot.userAttrs = "+"; # all operational attributes
|
uris = [ "ldaps://localhost:${toString kanidm_ldap_port}" ];
|
||||||
# TODO: investigate whether "mail=%u" is better than:
|
|
||||||
# dovecot.userFilter = "(&(class=person)(uid=%n))";
|
|
||||||
postfix.mailAttribute = "mail";
|
|
||||||
postfix.uidAttribute = "uid";
|
|
||||||
};
|
};
|
||||||
|
|
||||||
services.dovecot2.extraConfig = ''
|
|
||||||
auth_mechanisms = xoauth2 oauthbearer
|
|
||||||
|
|
||||||
passdb {
|
|
||||||
driver = oauth2
|
|
||||||
mechanisms = xoauth2 oauthbearer
|
|
||||||
args = ${dovecot-oauth2-conf-file}
|
|
||||||
}
|
|
||||||
|
|
||||||
userdb {
|
|
||||||
driver = static
|
|
||||||
args = uid=virtualMail gid=virtualMail home=/var/vmail/${domain}/%u
|
|
||||||
}
|
|
||||||
|
|
||||||
# provide SASL via unix socket to postfix
|
|
||||||
service auth {
|
|
||||||
unix_listener /var/lib/postfix/private-auth {
|
|
||||||
mode = 0660
|
|
||||||
user = postfix
|
|
||||||
group = postfix
|
|
||||||
}
|
|
||||||
}
|
|
||||||
service auth {
|
|
||||||
unix_listener auth-userdb {
|
|
||||||
mode = 0660
|
|
||||||
user = dovecot2
|
|
||||||
}
|
|
||||||
unix_listener dovecot-auth {
|
|
||||||
mode = 0660
|
|
||||||
# Assuming the default Postfix user and group
|
|
||||||
user = postfix
|
|
||||||
group = postfix
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
userdb {
|
|
||||||
driver = ldap
|
|
||||||
args = ${ldapConfFile}
|
|
||||||
default_fields = home=/var/vmail/${domain}/%u uid=${toString config.mailserver.vmailUID} gid=${toString config.mailserver.vmailUID}
|
|
||||||
}
|
|
||||||
|
|
||||||
#auth_username_format = %Ln
|
|
||||||
|
|
||||||
# FIXME
|
|
||||||
auth_debug = yes
|
|
||||||
auth_debug_passwords = yes # Be cautious with this in production as it logs passwords
|
|
||||||
auth_verbose = yes
|
|
||||||
mail_debug = yes
|
|
||||||
'';
|
|
||||||
services.dovecot2.enablePAM = false;
|
|
||||||
services.postfix.extraConfig = ''
|
|
||||||
debug_peer_list = 94.43.135.210, 134.209.202.195
|
|
||||||
debug_peer_level = 3
|
|
||||||
smtp_use_tls = yes
|
|
||||||
# these below are already set in nixos-mailserver/mail-server/postfix.nix
|
|
||||||
# smtpd_sasl_local_domain = ${domain}
|
|
||||||
# smtpd_relay_restrictions = permit_sasl_authenticated, reject
|
|
||||||
# smtpd_sender_restrictions =
|
|
||||||
# smtpd_sender_login_maps =
|
|
||||||
# smtpd_sasl_type = dovecot
|
|
||||||
# smtpd_sasl_path = private-auth
|
|
||||||
# smtpd_sasl_auth_enable = yes
|
|
||||||
'';
|
|
||||||
|
|
||||||
systemd.services.dovecot2 = {
|
|
||||||
# TODO does it merge with existing preStart?
|
|
||||||
preStart = setPwdInLdapConfFile + "\n";
|
|
||||||
};
|
|
||||||
|
|
||||||
# does it merge with existing restartTriggers?
|
|
||||||
systemd.services.postfix.restartTriggers = [ setPwdInLdapConfFile ];
|
|
||||||
|
|
||||||
environment.systemPackages = lib.lists.optionals cfg.debug [
|
environment.systemPackages = lib.lists.optionals cfg.debug [
|
||||||
pkgs.shelldap
|
pkgs.shelldap
|
||||||
pkgs.openldap
|
pkgs.openldap
|
||||||
];
|
];
|
||||||
|
|
||||||
|
passthru.selfprivacy.auth = {
|
||||||
|
kanidm-bind-address = "127.0.0.1:3013";
|
||||||
|
oauth2-introspection-url = client_id: client_secret:
|
||||||
|
"https://${client_id}:${client_secret}@${auth-fqdn}/oauth2/token/introspect";
|
||||||
|
oauth2-discovery-url = client_id: "https://${auth-fqdn}/oauth2/openid/${client_id}/.well-known/openid-configuration";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user