163 lines
5.4 KiB
Nix
163 lines
5.4 KiB
Nix
{ config, lib, pkgs, ... }@nixos-args:
|
|
let
|
|
inherit (import ./common.nix nixos-args)
|
|
auth-fqdn
|
|
cfg
|
|
domain
|
|
kanidm_ldap_port
|
|
ldap_base_dn
|
|
passthru
|
|
;
|
|
|
|
lua_core_path = "${pkgs.luajitPackages.lua-resty-core}/lib/lua/5.1/?.lua";
|
|
lua_lrucache_path = "${pkgs.luajitPackages.lua-resty-lrucache}/lib/lua/5.1/?.lua";
|
|
lua_path = "${lua_core_path};${lua_lrucache_path};";
|
|
in
|
|
{
|
|
options.selfprivacy.modules.auth = {
|
|
enable = lib.mkOption {
|
|
default = false;
|
|
type = lib.types.bool;
|
|
};
|
|
subdomain = lib.mkOption {
|
|
default = "auth";
|
|
type = lib.types.strMatching "[A-Za-z0-9][A-Za-z0-9\-]{0,61}[A-Za-z0-9]";
|
|
};
|
|
debug = lib.mkOption {
|
|
default = false;
|
|
type = lib.types.bool;
|
|
};
|
|
};
|
|
|
|
config = lib.mkIf cfg.enable {
|
|
# kanidm uses TLS in internal connection with nginx too
|
|
# FIXME revise this: maybe kanidm must not have access to a public TLS
|
|
users.groups."acmereceivers".members = [ "kanidm" ];
|
|
|
|
services.kanidm = {
|
|
enableServer = true;
|
|
|
|
# kanidm with Rust code patches for OAuth and admin passwords provisioning
|
|
package = pkgs.kanidm.withSecretProvisioning;
|
|
|
|
serverSettings = {
|
|
inherit domain;
|
|
# The origin for webauthn. This is the url to the server, with the port
|
|
# included if it is non-standard (any port except 443). This must match or
|
|
# be a descendent of the domain name you configure above. If these two
|
|
# items are not consistent, the server WILL refuse to start!
|
|
origin = "https://" + auth-fqdn;
|
|
|
|
# TODO revise this: maybe kanidm must not have access to a public TLS
|
|
tls_chain =
|
|
"${config.security.acme.certs.${domain}.directory}/fullchain.pem";
|
|
tls_key =
|
|
"${config.security.acme.certs.${domain}.directory}/key.pem";
|
|
|
|
# nginx should proxy requests to it
|
|
bindaddress = passthru.kanidm-bind-address;
|
|
|
|
ldapbindaddress = "127.0.0.1:${toString kanidm_ldap_port}";
|
|
|
|
# kanidm is behind a proxy
|
|
trust_x_forward_for = true;
|
|
|
|
log_level = if cfg.debug then "trace" else "info";
|
|
};
|
|
provision = {
|
|
enable = true;
|
|
autoRemove = false;
|
|
};
|
|
enableClient = true;
|
|
clientSettings = {
|
|
uri = "https://" + auth-fqdn;
|
|
verify_ca = false; # FIXME
|
|
verify_hostnames = false; # FIXME
|
|
};
|
|
};
|
|
|
|
services.nginx = {
|
|
enable = true;
|
|
additionalModules =
|
|
lib.lists.optional cfg.debug pkgs.nginxModules.lua;
|
|
commonHttpConfig = lib.strings.optionalString cfg.debug ''
|
|
log_format kanidm escape=none '$request $status\n'
|
|
'[Request body]: $request_body\n'
|
|
'[Header]: $resp_header\n'
|
|
'[Response Body]: $resp_body\n\n';
|
|
lua_package_path "${lua_path}";
|
|
'';
|
|
virtualHosts.${auth-fqdn} = {
|
|
useACMEHost = domain;
|
|
forceSSL = true;
|
|
locations."/" = {
|
|
extraConfig = lib.strings.optionalString cfg.debug ''
|
|
access_log /var/log/nginx/kanidm.log kanidm;
|
|
|
|
lua_need_request_body on;
|
|
|
|
# log header
|
|
set $req_header "";
|
|
set $resp_header "";
|
|
header_filter_by_lua '
|
|
local h = ngx.req.get_headers()
|
|
for k, v in pairs(h) do
|
|
ngx.var.req_header = ngx.var.req_header .. k.."="..v.." "
|
|
end
|
|
local rh = ngx.resp.get_headers()
|
|
for k, v in pairs(rh) do
|
|
ngx.var.resp_header = ngx.var.resp_header .. k.."="..v.." "
|
|
end
|
|
';
|
|
|
|
# log body
|
|
set $resp_body "";
|
|
body_filter_by_lua '
|
|
local resp_body = string.sub(ngx.arg[1], 1, 4000)
|
|
ngx.ctx.buffered = (ngx.ctx.buffered or "") .. resp_body
|
|
if ngx.arg[2] then
|
|
ngx.var.resp_body = ngx.ctx.buffered
|
|
end
|
|
';
|
|
'';
|
|
proxyPass = "https://${passthru.kanidm-bind-address}";
|
|
};
|
|
};
|
|
};
|
|
|
|
# TODO move to mailserver module everything below
|
|
mailserver.debug = cfg.debug; # FIXME
|
|
mailserver.mailDirectory = "/var/vmail";
|
|
|
|
mailserver.loginAccounts = lib.mkForce { };
|
|
mailserver.extraVirtualAliases = lib.mkForce { };
|
|
# LDAP is needed for Postfix to query Kanidm about email address ownership.
|
|
# LDAP is needed for Dovecot also.
|
|
mailserver.ldap = {
|
|
enable = false;
|
|
# bind.dn = "uid=mail,ou=persons," + ldap_base_dn;
|
|
bind.dn = "dn=token";
|
|
# TODO change in this file should trigger system restart dovecot
|
|
bind.passwordFile = "/run/keys/dovecot/kanidm-service-account-token"; # FIXME
|
|
|
|
# searchBase = "ou=persons," + ldap_base_dn;
|
|
searchBase = ldap_base_dn; # TODO refine this
|
|
|
|
# NOTE: 127.0.0.1 instead of localhost does not work for unknown reason
|
|
uris = [ "ldaps://localhost:${toString kanidm_ldap_port}" ];
|
|
};
|
|
|
|
environment.systemPackages = lib.lists.optionals cfg.debug [
|
|
pkgs.shelldap
|
|
pkgs.openldap
|
|
];
|
|
|
|
passthru.selfprivacy.auth = {
|
|
kanidm-bind-address = "127.0.0.1:3013";
|
|
oauth2-introspection-url = client_id: client_secret:
|
|
"https://${client_id}:${client_secret}@${auth-fqdn}/oauth2/token/introspect";
|
|
oauth2-discovery-url = client_id: "https://${auth-fqdn}/oauth2/openid/${client_id}/.well-known/openid-configuration";
|
|
};
|
|
};
|
|
}
|