mirror of
https://github.com/Swarsel/.dotfiles.git
synced 2025-12-06 17:17:22 +01:00
feat: add initial oauth2-proxy and freshrss oidc
This commit is contained in:
parent
9d10005e35
commit
7e11641fe7
5 changed files with 1166 additions and 556 deletions
|
|
@ -7518,7 +7518,7 @@ Here we just define some aliases for rebuilding the system, and we allow some in
|
||||||
}
|
}
|
||||||
#+end_src
|
#+end_src
|
||||||
|
|
||||||
**** paperless
|
**** paperless (tika, gotenberg)
|
||||||
:PROPERTIES:
|
:PROPERTIES:
|
||||||
:CUSTOM_ID: h:89638fb5-0593-4420-9567-f85f0223e341
|
:CUSTOM_ID: h:89638fb5-0593-4420-9567-f85f0223e341
|
||||||
:END:
|
:END:
|
||||||
|
|
@ -8254,6 +8254,8 @@ FreshRSS is a more 'classical' RSS aggregator that I can just host as a distinct
|
||||||
|
|
||||||
It serves both a Greader API at https://signpost.swarsel.win/api/greader.php, as well as a Fever API at https://signpost.swarsel.win/api/fever.php.
|
It serves both a Greader API at https://signpost.swarsel.win/api/greader.php, as well as a Fever API at https://signpost.swarsel.win/api/fever.php.
|
||||||
|
|
||||||
|
I am using this with CapyReader on my phone, set it up as a FreshRSS account with Server URL =https://signpost.swarsel.win/api/greader.php
|
||||||
|
|
||||||
#+begin_src nix :tangle modules/nixos/server/freshrss.nix
|
#+begin_src nix :tangle modules/nixos/server/freshrss.nix
|
||||||
{ lib, config, ... }:
|
{ lib, config, ... }:
|
||||||
{
|
{
|
||||||
|
|
@ -8268,24 +8270,91 @@ It serves both a Greader API at https://signpost.swarsel.win/api/greader.php, as
|
||||||
|
|
||||||
users.groups.freshrss = { };
|
users.groups.freshrss = { };
|
||||||
|
|
||||||
sops.secrets.fresh = { owner = "freshrss"; };
|
sops = {
|
||||||
|
secrets = {
|
||||||
|
fresh = { owner = "freshrss"; };
|
||||||
|
"kanidm-freshrss-client" = { owner = "freshrss"; group = "freshrss"; mode = "0440"; };
|
||||||
|
"oidc-crypto-key" = { owner = "freshrss"; group = "freshrss"; mode = "0440"; };
|
||||||
|
};
|
||||||
|
|
||||||
|
# templates = {
|
||||||
|
# "freshrss-env" = {
|
||||||
|
# content = ''
|
||||||
|
# DATA_PATH=${config.services.freshrss.dataDir}
|
||||||
|
# OIDC_ENABLED=1
|
||||||
|
# OIDC_PROVIDER_METADATA_URL=https://sso.swarsel.win/.well-known/openid-configuration
|
||||||
|
# OIDC_CLIENT_ID=freshrss
|
||||||
|
# OIDC_CLIENT_SECRET=${config.sops.placeholder.kanidm-freshrss-client}
|
||||||
|
# OIDC_CLIENT_CRYPTO_KEY=${config.sops.placeholder.oidc-crypto-key}
|
||||||
|
# OIDC_REMOTE_USER_CLAIM=preferred_username
|
||||||
|
# OIDC_SCOPES=openid groups email profile
|
||||||
|
# OIDC_X_FORWARDED_HEADERS=X-Forwarded-Host X-Forwarded-Port X-Forwarded-Proto
|
||||||
|
# '';
|
||||||
|
# owner = "freshrss";
|
||||||
|
# group = "freshrss";
|
||||||
|
# mode = "0440";
|
||||||
|
# };
|
||||||
|
# };
|
||||||
|
};
|
||||||
|
|
||||||
services.freshrss = {
|
services.freshrss = {
|
||||||
enable = true;
|
enable = true;
|
||||||
virtualHost = "signpost.swarsel.win";
|
virtualHost = "signpost.swarsel.win";
|
||||||
baseUrl = "https://signpost.swarsel.win";
|
baseUrl = "https://signpost.swarsel.win";
|
||||||
# authType = "none";
|
authType = "none";
|
||||||
dataDir = "/Vault/data/tt-rss";
|
dataDir = "/Vault/data/tt-rss";
|
||||||
defaultUser = "Swarsel";
|
defaultUser = "Swarsel";
|
||||||
passwordFile = config.sops.secrets.fresh.path;
|
passwordFile = config.sops.secrets.fresh.path;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# systemd.services.freshrss-config.serviceConfig.EnvironmentFile = [
|
||||||
|
# config.sops.templates.freshrss-env.path
|
||||||
|
# ];
|
||||||
|
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
virtualHosts = {
|
virtualHosts = {
|
||||||
"signpost.swarsel.win" = {
|
"signpost.swarsel.win" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
acmeRoot = null;
|
acmeRoot = null;
|
||||||
|
locations = {
|
||||||
|
"/" = {
|
||||||
|
extraConfig = ''
|
||||||
|
auth_request /oauth2/auth;
|
||||||
|
error_page 401 = /oauth2/sign_in;
|
||||||
|
|
||||||
|
# pass information via X-User and X-Email headers to backend,
|
||||||
|
# requires running with --set-xauthrequest flag (done by NixOS)
|
||||||
|
auth_request_set $user $upstream_http_x_auth_request_preferred_username;
|
||||||
|
# Set the email to our own domain in case user change their mail
|
||||||
|
auth_request_set $email "''${upstream_http_x_auth_request_preferred_username}@swarsel.win";
|
||||||
|
proxy_set_header X-User $user;
|
||||||
|
proxy_set_header X-Email $email;
|
||||||
|
|
||||||
|
# if you enabled --cookie-refresh, this is needed for it to work with auth_request
|
||||||
|
auth_request_set $auth_cookie $upstream_http_set_cookie;
|
||||||
|
add_header Set-Cookie $auth_cookie;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
"/oauth2/" = {
|
||||||
|
proxyPass = "http://oauth2-proxy";
|
||||||
|
extraConfig = ''
|
||||||
|
proxy_set_header X-Scheme $scheme;
|
||||||
|
proxy_set_header X-Auth-Request-Redirect $scheme://$host$request_uri;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
"= /oauth2/auth" = {
|
||||||
|
proxyPass = "http://oauth2-proxy/oauth2/auth";
|
||||||
|
extraConfig = ''
|
||||||
|
internal;
|
||||||
|
|
||||||
|
proxy_set_header X-Scheme $scheme;
|
||||||
|
# nginx auth_request includes headers but not body
|
||||||
|
proxy_set_header Content-Length "";
|
||||||
|
proxy_pass_request_body off;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
@ -8495,7 +8564,7 @@ It serves both a Greader API at https://signpost.swarsel.win/api/greader.php, as
|
||||||
}
|
}
|
||||||
#+end_src
|
#+end_src
|
||||||
|
|
||||||
**** kanidm
|
**** IDM (kanidm + oauth2-proxy)
|
||||||
|
|
||||||
The forgejo configuration is a little broken and will show a 500 error when signing in through kanidm. However, when pressing back and refreshing the page, I am logged in. Currently I cannot be bothered to fix this.
|
The forgejo configuration is a little broken and will show a 500 error when signing in through kanidm. However, when pressing back and refreshing the page, I am logged in. Currently I cannot be bothered to fix this.
|
||||||
|
|
||||||
|
|
@ -8509,7 +8578,9 @@ To get other URLs (token, etc.), use https://<kanidmDomain>/oauth2/openid/<clien
|
||||||
let
|
let
|
||||||
certsSopsFile = self + /secrets/certs/secrets.yaml;
|
certsSopsFile = self + /secrets/certs/secrets.yaml;
|
||||||
kanidmDomain = "sso.swarsel.win";
|
kanidmDomain = "sso.swarsel.win";
|
||||||
|
oauth2ProxyDomain = "soauth.swarsel.win";
|
||||||
kanidmPort = 8300;
|
kanidmPort = 8300;
|
||||||
|
oauth2ProxyPort = 3004;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options.swarselsystems.modules.server.kanidm = lib.mkEnableOption "enable kanidm on server";
|
options.swarselsystems.modules.server.kanidm = lib.mkEnableOption "enable kanidm on server";
|
||||||
|
|
@ -8522,164 +8593,280 @@ To get other URLs (token, etc.), use https://<kanidmDomain>/oauth2/openid/<clien
|
||||||
|
|
||||||
users.groups.kanidm = { };
|
users.groups.kanidm = { };
|
||||||
|
|
||||||
sops.secrets = {
|
sops = {
|
||||||
"kanidm-self-signed-crt" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
secrets = {
|
||||||
"kanidm-self-signed-key" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"oauth2-cookie-secret" = { owner = "oauth2-proxy"; group = "oauth2-proxy"; mode = "0440"; };
|
||||||
"kanidm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"kanidm-self-signed-crt" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
"kanidm-idm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"kanidm-self-signed-key" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
"kanidm-immich" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"kanidm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
"kanidm-paperless" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"kanidm-idm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
"kanidm-forgejo" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"kanidm-immich" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
"kanidm-grafana" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"kanidm-paperless" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
"kanidm-nextcloud" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"kanidm-forgejo" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
|
"kanidm-grafana" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
|
"kanidm-nextcloud" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
|
"kanidm-freshrss" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
|
"kanidm-oauth2-proxy" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
|
"kanidm-oauth2-proxy-client" = { owner = "oauth2-proxy"; group = "oauth2-proxy"; mode = "0440"; };
|
||||||
|
};
|
||||||
|
|
||||||
|
templates = {
|
||||||
|
"kanidm-oauth2-proxy-client-env" = {
|
||||||
|
content = ''
|
||||||
|
OAUTH2_PROXY_CLIENT_SECRET="${config.sops.placeholder.kanidm-oauth2-proxy-client}"
|
||||||
|
OAUTH2_PROXY_COOKIE_SECRET=${config.sops.placeholder.oauth2-cookie-secret}
|
||||||
|
'';
|
||||||
|
owner = "oauth2-proxy";
|
||||||
|
group = "oauth2-proxy";
|
||||||
|
mode = "0440";
|
||||||
|
};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.kanidm = {
|
services = {
|
||||||
package = pkgs.kanidmWithSecretProvisioning;
|
kanidm = {
|
||||||
enableServer = true;
|
package = pkgs.kanidmWithSecretProvisioning;
|
||||||
serverSettings = {
|
enableServer = true;
|
||||||
domain = kanidmDomain;
|
serverSettings = {
|
||||||
origin = "https://${kanidmDomain}";
|
domain = kanidmDomain;
|
||||||
tls_chain = config.sops.secrets.kanidm-self-signed-crt.path;
|
origin = "https://${kanidmDomain}";
|
||||||
tls_key = config.sops.secrets.kanidm-self-signed-key.path;
|
tls_chain = config.sops.secrets.kanidm-self-signed-crt.path;
|
||||||
bindaddress = "0.0.0.0:${toString kanidmPort}";
|
tls_key = config.sops.secrets.kanidm-self-signed-key.path;
|
||||||
trust_x_forward_for = true;
|
bindaddress = "0.0.0.0:${toString kanidmPort}";
|
||||||
|
trust_x_forward_for = true;
|
||||||
|
};
|
||||||
|
enableClient = true;
|
||||||
|
clientSettings = {
|
||||||
|
uri = config.services.kanidm.serverSettings.origin;
|
||||||
|
verify_ca = true;
|
||||||
|
verify_hostnames = true;
|
||||||
|
};
|
||||||
|
provision = {
|
||||||
|
enable = true;
|
||||||
|
adminPasswordFile = config.sops.secrets.kanidm-admin-pw.path;
|
||||||
|
idmAdminPasswordFile = config.sops.secrets.kanidm-idm-admin-pw.path;
|
||||||
|
groups = {
|
||||||
|
"immich.access" = { };
|
||||||
|
"paperless.access" = { };
|
||||||
|
"forgejo.access" = { };
|
||||||
|
"forgejo.admins" = { };
|
||||||
|
"grafana.access" = { };
|
||||||
|
"grafana.editors" = { };
|
||||||
|
"grafana.admins" = { };
|
||||||
|
"grafana.server-admins" = { };
|
||||||
|
"nextcloud.access" = { };
|
||||||
|
"nextcloud.admins" = { };
|
||||||
|
"navidrome.access" = { };
|
||||||
|
"freshrss.access" = { };
|
||||||
|
};
|
||||||
|
persons = {
|
||||||
|
swarsel = {
|
||||||
|
present = true;
|
||||||
|
mailAddresses = [ "leon@swarsel.win" ];
|
||||||
|
legalName = "Leon Schwarzäugl";
|
||||||
|
groups = [
|
||||||
|
"immich.access"
|
||||||
|
"paperless.access"
|
||||||
|
"grafana.access"
|
||||||
|
"forgejo.access"
|
||||||
|
"nextcloud.access"
|
||||||
|
"freshrss.access"
|
||||||
|
"navidrome.access"
|
||||||
|
];
|
||||||
|
displayName = "Swarsel";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
systems = {
|
||||||
|
oauth2 = {
|
||||||
|
immich = {
|
||||||
|
displayName = "Immich";
|
||||||
|
originUrl = [
|
||||||
|
"https://shots.swarsel.win/auth/login"
|
||||||
|
"https://shots.swarsel.win/user-settings"
|
||||||
|
"app.immich:///oauth-callback"
|
||||||
|
"https://shots.swarsel.win/api/oauth/mobile-redirect"
|
||||||
|
];
|
||||||
|
originLanding = "https://shots.swarsel.win/";
|
||||||
|
basicSecretFile = config.sops.secrets.kanidm-immich.path;
|
||||||
|
preferShortUsername = true;
|
||||||
|
enableLegacyCrypto = true; # can use RS256 / HS256, not ES256
|
||||||
|
scopeMaps."immich.access" = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
paperless = {
|
||||||
|
displayName = "Paperless";
|
||||||
|
originUrl = "https://scan.swarsel.win/accounts/oidc/kanidm/login/callback/";
|
||||||
|
originLanding = "https://scan.swarsel.win/";
|
||||||
|
basicSecretFile = config.sops.secrets.kanidm-paperless.path;
|
||||||
|
preferShortUsername = true;
|
||||||
|
scopeMaps."paperless.access" = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
forgejo = {
|
||||||
|
displayName = "Forgejo";
|
||||||
|
originUrl = "https://swagit.swarsel.win/user/oauth2/kanidm/callback";
|
||||||
|
originLanding = "https://swagit.swarsel.win/";
|
||||||
|
basicSecretFile = config.sops.secrets.kanidm-forgejo.path;
|
||||||
|
scopeMaps."forgejo.access" = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
# XXX: PKCE is currently not supported by gitea/forgejo,
|
||||||
|
# see https://github.com/go-gitea/gitea/issues/21376.
|
||||||
|
allowInsecureClientDisablePkce = true;
|
||||||
|
preferShortUsername = true;
|
||||||
|
claimMaps.groups = {
|
||||||
|
joinType = "array";
|
||||||
|
valuesByGroup."forgejo.admins" = [ "admin" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
grafana = {
|
||||||
|
displayName = "Grafana";
|
||||||
|
originUrl = "https://status.swarsel.win/login/generic_oauth";
|
||||||
|
originLanding = "https://status.swarsel.win/";
|
||||||
|
basicSecretFile = config.sops.secrets.kanidm-grafana.path;
|
||||||
|
preferShortUsername = true;
|
||||||
|
scopeMaps."grafana.access" = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
claimMaps.groups = {
|
||||||
|
joinType = "array";
|
||||||
|
valuesByGroup = {
|
||||||
|
"grafana.editors" = [ "editor" ];
|
||||||
|
"grafana.admins" = [ "admin" ];
|
||||||
|
"grafana.server-admins" = [ "server_admin" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
nextcloud = {
|
||||||
|
displayName = "Nextcloud";
|
||||||
|
originUrl = " https://stash.swarsel.win/apps/sociallogin/custom_oidc/kanidm";
|
||||||
|
originLanding = "https://stash.swarsel.win/";
|
||||||
|
basicSecretFile = config.sops.secrets.kanidm-nextcloud.path;
|
||||||
|
allowInsecureClientDisablePkce = true;
|
||||||
|
scopeMaps."nextcloud.access" = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
preferShortUsername = true;
|
||||||
|
claimMaps.groups = {
|
||||||
|
joinType = "array";
|
||||||
|
valuesByGroup = {
|
||||||
|
"nextcloud.admins" = [ "admin" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
# freshrss = {
|
||||||
|
# displayName = "FreshRSS";
|
||||||
|
# originUrl = "https://signpost.swarsel.win/apps/sociallogin/custom_oidc/kanidm";
|
||||||
|
# originLanding = "https://signpost.swarsel.win/";
|
||||||
|
# basicSecretFile = config.sops.secrets.kanidm-freshrss.path;
|
||||||
|
# allowInsecureClientDisablePkce = true;
|
||||||
|
# scopeMaps."freshrss.access" = [
|
||||||
|
# "openid"
|
||||||
|
# "email"
|
||||||
|
# "profile"
|
||||||
|
# ];
|
||||||
|
# preferShortUsername = true;
|
||||||
|
# };
|
||||||
|
oauth2-proxy = {
|
||||||
|
displayName = "Oauth2-Proxy";
|
||||||
|
originUrl = "https://${oauth2ProxyDomain}/oauth2/callback";
|
||||||
|
originLanding = "https://${oauth2ProxyDomain}/";
|
||||||
|
basicSecretFile = config.sops.secrets.kanidm-oauth2-proxy.path;
|
||||||
|
scopeMaps."freshrss.access" = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
scopeMaps."navidrome.access" = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
preferShortUsername = true;
|
||||||
|
claimMaps.groups = {
|
||||||
|
joinType = "array";
|
||||||
|
valuesByGroup."freshrss.access" = [ "ttrss_access" ];
|
||||||
|
valuesByGroup."navidrome.access" = [ "navidrome_access" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
enableClient = true;
|
oauth2-proxy = {
|
||||||
clientSettings = {
|
|
||||||
uri = config.services.kanidm.serverSettings.origin;
|
|
||||||
verify_ca = true;
|
|
||||||
verify_hostnames = true;
|
|
||||||
};
|
|
||||||
provision = {
|
|
||||||
enable = true;
|
enable = true;
|
||||||
adminPasswordFile = config.sops.secrets.kanidm-admin-pw.path;
|
cookie = {
|
||||||
idmAdminPasswordFile = config.sops.secrets.kanidm-idm-admin-pw.path;
|
domain = ".swarsel.win";
|
||||||
groups = {
|
secure = true;
|
||||||
"immich.access" = { };
|
expire = "900m";
|
||||||
"paperless.access" = { };
|
secret = null; # set by service EnvironmentFile
|
||||||
"forgejo.access" = { };
|
|
||||||
"forgejo.admins" = { };
|
|
||||||
"grafana.access" = { };
|
|
||||||
"grafana.editors" = { };
|
|
||||||
"grafana.admins" = { };
|
|
||||||
"grafana.server-admins" = { };
|
|
||||||
"nextcloud.access" = { };
|
|
||||||
"nextcloud.admins" = { };
|
|
||||||
};
|
};
|
||||||
persons = {
|
clientSecret = null; # set by service EnvironmentFile
|
||||||
swarsel = {
|
reverseProxy = true;
|
||||||
present = true;
|
httpAddress = "0.0.0.0:${builtins.toString oauth2ProxyPort}";
|
||||||
mailAddresses = [ "leon@swarsel.win" ];
|
redirectURL = "https://${oauth2ProxyDomain}/oauth2/callback";
|
||||||
legalName = "Leon Schwarzäugl";
|
setXauthrequest = true;
|
||||||
groups = [
|
extraConfig = {
|
||||||
"immich.access"
|
code-challenge-method = "S256";
|
||||||
"paperless.access"
|
whitelist-domain = ".swarsel.win";
|
||||||
"grafana.access"
|
set-authorization-header = true;
|
||||||
"forgejo.access"
|
pass-access-token = true;
|
||||||
"nextcloud.access"
|
skip-jwt-bearer-tokens = true;
|
||||||
];
|
upstream = "static://202";
|
||||||
displayName = "Swarsel";
|
oidc-issuer-url = "https://${kanidmDomain}/oauth2/openid/oauth2-proxy";
|
||||||
};
|
provider-display-name = "Kanidm";
|
||||||
};
|
|
||||||
systems = {
|
|
||||||
oauth2 = {
|
|
||||||
immich = {
|
|
||||||
displayName = "Immich";
|
|
||||||
originUrl = [
|
|
||||||
"https://shots.swarsel.win/auth/login"
|
|
||||||
"https://shots.swarsel.win/user-settings"
|
|
||||||
"app.immich:///oauth-callback"
|
|
||||||
"https://shots.swarsel.win/api/oauth/mobile-redirect"
|
|
||||||
];
|
|
||||||
originLanding = "https://shots.swarsel.win/";
|
|
||||||
basicSecretFile = config.sops.secrets.kanidm-immich.path;
|
|
||||||
preferShortUsername = true;
|
|
||||||
enableLegacyCrypto = true; # can use RS256 / HS256, not ES256
|
|
||||||
scopeMaps."immich.access" = [
|
|
||||||
"openid"
|
|
||||||
"email"
|
|
||||||
"profile"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
paperless = {
|
|
||||||
displayName = "Paperless";
|
|
||||||
originUrl = "https://scan.swarsel.win/accounts/oidc/kanidm/login/callback/";
|
|
||||||
originLanding = "https://scan.swarsel.win/";
|
|
||||||
basicSecretFile = config.sops.secrets.kanidm-paperless.path;
|
|
||||||
preferShortUsername = true;
|
|
||||||
scopeMaps."paperless.access" = [
|
|
||||||
"openid"
|
|
||||||
"email"
|
|
||||||
"profile"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
forgejo = {
|
|
||||||
displayName = "Forgejo";
|
|
||||||
originUrl = "https://swagit.swarsel.win/user/oauth2/kanidm/callback";
|
|
||||||
originLanding = "https://swagit.swarsel.win/";
|
|
||||||
basicSecretFile = config.sops.secrets.kanidm-forgejo.path;
|
|
||||||
scopeMaps."forgejo.access" = [
|
|
||||||
"openid"
|
|
||||||
"email"
|
|
||||||
"profile"
|
|
||||||
];
|
|
||||||
# XXX: PKCE is currently not supported by gitea/forgejo,
|
|
||||||
# see https://github.com/go-gitea/gitea/issues/21376.
|
|
||||||
allowInsecureClientDisablePkce = true;
|
|
||||||
preferShortUsername = true;
|
|
||||||
claimMaps.groups = {
|
|
||||||
joinType = "array";
|
|
||||||
valuesByGroup."forgejo.admins" = [ "admin" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
grafana = {
|
|
||||||
displayName = "Grafana";
|
|
||||||
originUrl = "https://status.swarsel.win/login/generic_oauth";
|
|
||||||
originLanding = "https://status.swarsel.win/";
|
|
||||||
basicSecretFile = config.sops.secrets.kanidm-grafana.path;
|
|
||||||
preferShortUsername = true;
|
|
||||||
scopeMaps."grafana.access" = [
|
|
||||||
"openid"
|
|
||||||
"email"
|
|
||||||
"profile"
|
|
||||||
];
|
|
||||||
claimMaps.groups = {
|
|
||||||
joinType = "array";
|
|
||||||
valuesByGroup = {
|
|
||||||
"grafana.editors" = [ "editor" ];
|
|
||||||
"grafana.admins" = [ "admin" ];
|
|
||||||
"grafana.server-admins" = [ "server_admin" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
nextcloud = {
|
|
||||||
displayName = "Nextcloud";
|
|
||||||
originUrl = " https://stash.swarsel.win/apps/sociallogin/custom_oidc/kanidm";
|
|
||||||
originLanding = "https://stash.swarsel.win/";
|
|
||||||
basicSecretFile = config.sops.secrets.kanidm-nextcloud.path;
|
|
||||||
allowInsecureClientDisablePkce = true;
|
|
||||||
scopeMaps."nextcloud.access" = [
|
|
||||||
"openid"
|
|
||||||
"email"
|
|
||||||
"profile"
|
|
||||||
];
|
|
||||||
preferShortUsername = true;
|
|
||||||
claimMaps.groups = {
|
|
||||||
joinType = "array";
|
|
||||||
valuesByGroup = {
|
|
||||||
"nextcloud.admins" = [ "admin" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
provider = "oidc";
|
||||||
|
scope = "openid email";
|
||||||
|
loginURL = "https://${kanidmDomain}/ui/oauth2";
|
||||||
|
redeemURL = "https://${kanidmDomain}/oauth2/token";
|
||||||
|
validateURL = "https://${kanidmDomain}/oauth2/openid/oauth2-proxy/userinfo";
|
||||||
|
clientID = "oauth2-proxy";
|
||||||
|
email.domains = [ "*" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
systemd.services.kanidm.serviceConfig.RestartSec = "30";
|
systemd.services = {
|
||||||
|
kanidm.serviceConfig.RestartSec = "30";
|
||||||
|
oauth2-proxy = {
|
||||||
|
after = [ "kanidm.service" ];
|
||||||
|
serviceConfig = {
|
||||||
|
RuntimeDirectory = "oauth2-proxy";
|
||||||
|
RuntimeDirectoryMode = "0750";
|
||||||
|
UMask = "007"; # TODO remove once https://github.com/oauth2-proxy/oauth2-proxy/issues/2141 is fixed
|
||||||
|
RestartSec = "60"; # Retry every minute
|
||||||
|
EnvironmentFile = [
|
||||||
|
config.sops.templates.kanidm-oauth2-proxy-client-env.path
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
|
upstreams = {
|
||||||
|
kanidm = {
|
||||||
|
servers = {
|
||||||
|
"192.168.1.2:${builtins.toString kanidmPort}" = { };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
oauth2-proxy = {
|
||||||
|
servers = {
|
||||||
|
"192.168.1.2:${builtins.toString oauth2ProxyPort}" = { };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
virtualHosts = {
|
virtualHosts = {
|
||||||
"${kanidmDomain}" = {
|
"${kanidmDomain}" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
|
|
@ -8687,13 +8874,27 @@ To get other URLs (token, etc.), use https://<kanidmDomain>/oauth2/openid/<clien
|
||||||
acmeRoot = null;
|
acmeRoot = null;
|
||||||
locations = {
|
locations = {
|
||||||
"/" = {
|
"/" = {
|
||||||
proxyPass = "https://localhost:${toString kanidmPort}";
|
proxyPass = "https://kanidm";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
proxy_ssl_verify off;
|
proxy_ssl_verify off;
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
"${oauth2ProxyDomain}" = {
|
||||||
|
enableACME = true;
|
||||||
|
forceSSL = true;
|
||||||
|
acmeRoot = null;
|
||||||
|
locations = {
|
||||||
|
"/" = {
|
||||||
|
proxyPass = "http://oauth2-proxy";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
extraConfig = ''
|
||||||
|
proxy_set_header X-Scheme $scheme;
|
||||||
|
proxy_set_header X-Auth-Request-Redirect $scheme://$host$request_uri;
|
||||||
|
'';
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
707
index.html
707
index.html
File diff suppressed because it is too large
Load diff
|
|
@ -11,24 +11,91 @@
|
||||||
|
|
||||||
users.groups.freshrss = { };
|
users.groups.freshrss = { };
|
||||||
|
|
||||||
sops.secrets.fresh = { owner = "freshrss"; };
|
sops = {
|
||||||
|
secrets = {
|
||||||
|
fresh = { owner = "freshrss"; };
|
||||||
|
"kanidm-freshrss-client" = { owner = "freshrss"; group = "freshrss"; mode = "0440"; };
|
||||||
|
"oidc-crypto-key" = { owner = "freshrss"; group = "freshrss"; mode = "0440"; };
|
||||||
|
};
|
||||||
|
|
||||||
|
# templates = {
|
||||||
|
# "freshrss-env" = {
|
||||||
|
# content = ''
|
||||||
|
# DATA_PATH=${config.services.freshrss.dataDir}
|
||||||
|
# OIDC_ENABLED=1
|
||||||
|
# OIDC_PROVIDER_METADATA_URL=https://sso.swarsel.win/.well-known/openid-configuration
|
||||||
|
# OIDC_CLIENT_ID=freshrss
|
||||||
|
# OIDC_CLIENT_SECRET=${config.sops.placeholder.kanidm-freshrss-client}
|
||||||
|
# OIDC_CLIENT_CRYPTO_KEY=${config.sops.placeholder.oidc-crypto-key}
|
||||||
|
# OIDC_REMOTE_USER_CLAIM=preferred_username
|
||||||
|
# OIDC_SCOPES=openid groups email profile
|
||||||
|
# OIDC_X_FORWARDED_HEADERS=X-Forwarded-Host X-Forwarded-Port X-Forwarded-Proto
|
||||||
|
# '';
|
||||||
|
# owner = "freshrss";
|
||||||
|
# group = "freshrss";
|
||||||
|
# mode = "0440";
|
||||||
|
# };
|
||||||
|
# };
|
||||||
|
};
|
||||||
|
|
||||||
services.freshrss = {
|
services.freshrss = {
|
||||||
enable = true;
|
enable = true;
|
||||||
virtualHost = "signpost.swarsel.win";
|
virtualHost = "signpost.swarsel.win";
|
||||||
baseUrl = "https://signpost.swarsel.win";
|
baseUrl = "https://signpost.swarsel.win";
|
||||||
# authType = "none";
|
authType = "none";
|
||||||
dataDir = "/Vault/data/tt-rss";
|
dataDir = "/Vault/data/tt-rss";
|
||||||
defaultUser = "Swarsel";
|
defaultUser = "Swarsel";
|
||||||
passwordFile = config.sops.secrets.fresh.path;
|
passwordFile = config.sops.secrets.fresh.path;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# systemd.services.freshrss-config.serviceConfig.EnvironmentFile = [
|
||||||
|
# config.sops.templates.freshrss-env.path
|
||||||
|
# ];
|
||||||
|
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
virtualHosts = {
|
virtualHosts = {
|
||||||
"signpost.swarsel.win" = {
|
"signpost.swarsel.win" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
acmeRoot = null;
|
acmeRoot = null;
|
||||||
|
locations = {
|
||||||
|
"/" = {
|
||||||
|
extraConfig = ''
|
||||||
|
auth_request /oauth2/auth;
|
||||||
|
error_page 401 = /oauth2/sign_in;
|
||||||
|
|
||||||
|
# pass information via X-User and X-Email headers to backend,
|
||||||
|
# requires running with --set-xauthrequest flag (done by NixOS)
|
||||||
|
auth_request_set $user $upstream_http_x_auth_request_preferred_username;
|
||||||
|
# Set the email to our own domain in case user change their mail
|
||||||
|
auth_request_set $email "''${upstream_http_x_auth_request_preferred_username}@swarsel.win";
|
||||||
|
proxy_set_header X-User $user;
|
||||||
|
proxy_set_header X-Email $email;
|
||||||
|
|
||||||
|
# if you enabled --cookie-refresh, this is needed for it to work with auth_request
|
||||||
|
auth_request_set $auth_cookie $upstream_http_set_cookie;
|
||||||
|
add_header Set-Cookie $auth_cookie;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
"/oauth2/" = {
|
||||||
|
proxyPass = "http://oauth2-proxy";
|
||||||
|
extraConfig = ''
|
||||||
|
proxy_set_header X-Scheme $scheme;
|
||||||
|
proxy_set_header X-Auth-Request-Redirect $scheme://$host$request_uri;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
"= /oauth2/auth" = {
|
||||||
|
proxyPass = "http://oauth2-proxy/oauth2/auth";
|
||||||
|
extraConfig = ''
|
||||||
|
internal;
|
||||||
|
|
||||||
|
proxy_set_header X-Scheme $scheme;
|
||||||
|
# nginx auth_request includes headers but not body
|
||||||
|
proxy_set_header Content-Length "";
|
||||||
|
proxy_pass_request_body off;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -2,7 +2,9 @@
|
||||||
let
|
let
|
||||||
certsSopsFile = self + /secrets/certs/secrets.yaml;
|
certsSopsFile = self + /secrets/certs/secrets.yaml;
|
||||||
kanidmDomain = "sso.swarsel.win";
|
kanidmDomain = "sso.swarsel.win";
|
||||||
|
oauth2ProxyDomain = "soauth.swarsel.win";
|
||||||
kanidmPort = 8300;
|
kanidmPort = 8300;
|
||||||
|
oauth2ProxyPort = 3004;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options.swarselsystems.modules.server.kanidm = lib.mkEnableOption "enable kanidm on server";
|
options.swarselsystems.modules.server.kanidm = lib.mkEnableOption "enable kanidm on server";
|
||||||
|
|
@ -15,164 +17,280 @@ in
|
||||||
|
|
||||||
users.groups.kanidm = { };
|
users.groups.kanidm = { };
|
||||||
|
|
||||||
sops.secrets = {
|
sops = {
|
||||||
"kanidm-self-signed-crt" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
secrets = {
|
||||||
"kanidm-self-signed-key" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"oauth2-cookie-secret" = { owner = "oauth2-proxy"; group = "oauth2-proxy"; mode = "0440"; };
|
||||||
"kanidm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"kanidm-self-signed-crt" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
"kanidm-idm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"kanidm-self-signed-key" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
"kanidm-immich" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"kanidm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
"kanidm-paperless" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"kanidm-idm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
"kanidm-forgejo" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"kanidm-immich" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
"kanidm-grafana" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"kanidm-paperless" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
"kanidm-nextcloud" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
"kanidm-forgejo" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
|
"kanidm-grafana" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
|
"kanidm-nextcloud" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
|
"kanidm-freshrss" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
|
"kanidm-oauth2-proxy" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
|
||||||
|
"kanidm-oauth2-proxy-client" = { owner = "oauth2-proxy"; group = "oauth2-proxy"; mode = "0440"; };
|
||||||
|
};
|
||||||
|
|
||||||
|
templates = {
|
||||||
|
"kanidm-oauth2-proxy-client-env" = {
|
||||||
|
content = ''
|
||||||
|
OAUTH2_PROXY_CLIENT_SECRET="${config.sops.placeholder.kanidm-oauth2-proxy-client}"
|
||||||
|
OAUTH2_PROXY_COOKIE_SECRET=${config.sops.placeholder.oauth2-cookie-secret}
|
||||||
|
'';
|
||||||
|
owner = "oauth2-proxy";
|
||||||
|
group = "oauth2-proxy";
|
||||||
|
mode = "0440";
|
||||||
|
};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.kanidm = {
|
services = {
|
||||||
package = pkgs.kanidmWithSecretProvisioning;
|
kanidm = {
|
||||||
enableServer = true;
|
package = pkgs.kanidmWithSecretProvisioning;
|
||||||
serverSettings = {
|
enableServer = true;
|
||||||
domain = kanidmDomain;
|
serverSettings = {
|
||||||
origin = "https://${kanidmDomain}";
|
domain = kanidmDomain;
|
||||||
tls_chain = config.sops.secrets.kanidm-self-signed-crt.path;
|
origin = "https://${kanidmDomain}";
|
||||||
tls_key = config.sops.secrets.kanidm-self-signed-key.path;
|
tls_chain = config.sops.secrets.kanidm-self-signed-crt.path;
|
||||||
bindaddress = "0.0.0.0:${toString kanidmPort}";
|
tls_key = config.sops.secrets.kanidm-self-signed-key.path;
|
||||||
trust_x_forward_for = true;
|
bindaddress = "0.0.0.0:${toString kanidmPort}";
|
||||||
|
trust_x_forward_for = true;
|
||||||
|
};
|
||||||
|
enableClient = true;
|
||||||
|
clientSettings = {
|
||||||
|
uri = config.services.kanidm.serverSettings.origin;
|
||||||
|
verify_ca = true;
|
||||||
|
verify_hostnames = true;
|
||||||
|
};
|
||||||
|
provision = {
|
||||||
|
enable = true;
|
||||||
|
adminPasswordFile = config.sops.secrets.kanidm-admin-pw.path;
|
||||||
|
idmAdminPasswordFile = config.sops.secrets.kanidm-idm-admin-pw.path;
|
||||||
|
groups = {
|
||||||
|
"immich.access" = { };
|
||||||
|
"paperless.access" = { };
|
||||||
|
"forgejo.access" = { };
|
||||||
|
"forgejo.admins" = { };
|
||||||
|
"grafana.access" = { };
|
||||||
|
"grafana.editors" = { };
|
||||||
|
"grafana.admins" = { };
|
||||||
|
"grafana.server-admins" = { };
|
||||||
|
"nextcloud.access" = { };
|
||||||
|
"nextcloud.admins" = { };
|
||||||
|
"navidrome.access" = { };
|
||||||
|
"freshrss.access" = { };
|
||||||
|
};
|
||||||
|
persons = {
|
||||||
|
swarsel = {
|
||||||
|
present = true;
|
||||||
|
mailAddresses = [ "leon@swarsel.win" ];
|
||||||
|
legalName = "Leon Schwarzäugl";
|
||||||
|
groups = [
|
||||||
|
"immich.access"
|
||||||
|
"paperless.access"
|
||||||
|
"grafana.access"
|
||||||
|
"forgejo.access"
|
||||||
|
"nextcloud.access"
|
||||||
|
"freshrss.access"
|
||||||
|
"navidrome.access"
|
||||||
|
];
|
||||||
|
displayName = "Swarsel";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
systems = {
|
||||||
|
oauth2 = {
|
||||||
|
immich = {
|
||||||
|
displayName = "Immich";
|
||||||
|
originUrl = [
|
||||||
|
"https://shots.swarsel.win/auth/login"
|
||||||
|
"https://shots.swarsel.win/user-settings"
|
||||||
|
"app.immich:///oauth-callback"
|
||||||
|
"https://shots.swarsel.win/api/oauth/mobile-redirect"
|
||||||
|
];
|
||||||
|
originLanding = "https://shots.swarsel.win/";
|
||||||
|
basicSecretFile = config.sops.secrets.kanidm-immich.path;
|
||||||
|
preferShortUsername = true;
|
||||||
|
enableLegacyCrypto = true; # can use RS256 / HS256, not ES256
|
||||||
|
scopeMaps."immich.access" = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
paperless = {
|
||||||
|
displayName = "Paperless";
|
||||||
|
originUrl = "https://scan.swarsel.win/accounts/oidc/kanidm/login/callback/";
|
||||||
|
originLanding = "https://scan.swarsel.win/";
|
||||||
|
basicSecretFile = config.sops.secrets.kanidm-paperless.path;
|
||||||
|
preferShortUsername = true;
|
||||||
|
scopeMaps."paperless.access" = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
forgejo = {
|
||||||
|
displayName = "Forgejo";
|
||||||
|
originUrl = "https://swagit.swarsel.win/user/oauth2/kanidm/callback";
|
||||||
|
originLanding = "https://swagit.swarsel.win/";
|
||||||
|
basicSecretFile = config.sops.secrets.kanidm-forgejo.path;
|
||||||
|
scopeMaps."forgejo.access" = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
# XXX: PKCE is currently not supported by gitea/forgejo,
|
||||||
|
# see https://github.com/go-gitea/gitea/issues/21376.
|
||||||
|
allowInsecureClientDisablePkce = true;
|
||||||
|
preferShortUsername = true;
|
||||||
|
claimMaps.groups = {
|
||||||
|
joinType = "array";
|
||||||
|
valuesByGroup."forgejo.admins" = [ "admin" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
grafana = {
|
||||||
|
displayName = "Grafana";
|
||||||
|
originUrl = "https://status.swarsel.win/login/generic_oauth";
|
||||||
|
originLanding = "https://status.swarsel.win/";
|
||||||
|
basicSecretFile = config.sops.secrets.kanidm-grafana.path;
|
||||||
|
preferShortUsername = true;
|
||||||
|
scopeMaps."grafana.access" = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
claimMaps.groups = {
|
||||||
|
joinType = "array";
|
||||||
|
valuesByGroup = {
|
||||||
|
"grafana.editors" = [ "editor" ];
|
||||||
|
"grafana.admins" = [ "admin" ];
|
||||||
|
"grafana.server-admins" = [ "server_admin" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
nextcloud = {
|
||||||
|
displayName = "Nextcloud";
|
||||||
|
originUrl = " https://stash.swarsel.win/apps/sociallogin/custom_oidc/kanidm";
|
||||||
|
originLanding = "https://stash.swarsel.win/";
|
||||||
|
basicSecretFile = config.sops.secrets.kanidm-nextcloud.path;
|
||||||
|
allowInsecureClientDisablePkce = true;
|
||||||
|
scopeMaps."nextcloud.access" = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
preferShortUsername = true;
|
||||||
|
claimMaps.groups = {
|
||||||
|
joinType = "array";
|
||||||
|
valuesByGroup = {
|
||||||
|
"nextcloud.admins" = [ "admin" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
# freshrss = {
|
||||||
|
# displayName = "FreshRSS";
|
||||||
|
# originUrl = "https://signpost.swarsel.win/apps/sociallogin/custom_oidc/kanidm";
|
||||||
|
# originLanding = "https://signpost.swarsel.win/";
|
||||||
|
# basicSecretFile = config.sops.secrets.kanidm-freshrss.path;
|
||||||
|
# allowInsecureClientDisablePkce = true;
|
||||||
|
# scopeMaps."freshrss.access" = [
|
||||||
|
# "openid"
|
||||||
|
# "email"
|
||||||
|
# "profile"
|
||||||
|
# ];
|
||||||
|
# preferShortUsername = true;
|
||||||
|
# };
|
||||||
|
oauth2-proxy = {
|
||||||
|
displayName = "Oauth2-Proxy";
|
||||||
|
originUrl = "https://${oauth2ProxyDomain}/oauth2/callback";
|
||||||
|
originLanding = "https://${oauth2ProxyDomain}/";
|
||||||
|
basicSecretFile = config.sops.secrets.kanidm-oauth2-proxy.path;
|
||||||
|
scopeMaps."freshrss.access" = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
scopeMaps."navidrome.access" = [
|
||||||
|
"openid"
|
||||||
|
"email"
|
||||||
|
"profile"
|
||||||
|
];
|
||||||
|
preferShortUsername = true;
|
||||||
|
claimMaps.groups = {
|
||||||
|
joinType = "array";
|
||||||
|
valuesByGroup."freshrss.access" = [ "ttrss_access" ];
|
||||||
|
valuesByGroup."navidrome.access" = [ "navidrome_access" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
enableClient = true;
|
oauth2-proxy = {
|
||||||
clientSettings = {
|
|
||||||
uri = config.services.kanidm.serverSettings.origin;
|
|
||||||
verify_ca = true;
|
|
||||||
verify_hostnames = true;
|
|
||||||
};
|
|
||||||
provision = {
|
|
||||||
enable = true;
|
enable = true;
|
||||||
adminPasswordFile = config.sops.secrets.kanidm-admin-pw.path;
|
cookie = {
|
||||||
idmAdminPasswordFile = config.sops.secrets.kanidm-idm-admin-pw.path;
|
domain = ".swarsel.win";
|
||||||
groups = {
|
secure = true;
|
||||||
"immich.access" = { };
|
expire = "900m";
|
||||||
"paperless.access" = { };
|
secret = null; # set by service EnvironmentFile
|
||||||
"forgejo.access" = { };
|
|
||||||
"forgejo.admins" = { };
|
|
||||||
"grafana.access" = { };
|
|
||||||
"grafana.editors" = { };
|
|
||||||
"grafana.admins" = { };
|
|
||||||
"grafana.server-admins" = { };
|
|
||||||
"nextcloud.access" = { };
|
|
||||||
"nextcloud.admins" = { };
|
|
||||||
};
|
};
|
||||||
persons = {
|
clientSecret = null; # set by service EnvironmentFile
|
||||||
swarsel = {
|
reverseProxy = true;
|
||||||
present = true;
|
httpAddress = "0.0.0.0:${builtins.toString oauth2ProxyPort}";
|
||||||
mailAddresses = [ "leon@swarsel.win" ];
|
redirectURL = "https://${oauth2ProxyDomain}/oauth2/callback";
|
||||||
legalName = "Leon Schwarzäugl";
|
setXauthrequest = true;
|
||||||
groups = [
|
extraConfig = {
|
||||||
"immich.access"
|
code-challenge-method = "S256";
|
||||||
"paperless.access"
|
whitelist-domain = ".swarsel.win";
|
||||||
"grafana.access"
|
set-authorization-header = true;
|
||||||
"forgejo.access"
|
pass-access-token = true;
|
||||||
"nextcloud.access"
|
skip-jwt-bearer-tokens = true;
|
||||||
];
|
upstream = "static://202";
|
||||||
displayName = "Swarsel";
|
oidc-issuer-url = "https://${kanidmDomain}/oauth2/openid/oauth2-proxy";
|
||||||
};
|
provider-display-name = "Kanidm";
|
||||||
};
|
|
||||||
systems = {
|
|
||||||
oauth2 = {
|
|
||||||
immich = {
|
|
||||||
displayName = "Immich";
|
|
||||||
originUrl = [
|
|
||||||
"https://shots.swarsel.win/auth/login"
|
|
||||||
"https://shots.swarsel.win/user-settings"
|
|
||||||
"app.immich:///oauth-callback"
|
|
||||||
"https://shots.swarsel.win/api/oauth/mobile-redirect"
|
|
||||||
];
|
|
||||||
originLanding = "https://shots.swarsel.win/";
|
|
||||||
basicSecretFile = config.sops.secrets.kanidm-immich.path;
|
|
||||||
preferShortUsername = true;
|
|
||||||
enableLegacyCrypto = true; # can use RS256 / HS256, not ES256
|
|
||||||
scopeMaps."immich.access" = [
|
|
||||||
"openid"
|
|
||||||
"email"
|
|
||||||
"profile"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
paperless = {
|
|
||||||
displayName = "Paperless";
|
|
||||||
originUrl = "https://scan.swarsel.win/accounts/oidc/kanidm/login/callback/";
|
|
||||||
originLanding = "https://scan.swarsel.win/";
|
|
||||||
basicSecretFile = config.sops.secrets.kanidm-paperless.path;
|
|
||||||
preferShortUsername = true;
|
|
||||||
scopeMaps."paperless.access" = [
|
|
||||||
"openid"
|
|
||||||
"email"
|
|
||||||
"profile"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
forgejo = {
|
|
||||||
displayName = "Forgejo";
|
|
||||||
originUrl = "https://swagit.swarsel.win/user/oauth2/kanidm/callback";
|
|
||||||
originLanding = "https://swagit.swarsel.win/";
|
|
||||||
basicSecretFile = config.sops.secrets.kanidm-forgejo.path;
|
|
||||||
scopeMaps."forgejo.access" = [
|
|
||||||
"openid"
|
|
||||||
"email"
|
|
||||||
"profile"
|
|
||||||
];
|
|
||||||
# XXX: PKCE is currently not supported by gitea/forgejo,
|
|
||||||
# see https://github.com/go-gitea/gitea/issues/21376.
|
|
||||||
allowInsecureClientDisablePkce = true;
|
|
||||||
preferShortUsername = true;
|
|
||||||
claimMaps.groups = {
|
|
||||||
joinType = "array";
|
|
||||||
valuesByGroup."forgejo.admins" = [ "admin" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
grafana = {
|
|
||||||
displayName = "Grafana";
|
|
||||||
originUrl = "https://status.swarsel.win/login/generic_oauth";
|
|
||||||
originLanding = "https://status.swarsel.win/";
|
|
||||||
basicSecretFile = config.sops.secrets.kanidm-grafana.path;
|
|
||||||
preferShortUsername = true;
|
|
||||||
scopeMaps."grafana.access" = [
|
|
||||||
"openid"
|
|
||||||
"email"
|
|
||||||
"profile"
|
|
||||||
];
|
|
||||||
claimMaps.groups = {
|
|
||||||
joinType = "array";
|
|
||||||
valuesByGroup = {
|
|
||||||
"grafana.editors" = [ "editor" ];
|
|
||||||
"grafana.admins" = [ "admin" ];
|
|
||||||
"grafana.server-admins" = [ "server_admin" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
nextcloud = {
|
|
||||||
displayName = "Nextcloud";
|
|
||||||
originUrl = " https://stash.swarsel.win/apps/sociallogin/custom_oidc/kanidm";
|
|
||||||
originLanding = "https://stash.swarsel.win/";
|
|
||||||
basicSecretFile = config.sops.secrets.kanidm-nextcloud.path;
|
|
||||||
allowInsecureClientDisablePkce = true;
|
|
||||||
scopeMaps."nextcloud.access" = [
|
|
||||||
"openid"
|
|
||||||
"email"
|
|
||||||
"profile"
|
|
||||||
];
|
|
||||||
preferShortUsername = true;
|
|
||||||
claimMaps.groups = {
|
|
||||||
joinType = "array";
|
|
||||||
valuesByGroup = {
|
|
||||||
"nextcloud.admins" = [ "admin" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
provider = "oidc";
|
||||||
|
scope = "openid email";
|
||||||
|
loginURL = "https://${kanidmDomain}/ui/oauth2";
|
||||||
|
redeemURL = "https://${kanidmDomain}/oauth2/token";
|
||||||
|
validateURL = "https://${kanidmDomain}/oauth2/openid/oauth2-proxy/userinfo";
|
||||||
|
clientID = "oauth2-proxy";
|
||||||
|
email.domains = [ "*" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
systemd.services.kanidm.serviceConfig.RestartSec = "30";
|
systemd.services = {
|
||||||
|
kanidm.serviceConfig.RestartSec = "30";
|
||||||
|
oauth2-proxy = {
|
||||||
|
after = [ "kanidm.service" ];
|
||||||
|
serviceConfig = {
|
||||||
|
RuntimeDirectory = "oauth2-proxy";
|
||||||
|
RuntimeDirectoryMode = "0750";
|
||||||
|
UMask = "007"; # TODO remove once https://github.com/oauth2-proxy/oauth2-proxy/issues/2141 is fixed
|
||||||
|
RestartSec = "60"; # Retry every minute
|
||||||
|
EnvironmentFile = [
|
||||||
|
config.sops.templates.kanidm-oauth2-proxy-client-env.path
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
|
upstreams = {
|
||||||
|
kanidm = {
|
||||||
|
servers = {
|
||||||
|
"192.168.1.2:${builtins.toString kanidmPort}" = { };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
oauth2-proxy = {
|
||||||
|
servers = {
|
||||||
|
"192.168.1.2:${builtins.toString oauth2ProxyPort}" = { };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
virtualHosts = {
|
virtualHosts = {
|
||||||
"${kanidmDomain}" = {
|
"${kanidmDomain}" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
|
|
@ -180,13 +298,27 @@ in
|
||||||
acmeRoot = null;
|
acmeRoot = null;
|
||||||
locations = {
|
locations = {
|
||||||
"/" = {
|
"/" = {
|
||||||
proxyPass = "https://localhost:${toString kanidmPort}";
|
proxyPass = "https://kanidm";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
proxy_ssl_verify off;
|
proxy_ssl_verify off;
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
"${oauth2ProxyDomain}" = {
|
||||||
|
enableACME = true;
|
||||||
|
forceSSL = true;
|
||||||
|
acmeRoot = null;
|
||||||
|
locations = {
|
||||||
|
"/" = {
|
||||||
|
proxyPass = "http://oauth2-proxy";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
extraConfig = ''
|
||||||
|
proxy_set_header X-Scheme $scheme;
|
||||||
|
proxy_set_header X-Auth-Request-Redirect $scheme://$host$request_uri;
|
||||||
|
'';
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -42,6 +42,8 @@ kanidm-grafana-client: ENC[AES256_GCM,data:tV25k0XoFZ9wLF0UWvAabgigayowr3wo0g==,
|
||||||
prometheusadminpass: ENC[AES256_GCM,data:NYUbSnAl0f3FUtvCjvJHFr2wMRsVsbVIeg==,iv:TP4NMwJsft8aEixxJBJCX/0I6BJVBnltFYJDKuXq1hM=,tag:yMY+KZsRjbn8ItgKgjzqSA==,type:str]
|
prometheusadminpass: ENC[AES256_GCM,data:NYUbSnAl0f3FUtvCjvJHFr2wMRsVsbVIeg==,iv:TP4NMwJsft8aEixxJBJCX/0I6BJVBnltFYJDKuXq1hM=,tag:yMY+KZsRjbn8ItgKgjzqSA==,type:str]
|
||||||
#ENC[AES256_GCM,data:QnIF/xhWguX5tw==,iv:yTUBtPaZk6BXi+SC1P/OOtnc2x9UZ/jXirD5oaxhyQY=,tag:c33L5r5BaPZN6zkwduBCwQ==,type:comment]
|
#ENC[AES256_GCM,data:QnIF/xhWguX5tw==,iv:yTUBtPaZk6BXi+SC1P/OOtnc2x9UZ/jXirD5oaxhyQY=,tag:c33L5r5BaPZN6zkwduBCwQ==,type:comment]
|
||||||
fresh: ENC[AES256_GCM,data:aPF8D96BvgDXhcc=,iv:Ubq3/sUmBipRanLgkAXXeAfXAz51AuR+NojMifsy8S0=,tag:mHf0YYYxulLXAIByqmnOsA==,type:str]
|
fresh: ENC[AES256_GCM,data:aPF8D96BvgDXhcc=,iv:Ubq3/sUmBipRanLgkAXXeAfXAz51AuR+NojMifsy8S0=,tag:mHf0YYYxulLXAIByqmnOsA==,type:str]
|
||||||
|
kanidm-freshrss-client: ENC[AES256_GCM,data:jBplXWOX/mRTQf6cKmP3C5PZJoBAmb3mhg==,iv:5hcLNGuEQ0T9FiczznGKMul38Ftv8PmG3q0Vaao10oI=,tag:tpx+EDvA31HCnG1/XJOBWg==,type:str]
|
||||||
|
oidc-crypto-key: ENC[AES256_GCM,data:O48Va8j2L/GDdTZRQEtVsoy1jsZSCLx0IxFYnCBGhoGRwDW+t0LKPw==,iv:DLCeGhRqRp/JfFaY3vva86OzMwGlcXxiBbQ4Tayjyq4=,tag:We5W8cIntW3D/5vdC/t8IA==,type:str]
|
||||||
#ENC[AES256_GCM,data:+lbLElpVOYo=,iv:DaVuudlnW+vy2PZOs9eiwZhOyILnqEX9KUehFlX2gWE=,tag:lvM6r0JM0DZir4y7iVTeKg==,type:comment]
|
#ENC[AES256_GCM,data:+lbLElpVOYo=,iv:DaVuudlnW+vy2PZOs9eiwZhOyILnqEX9KUehFlX2gWE=,tag:lvM6r0JM0DZir4y7iVTeKg==,type:comment]
|
||||||
kanidm-forgejo-client: ENC[AES256_GCM,data:pitJ6re5xm2w1MSs5Ul7Tl1/H1KSR7Ps7w==,iv:4k8/cxpLqWxCgJuk/y9K3OAMCkzu8gb8CDxY+gUuOvg=,tag:OocTFS54teDUfHaHAHZiHw==,type:str]
|
kanidm-forgejo-client: ENC[AES256_GCM,data:pitJ6re5xm2w1MSs5Ul7Tl1/H1KSR7Ps7w==,iv:4k8/cxpLqWxCgJuk/y9K3OAMCkzu8gb8CDxY+gUuOvg=,tag:OocTFS54teDUfHaHAHZiHw==,type:str]
|
||||||
#ENC[AES256_GCM,data:Ur0/rfBv5g==,iv:eH+KbbkmtBWbobqAIUFF0jIrGhbHnk9g8hLZoxE3swI=,tag:3dnoA+O5GXW5Dvxcx4jiTw==,type:comment]
|
#ENC[AES256_GCM,data:Ur0/rfBv5g==,iv:eH+KbbkmtBWbobqAIUFF0jIrGhbHnk9g8hLZoxE3swI=,tag:3dnoA+O5GXW5Dvxcx4jiTw==,type:comment]
|
||||||
|
|
@ -56,6 +58,11 @@ kanidm-paperless: ENC[AES256_GCM,data:bJJC20q8aJVzmIMXAHWvOoH652lSCFXDNg==,iv:0c
|
||||||
kanidm-forgejo: ENC[AES256_GCM,data:zw0LcfNJw4q28l1E9q58D9bTKtl/CjGA3w==,iv:fYRGasFiM7PXeP5sWW6whj10CUKIqCfhIYQCNZjxQGo=,tag:sxQJa+ItPA+L3keWZ34SJA==,type:str]
|
kanidm-forgejo: ENC[AES256_GCM,data:zw0LcfNJw4q28l1E9q58D9bTKtl/CjGA3w==,iv:fYRGasFiM7PXeP5sWW6whj10CUKIqCfhIYQCNZjxQGo=,tag:sxQJa+ItPA+L3keWZ34SJA==,type:str]
|
||||||
kanidm-grafana: ENC[AES256_GCM,data:61PEA1fBcaRy8+x0dn9WrH9P0D+NOkbeZw==,iv:kbR3JWzHsmsef+VlFGciZmyforxJCdvzHijvGFvFwpk=,tag:K+6baLIKy0L37KrJEQUgPg==,type:str]
|
kanidm-grafana: ENC[AES256_GCM,data:61PEA1fBcaRy8+x0dn9WrH9P0D+NOkbeZw==,iv:kbR3JWzHsmsef+VlFGciZmyforxJCdvzHijvGFvFwpk=,tag:K+6baLIKy0L37KrJEQUgPg==,type:str]
|
||||||
kanidm-nextcloud: ENC[AES256_GCM,data:9FjsOzBos18ouHBeuzrzHIpCDowFt0Aktw==,iv:iqUQUsWsO5N+KZqHyqNxMxSija/yPrrrAqvz4b1NG1M=,tag:/WC3wg/eYXV3hLJPRVWLog==,type:str]
|
kanidm-nextcloud: ENC[AES256_GCM,data:9FjsOzBos18ouHBeuzrzHIpCDowFt0Aktw==,iv:iqUQUsWsO5N+KZqHyqNxMxSija/yPrrrAqvz4b1NG1M=,tag:/WC3wg/eYXV3hLJPRVWLog==,type:str]
|
||||||
|
kanidm-oauth2-proxy: ENC[AES256_GCM,data:DQ5tj7N+P1b8vFnF+MGhaUBvbVQoE4sVhQ==,iv:Xy4bdi8fSFuFHsQKgZ3PswFFYsqtiAeqeSRam1k/H0E=,tag:9W4LRPPYtDOrSpxRDK/7sg==,type:str]
|
||||||
|
kanidm-freshrss: ENC[AES256_GCM,data:4y0X3sSOfs5pKNCmZGJhxlAKH7GD1UACdw==,iv:LuQQCfOpsTqglwQvohHMFpNGaOjoZ8PKDgG50qBP02k=,tag:Z5mVYP/9nToerQ1qui1eWQ==,type:str]
|
||||||
|
#ENC[AES256_GCM,data:8eDo+FQoBEKMTRY2,iv:ZSrV+Z+1S5AoW+jq49LBFzSwd/NJl3aZYHe7oUvGriU=,tag:3cw3hUigrPViQ+XsuMiksg==,type:comment]
|
||||||
|
oauth2-cookie-secret: ENC[AES256_GCM,data:l8BPYA7t9NG9MPFs/LDlFHqwbnwsvie7FM5v613358E+jLf2wD+tipyUb6c=,iv:1kZ6G6Z0cSQS53kc/hygh/1Ke491agWDlYHR9Yq0jT0=,tag:mi7Un2JBnrq1dnP3jZX4ng==,type:str]
|
||||||
|
kanidm-oauth2-proxy-client: ENC[AES256_GCM,data:+mcA/sz3AZuw+I44iIdOEfDmtjEVdxi2fg==,iv:m4NpieUicS7xsR+F5AgPqkcUFRF+CGOA8IK6GeS9tgM=,tag:1wypxpiHPdQBD8Td/PSdMw==,type:str]
|
||||||
sops:
|
sops:
|
||||||
age:
|
age:
|
||||||
- recipient: age1h72072slm2pthn9m2qwjsyy2dsazc6hz97kpzh4gksvv0r2jqecqul8w63
|
- recipient: age1h72072slm2pthn9m2qwjsyy2dsazc6hz97kpzh4gksvv0r2jqecqul8w63
|
||||||
|
|
@ -67,8 +74,8 @@ sops:
|
||||||
MEZ1UWw3alF1WnJZMFZvMFBpbDFJZlUKGRnoEEgjgJ9SSblmldtY6d8MdAy01yxl
|
MEZ1UWw3alF1WnJZMFZvMFBpbDFJZlUKGRnoEEgjgJ9SSblmldtY6d8MdAy01yxl
|
||||||
qkvEIoXbL+ky2ira7EgjD0legThzCnmlXUlcSn3SpwbkAGgcfd2kWA==
|
qkvEIoXbL+ky2ira7EgjD0legThzCnmlXUlcSn3SpwbkAGgcfd2kWA==
|
||||||
-----END AGE ENCRYPTED FILE-----
|
-----END AGE ENCRYPTED FILE-----
|
||||||
lastmodified: "2025-06-09T16:04:54Z"
|
lastmodified: "2025-06-09T19:50:17Z"
|
||||||
mac: ENC[AES256_GCM,data:ggq/mHOw4kaIalgVNI9YASGewzOwR8+DxhvuuOLo3L4Qnn71/HtXkYnKPMm+Ip58AJi7yH5adNOP2q7MZ/wlG/Ygg95PiM/dBso7l79suycrBo+Zz2bGwUjnT6d35Sz2lqsAIDZgpSwk2M51FjivVXD+Un0aWlt/dj5XOwBhlnU=,iv:WRuIlZ1zc+ITNC4R4Zn2ORy7G2hRFnlEBvnjts4n+RE=,tag:wduo+u6Kjm3LyvkLO8OG+w==,type:str]
|
mac: ENC[AES256_GCM,data:Cx7bI5HRkVVmZTcs/Q3uPtLZaaGd28ZqUsyPRcqd8yEaRxNN0JU6EcQ2ZjU5Zi9jLRLDiR/PxuWsWcmDWH8vW0UZGh6ao75Cw3UO7QhKZHfM5cHqnleo/RIIl5d/Q0hnS9EQmcEPA3qKLQUIrOa+MAgMCkti50ZuNcZnkywLn54=,iv:QPDj4K22G6Go6RDE5ZGbCntmC+mn/5mMyH6ohyQYNuY=,tag:NJ3mjmo2LRmJRXKrYIJZKg==,type:str]
|
||||||
pgp:
|
pgp:
|
||||||
- created_at: "2024-12-17T16:24:32Z"
|
- created_at: "2024-12-17T16:24:32Z"
|
||||||
enc: |-
|
enc: |-
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue