1
1
Fork 1
mirror of https://github.com/oddlama/nix-config.git synced 2025-10-11 07:10:39 +02:00

feat: experiment with kanidm and acme dns-01. add common conditional locations to impermanence

This commit is contained in:
oddlama 2023-05-25 01:57:16 +02:00
parent 668f9fdaf4
commit 0e3d881887
No known key found for this signature in database
GPG key ID: 14EFE510775FE39A
24 changed files with 323 additions and 29 deletions

View file

@ -3,7 +3,19 @@
nixos-hardware,
pkgs,
...
}: {
}: let
# TODO byebyebye
# TODO byebyebye
# TODO byebyebye
# TODO byebyebye
# TODO byebyebye
# TODO byebyebye
# TODO byebyebye
# TODO byebyebye
# TODO byebyebye
inherit (config.repo.secrets.local) acme;
auth.domain = config.repo.secrets.local.auth.domain;
in {
imports = [
nixos-hardware.common-cpu-intel
nixos-hardware.common-pc-ssd
@ -33,15 +45,26 @@
};
in {
test = defineVm 11;
#nginx = defineVm 12;
#ddclient = defineVm 11;
nginx = defineVm 12;
#kanidm = defineVm 13;
#gitea = defineVm 14;
#vaultwarden = defineVm 15;
#samba = defineVm 16;
#samba+wsdd = defineVm 16;
#fasten-health = defineVm 17;
#immich = defineVm 18;
#paperless = defineVm 19;
#radicale = defineVm 20;
#minecraft = defineVm 21;
#grafana
#loki
#maddy = defineVm 19;
#anonaddy = defineVm 19;
#automatic1111 = defineVm 19;
#invokeai = defineVm 19;
#kanidm = defineVm 12 // {
# configPath = ./vm-test.nix;
@ -51,4 +74,162 @@
microvm.vms.test.config = {
rekey.hostPubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBXXjI6uB26xOF0DPy/QyLladoGIKfAtofyqPgIkCH/g";
};
microvm.vms.nginx.config = {
lib,
config,
parentNodeName,
...
}: {
rekey.hostPubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN2TxWynLb8V9SP45kFqsoCWhe/dG8N1xWNuJG5VQndq";
rekey.secrets."kanidm-self-signed.crt" = {
file = ./secrets/kanidm-self-signed.crt.age;
mode = "440";
owner = "nginx";
group = "kanidm";
};
rekey.secrets."kanidm-self-signed.key" = {
file = ./secrets/kanidm-self-signed.key.age;
mode = "440";
owner = "nginx";
group = "kanidm";
};
rekey.secrets."dhparams.pem" = {
# TODO make own?
file = ../zackbiene/secrets/dhparams.pem.age;
mode = "440";
group = "nginx";
};
networking.hosts = {
"192.168.100.12" = [auth.domain];
};
rekey.secrets.acme-credentials = {
file = ./secrets/acme-credentials.age;
mode = "440";
group = "acme";
};
security.acme = {
acceptTerms = true;
defaults = {
inherit (acme) email;
dnsProvider = "cloudflare";
credentialsFile = config.rekey.secrets.acme-credentials.path;
dnsPropagationCheck = true;
};
certs = lib.genAttrs acme.domains (domain: {
extraDomainNames = ["*.${domain}"];
});
};
users.groups.acme.members = ["nginx"];
# TODO needed in my current testing network that has no ipv6 connectivity
# TODO but these should use fallback......... something's wrong
systemd.network.networks."10-wan".networkConfig.DNS = ["1.1.1.1" "8.8.8.8"];
# TODO reload nginx when acme is renewed
# TODO make default nginx config in core to reduce boilerplate?
services.nginx = let
# TODO not implemented well
# TODO not implemented well
# TODO not implemented well
# TODO not implemented well
# TODO not implemented well
# TODO not implemented well
# TODO not implemented well
# TODO not implemented well
# TODO (acme.domains is very specific)
# TODO (security.acme causes recursion)
matchingWildcardCert = domain: let
# Filter all certs that are wildcard certs and which match the given domain
matchingCerts =
lib.filter
(x: !lib.hasInfix "." (lib.removeSuffix ".${x}" domain))
acme.domains;
in
assert lib.assertMsg (matchingCerts != []) "No wildcard certificate was defined that matches ${domain}";
lib.head matchingCerts;
in {
enable = true;
recommendedBrotliSettings = true;
recommendedGzipSettings = true;
recommendedOptimisation = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
# SSL config
sslCiphers = "EECDH+AESGCM:EDH+AESGCM:!aNULL";
sslDhparam = config.rekey.secrets."dhparams.pem".path;
commonHttpConfig = ''
error_log syslog:server=unix:/dev/log;
access_log syslog:server=unix:/dev/log;
ssl_ecdh_curve secp384r1;
'';
upstreams."kanidm" = {
servers."${config.extra.wireguard."${parentNodeName}-local-vms".ipv4}:8300" = {};
extraConfig = ''
zone kanidm 64k;
keepalive 2;
'';
};
virtualHosts.${auth.domain} = {
forceSSL = true;
useACMEHost = matchingWildcardCert auth.domain;
locations."/".proxyPass = "https://kanidm";
# Allow using self-signed certs to satisfy kanidm's requirement
# for TLS connections. (This is over wireguard anyway)
extraConfig = ''
proxy_ssl_verify off;
'';
};
};
networking.firewall.allowedTCPPorts = [80 443];
networking.nftables.firewall.rules = lib.mkForce {
local-vms-to-local.allowedTCPPorts = [8300];
};
# systemd.services.kanidm = let
# cfg = config.services.kanidm;
# certName = config.services.nginx.virtualHosts.${cfg.serverSettings.domain}.useACMEHost;
# in {
# requires = [ "acme-finished-${certName}.target" ];
# serviceConfig.LoadCredential = let
# certDir = config.security.acme.certs.${certName}.directory;
# in [
# "fullchain.pem:${certDir}/fullchain.pem"
# "key.pem:${certDir}/key.pem"
# ];
# };
services.kanidm = {
enableServer = true;
# enablePAM = true;
serverSettings = {
inherit (auth) domain;
origin = "https://${config.services.kanidm.serverSettings.domain}";
#tls_chain = "/run/credentials/kanidm.service/fullchain.pem";
#tls_key = "/run/credentials/kanidm.service/key.pem";
tls_chain = config.rekey.secrets."kanidm-self-signed.crt".path;
tls_key = config.rekey.secrets."kanidm-self-signed.key".path;
bindaddress = "${config.extra.wireguard."${parentNodeName}-local-vms".ipv4}:8300";
trust_x_forward_for = true;
};
enableClient = true;
clientSettings = {
uri = config.services.kanidm.serverSettings.origin;
verify_ca = true;
verify_hostnames = true;
};
};
environment.systemPackages = [pkgs.kanidm];
};
}