mirror of
https://github.com/gensokyo-zone/infrastructure.git
synced 2026-02-10 04:49:19 -08:00
fix(grocy): access
This commit is contained in:
parent
8695e2cdb9
commit
467df9395e
5 changed files with 120 additions and 65 deletions
|
|
@ -3,35 +3,87 @@
|
|||
lib,
|
||||
...
|
||||
}: let
|
||||
inherit (lib.modules) mkIf mkDefault;
|
||||
inherit (lib.modules) mkIf mkMerge mkDefault;
|
||||
inherit (lib.strings) escapeRegex;
|
||||
inherit (config.services) grocy nginx;
|
||||
inherit (config) networking;
|
||||
name.shortServer = mkDefault "grocy";
|
||||
in {
|
||||
config.services.nginx.virtualHosts = {
|
||||
grocy = {
|
||||
inherit name;
|
||||
locations."/" = mkIf (!grocy.enable) {
|
||||
proxy.headers.enableRecommended = true;
|
||||
extraConfig = ''
|
||||
set $x_proxy_host ${nginx.virtualHosts.grocy.serverName};
|
||||
'';
|
||||
};
|
||||
serverName = "@grocy_internal";
|
||||
serverName'local = "@grocy_internal_local";
|
||||
extraConfig = ''
|
||||
set $x_proxy_host ${serverName};
|
||||
set $grocy_user "";
|
||||
'';
|
||||
location = {
|
||||
vouch.setProxyHeader = true;
|
||||
proxy.headers.enableRecommended = true;
|
||||
extraConfig = ''
|
||||
proxy_set_header X-Grocy-User $grocy_user;
|
||||
'';
|
||||
};
|
||||
luaAuthHost = { config, ... }: {
|
||||
vouch.auth.lua = {
|
||||
enable = true;
|
||||
accessRequest = ''
|
||||
local grocy_apikey = ngx.var["http_grocy_api_key"]
|
||||
if grocy_apikey ~= nil and ngx.re.match(ngx.var["request_uri"], "^/api(/|$)") then
|
||||
-- bypass authentication and let grocy decide...
|
||||
-- if the API key is valid, the middleware will use its user instead
|
||||
-- if the API key is invalid, the middleware will fall back to asking for a password
|
||||
ngx.ctx.auth_res = {
|
||||
status = ngx.HTTP_OK,
|
||||
header = { },
|
||||
}
|
||||
-- elseif ngx.re.match(ngx.var["x_forwarded_host"], [[grocy\.(local|tail)\.${escapeRegex networking.domain}$]]) then
|
||||
-- ngx.ctx.auth_res = {
|
||||
-- status = ngx.HTTP_OK,
|
||||
-- header = { },
|
||||
-- }
|
||||
-- ngx.var["grocy_user"] = "guest"
|
||||
else
|
||||
ngx.ctx.auth_res = ngx.location.capture("${config.vouch.auth.requestLocation}")
|
||||
end
|
||||
'';
|
||||
};
|
||||
grocy'local = {
|
||||
inherit name;
|
||||
ssl.cert.copyFromVhost = "grocy";
|
||||
local.enable = mkDefault true;
|
||||
locations."/" = mkIf (!grocy.enable) {
|
||||
proxyPass = mkDefault (if grocy.enable
|
||||
then "http://localhost:${toString nginx.defaultHTTPListenPort}"
|
||||
else nginx.virtualHosts.grocy.locations."/".proxyPass
|
||||
);
|
||||
proxy.headers.enableRecommended = true;
|
||||
};
|
||||
in {
|
||||
config.services.nginx = {
|
||||
lua.http.enable = true;
|
||||
virtualHosts = {
|
||||
grocy'php = mkIf grocy.enable {
|
||||
inherit serverName;
|
||||
};
|
||||
grocy = mkMerge [ luaAuthHost {
|
||||
inherit name extraConfig;
|
||||
vouch.enable = true;
|
||||
locations."/" = mkMerge [ location {
|
||||
proxyPass = mkIf (grocy.enable) (mkDefault
|
||||
"http://localhost:${toString nginx.defaultHTTPListenPort}"
|
||||
);
|
||||
} ];
|
||||
} ];
|
||||
grocy'local = {
|
||||
inherit name;
|
||||
local.enable = mkDefault true;
|
||||
ssl.cert.copyFromVhost = "grocy";
|
||||
locations."/" = {
|
||||
proxy.headers.enableRecommended = true;
|
||||
proxyPass = mkDefault "http://localhost:${toString nginx.defaultHTTPListenPort}";
|
||||
};
|
||||
extraConfig = ''
|
||||
set $x_proxy_host ${nginx.virtualHosts.grocy.serverName};
|
||||
proxy_redirect $x_scheme://${nginx.virtualHosts.grocy.serverName}/ $x_scheme://$x_host/;
|
||||
set $x_proxy_host ${serverName'local};
|
||||
'';
|
||||
};
|
||||
grocy'local'int = mkMerge [ luaAuthHost {
|
||||
# internal proxy workaround for http2 lua compat issues
|
||||
serverName = serverName'local;
|
||||
inherit name extraConfig;
|
||||
proxied.enable = true;
|
||||
vouch.enable = true;
|
||||
locations."/" = mkMerge [ location {
|
||||
proxyPass = mkDefault nginx.virtualHosts.grocy.locations."/".proxyPass;
|
||||
} ];
|
||||
} ];
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
|
|||
|
|
@ -8,62 +8,63 @@ in {
|
|||
config = {
|
||||
services.grocy = {
|
||||
enable = mkDefault true;
|
||||
hostName = "grocy";
|
||||
hostName = "grocy'php";
|
||||
nginx.enableSSL = false;
|
||||
settings = {
|
||||
currency = mkDefault "CAD";
|
||||
};
|
||||
};
|
||||
services.nginx = let
|
||||
name.shortServer = mkDefault "grocy";
|
||||
lua.access.block = ''
|
||||
local grocy_user_pat = "^([^@]+)@.*$"
|
||||
if ngx.re.match(ngx.var.auth_resp_x_vouch_user, grocy_user_pat) then
|
||||
ngx.var["grocy_user"] = ngx.re.sub(ngx.var.auth_resp_x_vouch_user, grocy_user_pat, "$1", "o") or "guest"
|
||||
end
|
||||
'';
|
||||
extraConfig = mkAfter ''
|
||||
set $grocy_user guest;
|
||||
set $grocy_middleware Grocy\Middleware\ReverseProxyAuthMiddleware;
|
||||
set $grocy_auth_header GENSO_GROCY_USER;
|
||||
set $grocy_auth_env true;
|
||||
|
||||
fastcgi_param GENSO_GROCY_USER $grocy_user;
|
||||
fastcgi_param GROCY_REVERSE_PROXY_AUTH_HEADER GENSO_GROCY_USER;
|
||||
fastcgi_param GROCY_REVERSE_PROXY_AUTH_USE_ENV true;
|
||||
if ($http_grocy_api_key) {
|
||||
set $grocy_user "";
|
||||
}
|
||||
if ($request_uri ~ "^/api(/.*|)$") {
|
||||
set $grocy_user "";
|
||||
}
|
||||
if ($http_x_vouch_user ~ "^([^@]+)@.*$") {
|
||||
set $grocy_user $1;
|
||||
}
|
||||
if ($http_x_grocy_user) {
|
||||
#set $grocy_auth_header X-Grocy-User;
|
||||
#set $grocy_auth_env false;
|
||||
set $grocy_user $http_x_grocy_user;
|
||||
}
|
||||
if ($grocy_user = "") {
|
||||
set $grocy_middleware Grocy\Middleware\DefaultAuthMiddleware;
|
||||
}
|
||||
|
||||
fastcgi_param GROCY_AUTH_CLASS $grocy_middleware;
|
||||
fastcgi_param GROCY_REVERSE_PROXY_AUTH_USE_ENV $grocy_auth_env;
|
||||
fastcgi_param GROCY_REVERSE_PROXY_AUTH_HEADER $grocy_auth_header;
|
||||
fastcgi_param GENSO_GROCY_USER $grocy_user;
|
||||
|
||||
set $grocy_https "";
|
||||
if ($x_scheme = https) {
|
||||
set $grocy_https 1;
|
||||
}
|
||||
fastcgi_param HTTP_HOST $x_forwarded_host;
|
||||
fastcgi_param REQUEST_SCHEME $x_scheme;
|
||||
fastcgi_param HTTPS $grocy_https if_not_empty;
|
||||
'';
|
||||
in mkIf cfg.enable {
|
||||
lua.http.enable = true;
|
||||
in {
|
||||
virtualHosts = {
|
||||
grocy = {config, ...}: {
|
||||
inherit name;
|
||||
vouch = {
|
||||
grocy'php = mkIf cfg.enable ({config, ...}: {
|
||||
name.shortServer = mkDefault "grocy";
|
||||
proxied = {
|
||||
enable = true;
|
||||
requireAuth = false;
|
||||
auth.lua = {
|
||||
enable = true;
|
||||
accessRequest = ''
|
||||
local grocy_apikey = ngx.var["http_grocy_api_key"]
|
||||
if grocy_apikey ~= nil and ngx.re.match(ngx.var.request_uri, "^/api(/|$)") then
|
||||
-- bypass authentication and let grocy decide...
|
||||
-- if the API key is valid, the middleware will use its user instead
|
||||
-- if the API key is invalid, the middleware will fall back to the (invalid/empty) user string
|
||||
ngx.ctx.auth_res = {
|
||||
status = ngx.HTTP_OK,
|
||||
header = { },
|
||||
}
|
||||
ngx.var["grocy_user"] = ""
|
||||
else
|
||||
ngx.ctx.auth_res = ngx.location.capture("${config.vouch.auth.requestLocation}")
|
||||
end
|
||||
'';
|
||||
};
|
||||
xvars.enable = true;
|
||||
};
|
||||
locations."~ \\.php$" = mkIf nginx.virtualHosts.grocy.vouch.enable {
|
||||
vouch.requireAuth = true;
|
||||
inherit extraConfig lua;
|
||||
local.denyGlobal = true;
|
||||
locations."~ \\.php$" = {
|
||||
inherit extraConfig;
|
||||
};
|
||||
};
|
||||
});
|
||||
};
|
||||
};
|
||||
users.users.grocy = mkIf cfg.enable {
|
||||
|
|
|
|||
|
|
@ -1,4 +1,4 @@
|
|||
barcodebuddy-fastcgi-params: ENC[AES256_GCM,data:Ja1gkFypwLgdQyJWQljtkcmlJ4nKw8CACXIe9CXQduwv2wZdiAZcoulX6+kjPxHLMsdTuvWFbVY4GfBVWh6LmySLgR6tIwmNiNg7ncgVEQbeTK75HQFWviVDu13GjYQU7YCBB438gX2X2aPHb25EcLU6UQgzHyCetO6nG9/T9OhKmmS0UUXCG1JykWQqfHPpjddydRYw08ZseZHhcyPzXAwdoJZsgVs1KhbvCUuMJctCfFEwCesYXcGM6eTPg9N8+hqAa13ijkQ8NzmamUau45pmrRbUJOm+OXi0TjO8KYIkQg7bua64oO3DegzFmeFeqnSAmlIcvZw=,iv:tI+RtXAWKbx3jQ1QfuCcoEoXPq9oze0QjrwQ5mcDe0U=,tag:Fa8fODz6hQu09yaf3HyqXg==,type:str]
|
||||
barcodebuddy-fastcgi-params: ENC[AES256_GCM,data:82HrXLAfR/vH7QtqaKOq/1B5/h0Qd0PRTK7W+DBtBLmaXMkGkV41vyohqnPblNJiIZHzkWPcmhdqcf2hhAKRxf3fn8LfMMk2FLKSVOqqQBlyFU/ZjNQymlTrr0ltmFDGskW5gsTMJUIAp6oILCfcIYKSYVDqjab6Gd7IG/mf95Pj9Moj5seft8wSoTd0lOajHn4dJ3Y4ZzcVZzaFrumxhxvLZpN7Rr0X7fnWtlpyTTnhPZ58fRvLlV+md5oQRz2h5KJ3HSlibWCm4yiDhUERNQ==,iv:vJ/afsq1FesiLdBDCe+nDvt4MjJ2ZofnV/+FeurNnrM=,tag:4DwuLh8CrPo8CK5zxsA2gA==,type:str]
|
||||
sops:
|
||||
shamir_threshold: 1
|
||||
kms: []
|
||||
|
|
@ -78,8 +78,8 @@ sops:
|
|||
YVp2UnlUeVVuMjE1L0VsdEJQdmtlQWcKwuFHmj4KpUk/LGxKu2sHOmN8QsuiZat+
|
||||
p4FswX4i4PDPmZAHYLt69MJIKUDlm3iN/A5Hfa6mX6R4NZjryNdD2w==
|
||||
-----END AGE ENCRYPTED FILE-----
|
||||
lastmodified: "2024-03-22T15:15:33Z"
|
||||
mac: ENC[AES256_GCM,data:N4NB3pSZsh8HTSp14/rj4kZ1dGvJzlP9j6uk9ZciCtNFsEmPLSSojdJfzULUvpbZv+emJHHgXCKORCtJ6xZ0Zn+8u2q/nvEiWQITMl00yeRz2SNanCumtXmT+YdMI0PEK6WnLJSyiq/qr5GQIzYKWZgJRaj7hiu/eTdpglTfZUo=,iv:ybOhB5ZFvdSEyewqVBtXAW5b5i9tUJBAk1GdycRwkMY=,tag:Pl7jQhHmKj8yhQDUyoZHFg==,type:str]
|
||||
lastmodified: "2024-03-23T19:16:11Z"
|
||||
mac: ENC[AES256_GCM,data:Jtbmq/04a6ar1D07UIb+xEbRmbBKCEY9G2UEmE3JX/xjnpFj10qFRHB1DX+sVtltjYDhWdtyVx/rWNg/QDcsC7aBelyUH2GamHSIHXFfQ+C5C0KySv+Fqur/px86wIn9jIzyohzQa0Vd4wiODrCtMpwnFx1PCaRk3/BSnrvkoOE=,iv:WAKYsjRuhpSK8ZdI60bU4mDjn80CMynnR/81Z5iILuI=,tag:wn4RMpLnKj0funHp//GGQg==,type:str]
|
||||
pgp:
|
||||
- created_at: "2024-03-22T14:22:11Z"
|
||||
enc: |-
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue