feat(idp): port forwarding

This commit is contained in:
arcnmx 2024-03-11 22:02:39 -07:00
parent 8769927a98
commit 6216f0bb4c
3 changed files with 75 additions and 10 deletions

View file

@ -5,27 +5,34 @@
...
}:
let
inherit (lib.options) mkOption;
inherit (lib.modules) mkIf mkDefault;
inherit (lib.options) mkOption mkEnableOption;
inherit (lib.modules) mkBefore mkIf mkDefault;
inherit (lib.strings) optionalString concatStringsSep;
inherit (config.services) tailscale;
inherit (config.services.nginx) virtualHosts;
access = config.services.nginx.access.freeipa;
inherit (config.services.nginx.access) ldap;
locations = {
extraConfig = ''
ssl_verify_client optional_no_ca;
'';
locations' = domain: {
"/" = {
proxyPass = mkDefault access.proxyPass;
recommendedProxySettings = false;
extraConfig = ''
proxy_set_header Host ${access.domain};
proxy_set_header Host ${domain};
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Forwarded-Host $host;
proxy_set_header X-Forwarded-Server $host;
proxy_redirect https://${access.domain}/ $scheme://$host/;
proxy_set_header X-SSL-CERT $ssl_client_escaped_cert;
proxy_redirect https://${domain}/ $scheme://$host/;
'';
};
};
locations = locations' access.domain;
caLocations = locations' access.caDomain;
in {
imports = let
inherit (meta) nixos;
@ -37,6 +44,25 @@ in {
host = mkOption {
type = str;
};
kerberos = {
enable = mkEnableOption "proxy kerberos" // {
default = true;
};
ports = {
ticket = mkOption {
type = port;
default = 88;
};
ticket4 = mkOption {
type = port;
default = 4444;
};
kpasswd = mkOption {
type = port;
default = 749;
};
};
};
proxyPass = mkOption {
type = str;
default = let
@ -47,6 +73,10 @@ in {
type = str;
default = "idp.${config.networking.domain}";
};
caDomain = mkOption {
type = str;
default = "idp-ca.${config.networking.domain}";
};
localDomain = mkOption {
type = str;
default = "freeipa.local.${config.networking.domain}";
@ -76,9 +106,34 @@ in {
port = mkDefault access.ldapPort;
useACMEHost = mkDefault access.useACMEHost;
};
streamConfig = mkIf access.kerberos.enable ''
server {
listen 0.0.0.0:${toString access.kerberos.ports.ticket};
listen [::]:${toString access.kerberos.ports.ticket};
listen 0.0.0.0:${toString access.kerberos.ports.ticket} udp;
listen [::]:${toString access.kerberos.ports.ticket} udp;
proxy_pass ${access.host}:${toString access.kerberos.ports.ticket};
}
server {
listen 0.0.0.0:${toString access.kerberos.ports.ticket4} udp;
listen [::]:${toString access.kerberos.ports.ticket4} udp;
proxy_pass ${access.host}:${toString access.kerberos.ports.ticket4};
}
server {
listen 0.0.0.0:${toString access.kerberos.ports.kpasswd};
listen [::]:${toString access.kerberos.ports.kpasswd};
listen 0.0.0.0:${toString access.kerberos.ports.kpasswd} udp;
listen [::]:${toString access.kerberos.ports.kpasswd} udp;
proxy_pass ${access.host}:${toString access.kerberos.ports.kpasswd};
}
'';
virtualHosts = {
${access.domain} = {
inherit locations;
inherit locations extraConfig;
};
${access.caDomain} = {
locations = caLocations;
inherit extraConfig;
};
${access.localDomain} = {
inherit (virtualHosts.${access.domain}) useACMEHost;
@ -111,11 +166,14 @@ in {
};
networking.firewall = {
interfaces.local.allowedTCPPorts = [
389
allowedTCPPorts = mkIf access.kerberos.enable [
access.kerberos.ports.ticket
access.kerberos.ports.kpasswd
];
allowedTCPPorts = [
636
allowedUDPPorts = mkIf access.kerberos.enable [
access.kerberos.ports.ticket
access.kerberos.ports.ticket4
access.kerberos.ports.kpasswd
];
};
};