All checks were successful
Check workflows / check_workflows (pull_request) Successful in 17s
Check meta / check_dns (pull_request) Successful in 18s
Check meta / check_meta (pull_request) Successful in 18s
Build all the nodes / netaccess01 (pull_request) Successful in 20s
Build all the nodes / netcore01 (pull_request) Successful in 21s
Build all the nodes / netcore02 (pull_request) Successful in 20s
Build all the nodes / netcore00 (pull_request) Successful in 22s
Build all the nodes / ap01 (pull_request) Successful in 31s
Run pre-commit on all files / pre-commit (push) Successful in 36s
Build all the nodes / bridge01 (pull_request) Successful in 54s
Build all the nodes / build01 (pull_request) Successful in 1m2s
Build all the nodes / hypervisor02 (pull_request) Successful in 1m5s
Build all the nodes / hypervisor03 (pull_request) Successful in 1m5s
Build all the nodes / hypervisor01 (pull_request) Successful in 1m6s
Build all the nodes / geo02 (pull_request) Successful in 1m6s
Build all the nodes / cof02 (pull_request) Successful in 1m8s
Build all the nodes / rescue01 (pull_request) Successful in 57s
Build all the nodes / web02 (pull_request) Successful in 54s
Run pre-commit on all files / pre-commit (pull_request) Successful in 25s
Build the shell / build-shell (pull_request) Successful in 52s
Build all the nodes / geo01 (pull_request) Successful in 1m37s
Build all the nodes / vault01 (pull_request) Successful in 1m22s
Build all the nodes / compute01 (pull_request) Successful in 1m44s
Build all the nodes / web03 (pull_request) Successful in 1m12s
Build all the nodes / web01 (pull_request) Successful in 1m32s
Build all the nodes / tower01 (pull_request) Successful in 1m39s
Build all the nodes / storage01 (pull_request) Successful in 1m49s
58 lines
1.4 KiB
Nix
58 lines
1.4 KiB
Nix
# SPDX-FileCopyrightText: 2024 Tom Hubrecht <tom.hubrecht@dgnum.eu>
|
|
#
|
|
# SPDX-License-Identifier: EUPL-1.2
|
|
|
|
{ config, lib, ... }:
|
|
let
|
|
inherit (lib) genList;
|
|
in
|
|
{
|
|
imports = [ ./module.nix ];
|
|
|
|
services.k-radius = {
|
|
enable = true;
|
|
|
|
domain = "radius.dgnum.eu";
|
|
|
|
radiusClients = {
|
|
ap = {
|
|
ipaddr = "0.0.0.0/0";
|
|
secret = config.age.secrets."radius-ap-radius-secret_file".path;
|
|
};
|
|
};
|
|
|
|
settings = {
|
|
# URL to the Kanidm server
|
|
uri = "https://sso.dgnum.eu";
|
|
|
|
# verify the hostname of the Kanidm server
|
|
verify_hostnames = "true";
|
|
|
|
# Strict CA verification
|
|
verify_ca = "false";
|
|
verify_certificate = "false";
|
|
|
|
# Path to the kanidm ca
|
|
|
|
# Default vlans for groups that don't specify one.
|
|
radius_default_vlan = 99;
|
|
|
|
# A list of Kanidm groups which must be a member
|
|
# before they can authenticate via RADIUS.
|
|
radius_required_groups = [ "radius_access@sso.dgnum.eu" ];
|
|
|
|
# A mapping between Kanidm groups and VLANS
|
|
radius_groups = genList (id: rec {
|
|
vlan = 4094 - id;
|
|
spn = "vlan_${toString vlan}@sso.dgnum.eu";
|
|
}) 850;
|
|
};
|
|
|
|
authTokenFile = config.age.secrets."radius-auth_token_file".path;
|
|
};
|
|
|
|
age-secrets.autoMatch = [ "radius" ];
|
|
|
|
networking.firewall.allowedTCPPorts = [ 1812 ];
|
|
networking.firewall.allowedUDPPorts = [ 1812 ];
|
|
}
|