forked from mirrors/nixpkgs
* Add a module for a Flash policy server.
svn path=/nixos/trunk/; revision=29296
This commit is contained in:
parent
8abea71eaa
commit
61072f8995
|
@ -108,6 +108,7 @@
|
|||
./services/networking/dnsmasq.nix
|
||||
./services/networking/ejabberd.nix
|
||||
./services/networking/firewall.nix
|
||||
./services/networking/flashpolicyd.nix
|
||||
./services/networking/git-daemon.nix
|
||||
./services/networking/gnunet.nix
|
||||
./services/networking/gvpe.nix
|
||||
|
|
84
modules/services/networking/flashpolicyd.nix
Normal file
84
modules/services/networking/flashpolicyd.nix
Normal file
|
@ -0,0 +1,84 @@
|
|||
{ config, pkgs, ... }:
|
||||
|
||||
with pkgs.lib;
|
||||
|
||||
let
|
||||
|
||||
cfg = config.services.flashpolicyd;
|
||||
|
||||
flashpolicyd = pkgs.stdenv.mkDerivation {
|
||||
name = "flashpolicyd-0.6";
|
||||
|
||||
src = pkgs.fetchurl {
|
||||
name = "flashpolicyd_v0.6.zip";
|
||||
url = "http://www.adobe.com/content/dotcom/en/devnet/flashplayer/articles/socket_policy_files/_jcr_content/articlePrerequistes/multiplefiles/node_1277808777771/file.res/flashpolicyd_v0.6%5B1%5D.zip";
|
||||
sha256 = "16zk237233npwfq1m4ksy4g5lzy1z9fp95w7pz0cdlpmv0fv9sm3";
|
||||
};
|
||||
|
||||
buildInputs = [ pkgs.unzip pkgs.perl ];
|
||||
|
||||
installPhase = "mkdir $out; cp -pr * $out/; chmod +x $out/*/*.pl";
|
||||
};
|
||||
|
||||
flashpolicydWrapper = pkgs.writeScriptBin "flashpolicyd"
|
||||
''
|
||||
#! ${pkgs.stdenv.shell}
|
||||
exec ${flashpolicyd}/Perl_xinetd/in.flashpolicyd.pl \
|
||||
--file=${pkgs.writeText "flashpolixy.xml" cfg.policy} \
|
||||
2> /dev/null
|
||||
'';
|
||||
|
||||
in
|
||||
|
||||
{
|
||||
|
||||
###### interface
|
||||
|
||||
options = {
|
||||
|
||||
services.flashpolicyd = {
|
||||
|
||||
enable = mkOption {
|
||||
default = false;
|
||||
description =
|
||||
''
|
||||
Whether to enable the Flash Policy server. This is
|
||||
necessary if you want Flash applications to make
|
||||
connections to your server.
|
||||
'';
|
||||
};
|
||||
|
||||
policy = mkOption {
|
||||
default =
|
||||
''
|
||||
<?xml version="1.0"?>
|
||||
<!DOCTYPE cross-domain-policy SYSTEM "/xml/dtds/cross-domain-policy.dtd">
|
||||
<cross-domain-policy>
|
||||
<site-control permitted-cross-domain-policies="master-only"/>
|
||||
<allow-access-from domain="*" to-ports="*" />
|
||||
</cross-domain-policy>
|
||||
'';
|
||||
description = "The policy to be served. The default is to allow connections from any domain to any port.";
|
||||
};
|
||||
|
||||
};
|
||||
|
||||
};
|
||||
|
||||
|
||||
###### implementation
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
|
||||
services.xinetd.enable = true;
|
||||
|
||||
services.xinetd.services = singleton
|
||||
{ name = "flashpolicy";
|
||||
port = 843;
|
||||
unlisted = true;
|
||||
server = "${flashpolicydWrapper}/bin/flashpolicyd";
|
||||
};
|
||||
|
||||
};
|
||||
|
||||
}
|
Loading…
Reference in a new issue