forked from mirrors/nixpkgs
Add Shibboleth Service Provider Module
This commit is contained in:
parent
f4289c8b19
commit
9f18af5991
|
@ -534,6 +534,7 @@
|
|||
./services/security/munge.nix
|
||||
./services/security/oauth2_proxy.nix
|
||||
./services/security/physlock.nix
|
||||
./services/security/shibboleth-sp.nix
|
||||
./services/security/sshguard.nix
|
||||
./services/security/tor.nix
|
||||
./services/security/torify.nix
|
||||
|
|
71
nixos/modules/services/security/shibboleth-sp.nix
Normal file
71
nixos/modules/services/security/shibboleth-sp.nix
Normal file
|
@ -0,0 +1,71 @@
|
|||
{pkgs, config, lib, ...}:
|
||||
|
||||
with lib;
|
||||
let
|
||||
cfg = config.services.shibboleth-sp;
|
||||
in {
|
||||
options = {
|
||||
services.shibboleth-sp = {
|
||||
enable = mkOption {
|
||||
type = types.bool;
|
||||
default = false;
|
||||
description = "Whether to enable the shibboleth service";
|
||||
};
|
||||
|
||||
configFile = mkOption {
|
||||
type = types.path;
|
||||
example = "${pkgs.shibboleth-sp}/etc/shibboleth/shibboleth2.xml";
|
||||
description = "Path to shibboleth config file";
|
||||
};
|
||||
|
||||
fastcgi.enable = mkOption {
|
||||
type = types.bool;
|
||||
default = false;
|
||||
description = "Whether to include the shibauthorizer and shibresponder FastCGI processes";
|
||||
};
|
||||
|
||||
fastcgi.shibAuthorizerPort = mkOption {
|
||||
type = types.int;
|
||||
default = 9100;
|
||||
description = "Port for shibauthorizer FastCGI proccess to bind to";
|
||||
};
|
||||
|
||||
fastcgi.shibResponderPort = mkOption {
|
||||
type = types.int;
|
||||
default = 9101;
|
||||
description = "Port for shibauthorizer FastCGI proccess to bind to";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
systemd.services.shibboleth-sp = {
|
||||
description = "Provides SSO and federation for web applications";
|
||||
after = lib.optionals cfg.fastcgi.enable [ "shibresponder.service" "shibauthorizer.service" ];
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
serviceConfig = {
|
||||
ExecStart = "${pkgs.shibboleth-sp}/bin/shibd -F -d ${pkgs.shibboleth-sp} -c ${cfg.configFile}";
|
||||
};
|
||||
};
|
||||
|
||||
systemd.services.shibresponder = mkIf cfg.fastcgi.enable {
|
||||
description = "Provides SSO through Shibboleth via FastCGI";
|
||||
after = [ "network.target" ];
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
path = [ "${pkgs.spawn_fcgi}" ];
|
||||
serviceConfig = {
|
||||
ExecStart = "${pkgs.spawn_fcgi}/bin/spawn-fcgi -n -p ${toString cfg.fastcgi.shibResponderPort} ${pkgs.shibboleth-sp}/lib/shibboleth/shibresponder";
|
||||
};
|
||||
};
|
||||
|
||||
systemd.services.shibauthorizer = mkIf cfg.fastcgi.enable {
|
||||
description = "Provides SSO through Shibboleth via FastCGI";
|
||||
after = [ "network.target" ];
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
path = [ "${pkgs.spawn_fcgi}" ];
|
||||
serviceConfig = {
|
||||
ExecStart = "${pkgs.spawn_fcgi}/bin/spawn-fcgi -n -p ${toString cfg.fastcgi.shibAuthorizerPort} ${pkgs.shibboleth-sp}/lib/shibboleth/shibauthorizer";
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
Loading…
Reference in a new issue