nixpkgs/nixos/modules/services/security/shibboleth-sp.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

75 lines
2.6 KiB
Nix
Raw Normal View History

{ config, lib, pkgs, ... }:
2017-05-02 00:01:39 +00:00
let
cfg = config.services.shibboleth-sp;
in {
options = {
services.shibboleth-sp = {
enable = lib.mkOption {
type = lib.types.bool;
2017-05-02 00:01:39 +00:00
default = false;
description = "Whether to enable the shibboleth service";
};
configFile = lib.mkOption {
type = lib.types.path;
example = lib.literalExpression ''"''${pkgs.shibboleth-sp}/etc/shibboleth/shibboleth2.xml"'';
2017-05-02 00:01:39 +00:00
description = "Path to shibboleth config file";
};
fastcgi.enable = lib.mkOption {
type = lib.types.bool;
2017-05-02 00:01:39 +00:00
default = false;
description = "Whether to include the shibauthorizer and shibresponder FastCGI processes";
};
fastcgi.shibAuthorizerPort = lib.mkOption {
type = lib.types.int;
2017-05-02 00:01:39 +00:00
default = 9100;
2022-12-18 00:31:14 +00:00
description = "Port for shibauthorizer FastCGI process to bind to";
2017-05-02 00:01:39 +00:00
};
fastcgi.shibResponderPort = lib.mkOption {
type = lib.types.int;
2017-05-02 00:01:39 +00:00
default = 9101;
2022-12-18 00:31:14 +00:00
description = "Port for shibauthorizer FastCGI process to bind to";
2017-05-02 00:01:39 +00:00
};
};
};
config = lib.mkIf cfg.enable {
2017-05-02 00:01:39 +00:00
systemd.services.shibboleth-sp = {
description = "Provides SSO and federation for web applications";
after = lib.optionals cfg.fastcgi.enable [ "shibresponder.service" "shibauthorizer.service" ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
ExecStart = "${pkgs.shibboleth-sp}/bin/shibd -F -d ${pkgs.shibboleth-sp} -c ${cfg.configFile}";
};
};
systemd.services.shibresponder = lib.mkIf cfg.fastcgi.enable {
2017-05-02 00:01:39 +00:00
description = "Provides SSO through Shibboleth via FastCGI";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
path = [ "${pkgs.spawn_fcgi}" ];
environment.SHIBSP_CONFIG = "${cfg.configFile}";
2017-05-02 00:01:39 +00:00
serviceConfig = {
ExecStart = "${pkgs.spawn_fcgi}/bin/spawn-fcgi -n -p ${toString cfg.fastcgi.shibResponderPort} ${pkgs.shibboleth-sp}/lib/shibboleth/shibresponder";
};
};
systemd.services.shibauthorizer = lib.mkIf cfg.fastcgi.enable {
2017-05-02 00:01:39 +00:00
description = "Provides SSO through Shibboleth via FastCGI";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
path = [ "${pkgs.spawn_fcgi}" ];
environment.SHIBSP_CONFIG = "${cfg.configFile}";
2017-05-02 00:01:39 +00:00
serviceConfig = {
ExecStart = "${pkgs.spawn_fcgi}/bin/spawn-fcgi -n -p ${toString cfg.fastcgi.shibAuthorizerPort} ${pkgs.shibboleth-sp}/lib/shibboleth/shibauthorizer";
};
};
};
meta.maintainers = [ ];
2017-05-02 00:01:39 +00:00
}