Add Shibboleth Service Provider Module
This commit is contained in:
parent
f4289c8b19
commit
9f18af5991
@ -534,6 +534,7 @@
|
|||||||
./services/security/munge.nix
|
./services/security/munge.nix
|
||||||
./services/security/oauth2_proxy.nix
|
./services/security/oauth2_proxy.nix
|
||||||
./services/security/physlock.nix
|
./services/security/physlock.nix
|
||||||
|
./services/security/shibboleth-sp.nix
|
||||||
./services/security/sshguard.nix
|
./services/security/sshguard.nix
|
||||||
./services/security/tor.nix
|
./services/security/tor.nix
|
||||||
./services/security/torify.nix
|
./services/security/torify.nix
|
||||||
|
71
nixos/modules/services/security/shibboleth-sp.nix
Normal file
71
nixos/modules/services/security/shibboleth-sp.nix
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
{pkgs, config, lib, ...}:
|
||||||
|
|
||||||
|
with lib;
|
||||||
|
let
|
||||||
|
cfg = config.services.shibboleth-sp;
|
||||||
|
in {
|
||||||
|
options = {
|
||||||
|
services.shibboleth-sp = {
|
||||||
|
enable = mkOption {
|
||||||
|
type = types.bool;
|
||||||
|
default = false;
|
||||||
|
description = "Whether to enable the shibboleth service";
|
||||||
|
};
|
||||||
|
|
||||||
|
configFile = mkOption {
|
||||||
|
type = types.path;
|
||||||
|
example = "${pkgs.shibboleth-sp}/etc/shibboleth/shibboleth2.xml";
|
||||||
|
description = "Path to shibboleth config file";
|
||||||
|
};
|
||||||
|
|
||||||
|
fastcgi.enable = mkOption {
|
||||||
|
type = types.bool;
|
||||||
|
default = false;
|
||||||
|
description = "Whether to include the shibauthorizer and shibresponder FastCGI processes";
|
||||||
|
};
|
||||||
|
|
||||||
|
fastcgi.shibAuthorizerPort = mkOption {
|
||||||
|
type = types.int;
|
||||||
|
default = 9100;
|
||||||
|
description = "Port for shibauthorizer FastCGI proccess to bind to";
|
||||||
|
};
|
||||||
|
|
||||||
|
fastcgi.shibResponderPort = mkOption {
|
||||||
|
type = types.int;
|
||||||
|
default = 9101;
|
||||||
|
description = "Port for shibauthorizer FastCGI proccess to bind to";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = mkIf cfg.enable {
|
||||||
|
systemd.services.shibboleth-sp = {
|
||||||
|
description = "Provides SSO and federation for web applications";
|
||||||
|
after = lib.optionals cfg.fastcgi.enable [ "shibresponder.service" "shibauthorizer.service" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = "${pkgs.shibboleth-sp}/bin/shibd -F -d ${pkgs.shibboleth-sp} -c ${cfg.configFile}";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services.shibresponder = mkIf cfg.fastcgi.enable {
|
||||||
|
description = "Provides SSO through Shibboleth via FastCGI";
|
||||||
|
after = [ "network.target" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
path = [ "${pkgs.spawn_fcgi}" ];
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = "${pkgs.spawn_fcgi}/bin/spawn-fcgi -n -p ${toString cfg.fastcgi.shibResponderPort} ${pkgs.shibboleth-sp}/lib/shibboleth/shibresponder";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services.shibauthorizer = mkIf cfg.fastcgi.enable {
|
||||||
|
description = "Provides SSO through Shibboleth via FastCGI";
|
||||||
|
after = [ "network.target" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
path = [ "${pkgs.spawn_fcgi}" ];
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = "${pkgs.spawn_fcgi}/bin/spawn-fcgi -n -p ${toString cfg.fastcgi.shibAuthorizerPort} ${pkgs.shibboleth-sp}/lib/shibboleth/shibauthorizer";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user