Compare commits
3 Commits
c6ad8ee059
...
a77e62a2e9
Author | SHA1 | Date |
---|---|---|
Oystein Kristoffer Tveit | a77e62a2e9 | |
Oystein Kristoffer Tveit | 6a9c457ef7 | |
Oystein Kristoffer Tveit | 5378466d7f |
52
flake.nix
52
flake.nix
|
@ -53,14 +53,17 @@
|
||||||
modules = [
|
modules = [
|
||||||
./hosts/${name}/configuration.nix
|
./hosts/${name}/configuration.nix
|
||||||
sops-nix.nixosModules.sops
|
sops-nix.nixosModules.sops
|
||||||
] ++ config.modules or [];
|
];
|
||||||
|
|
||||||
pkgs = import nixpkgs {
|
pkgs = import nixpkgs {
|
||||||
inherit system;
|
inherit system;
|
||||||
overlays = [ ] ++ config.overlays or [ ];
|
overlays = [
|
||||||
|
inputs.pvv-calendar-bot.overlays.${system}.default
|
||||||
|
self.overlays.default
|
||||||
|
];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
(removeAttrs config [ "modules" "overlays" ])
|
config
|
||||||
);
|
);
|
||||||
|
|
||||||
stableNixosConfig = nixosConfig nixpkgs;
|
stableNixosConfig = nixosConfig nixpkgs;
|
||||||
|
@ -68,23 +71,19 @@
|
||||||
in {
|
in {
|
||||||
bicep = stableNixosConfig "bicep" {
|
bicep = stableNixosConfig "bicep" {
|
||||||
modules = [
|
modules = [
|
||||||
|
./hosts/bicep/configuration.nix
|
||||||
|
sops-nix.nixosModules.sops
|
||||||
|
|
||||||
inputs.matrix-next.nixosModules.default
|
inputs.matrix-next.nixosModules.default
|
||||||
inputs.pvv-calendar-bot.nixosModules.default
|
inputs.pvv-calendar-bot.nixosModules.default
|
||||||
];
|
];
|
||||||
overlays = [
|
|
||||||
inputs.pvv-calendar-bot.overlays.x86_64-linux.default
|
|
||||||
];
|
|
||||||
};
|
|
||||||
bekkalokk = stableNixosConfig "bekkalokk" {
|
|
||||||
overlays = [
|
|
||||||
(final: prev: {
|
|
||||||
heimdal = final.callPackage ./packages/heimdal { };
|
|
||||||
mediawiki-extensions = final.callPackage ./packages/mediawiki-extensions { };
|
|
||||||
})
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
|
bekkalokk = stableNixosConfig "bekkalokk" { };
|
||||||
bob = stableNixosConfig "bob" {
|
bob = stableNixosConfig "bob" {
|
||||||
modules = [
|
modules = [
|
||||||
|
./hosts/bob/configuration.nix
|
||||||
|
sops-nix.nixosModules.sops
|
||||||
|
|
||||||
disko.nixosModules.disko
|
disko.nixosModules.disko
|
||||||
{ disko.devices.disk.disk1.device = "/dev/vda"; }
|
{ disko.devices.disk.disk1.device = "/dev/vda"; }
|
||||||
];
|
];
|
||||||
|
@ -95,23 +94,38 @@
|
||||||
|
|
||||||
brzeczyszczykiewicz = stableNixosConfig "brzeczyszczykiewicz" {
|
brzeczyszczykiewicz = stableNixosConfig "brzeczyszczykiewicz" {
|
||||||
modules = [
|
modules = [
|
||||||
|
./hosts/brzeczyszczykiewicz/configuration.nix
|
||||||
|
sops-nix.nixosModules.sops
|
||||||
|
|
||||||
inputs.grzegorz.nixosModules.grzegorz-kiosk
|
inputs.grzegorz.nixosModules.grzegorz-kiosk
|
||||||
inputs.grzegorz-clients.nixosModules.grzegorz-webui
|
inputs.grzegorz-clients.nixosModules.grzegorz-webui
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
georg = stableNixosConfig "georg" {
|
georg = stableNixosConfig "georg" {
|
||||||
modules = [
|
modules = [
|
||||||
|
./hosts/georg/configuration.nix
|
||||||
|
sops-nix.nixosModules.sops
|
||||||
|
|
||||||
inputs.grzegorz.nixosModules.grzegorz-kiosk
|
inputs.grzegorz.nixosModules.grzegorz-kiosk
|
||||||
inputs.grzegorz-clients.nixosModules.grzegorz-webui
|
inputs.grzegorz-clients.nixosModules.grzegorz-webui
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
buskerud = stableNixosConfig "buskerud" { };
|
buskerud = stableNixosConfig "buskerud" {
|
||||||
|
modules = [
|
||||||
|
./hosts/buskerud/configuration.nix
|
||||||
|
sops-nix.nixosModules.sops
|
||||||
|
];
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
devShells = forAllSystems (system: {
|
devShells = forAllSystems (system: {
|
||||||
default = nixpkgs.legacyPackages.${system}.callPackage ./shell.nix { };
|
default = nixpkgs.legacyPackages.${system}.callPackage ./shell.nix { };
|
||||||
});
|
});
|
||||||
|
|
||||||
|
overlays.default = (final: prev: {
|
||||||
|
mediawiki-extensions = final.callPackage ./packages/mediawiki-extensions { };
|
||||||
|
});
|
||||||
|
|
||||||
packages = {
|
packages = {
|
||||||
"x86_64-linux" = let
|
"x86_64-linux" = let
|
||||||
pkgs = nixpkgs.legacyPackages."x86_64-linux";
|
pkgs = nixpkgs.legacyPackages."x86_64-linux";
|
||||||
|
@ -121,14 +135,6 @@
|
||||||
(nixlib.getAttrs importantMachines self.packages.x86_64-linux);
|
(nixlib.getAttrs importantMachines self.packages.x86_64-linux);
|
||||||
all-machines = pkgs.linkFarm "all-machines"
|
all-machines = pkgs.linkFarm "all-machines"
|
||||||
(nixlib.getAttrs allMachines self.packages.x86_64-linux);
|
(nixlib.getAttrs allMachines self.packages.x86_64-linux);
|
||||||
|
|
||||||
#######################
|
|
||||||
# TODO: remove this once nixos 24.05 gets released
|
|
||||||
#######################
|
|
||||||
heimdal = pkgs.callPackage ./packages/heimdal { };
|
|
||||||
|
|
||||||
simplesamlphp = pkgs.callPackage ./packages/simplesamlphp { };
|
|
||||||
|
|
||||||
mediawiki-extensions = pkgs.callPackage ./packages/mediawiki-extensions { };
|
mediawiki-extensions = pkgs.callPackage ./packages/mediawiki-extensions { };
|
||||||
} // nixlib.genAttrs allMachines
|
} // nixlib.genAttrs allMachines
|
||||||
(machine: self.nixosConfigurations.${machine}.config.system.build.toplevel);
|
(machine: self.nixosConfigurations.${machine}.config.system.build.toplevel);
|
||||||
|
|
|
@ -12,7 +12,6 @@
|
||||||
# ./services/website.nix
|
# ./services/website.nix
|
||||||
./services/nginx
|
./services/nginx
|
||||||
./services/gitea/default.nix
|
./services/gitea/default.nix
|
||||||
./services/kerberos
|
|
||||||
./services/webmail
|
./services/webmail
|
||||||
./services/mediawiki
|
./services/mediawiki
|
||||||
];
|
];
|
||||||
|
|
|
@ -1,27 +0,0 @@
|
||||||
{ config, pkgs, lib, ... }:
|
|
||||||
{
|
|
||||||
#######################
|
|
||||||
# TODO: remove these once nixos 24.05 gets released
|
|
||||||
#######################
|
|
||||||
imports = [
|
|
||||||
./krb5.nix
|
|
||||||
./pam.nix
|
|
||||||
];
|
|
||||||
disabledModules = [
|
|
||||||
"config/krb5/default.nix"
|
|
||||||
"security/pam.nix"
|
|
||||||
];
|
|
||||||
#######################
|
|
||||||
|
|
||||||
security.krb5 = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
libdefaults = {
|
|
||||||
default_realm = "PVV.NTNU.NO";
|
|
||||||
dns_lookup_realm = "yes";
|
|
||||||
dns_lookup_kdc = "yes";
|
|
||||||
};
|
|
||||||
realms."PVV.NTNU.NO".admin_server = "kdc.pvv.ntnu.no";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,88 +0,0 @@
|
||||||
{ pkgs, lib, ... }:
|
|
||||||
|
|
||||||
# Based on
|
|
||||||
# - https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/krb5_conf.html
|
|
||||||
# - https://manpages.debian.org/unstable/heimdal-docs/krb5.conf.5heimdal.en.html
|
|
||||||
|
|
||||||
let
|
|
||||||
inherit (lib) boolToString concatMapStringsSep concatStringsSep filter
|
|
||||||
isAttrs isBool isList mapAttrsToList mdDoc mkOption singleton splitString;
|
|
||||||
inherit (lib.types) attrsOf bool coercedTo either int listOf oneOf path
|
|
||||||
str submodule;
|
|
||||||
in
|
|
||||||
{ }: {
|
|
||||||
type = let
|
|
||||||
section = attrsOf relation;
|
|
||||||
relation = either (attrsOf value) value;
|
|
||||||
value = either (listOf atom) atom;
|
|
||||||
atom = oneOf [int str bool];
|
|
||||||
in submodule {
|
|
||||||
freeformType = attrsOf section;
|
|
||||||
options = {
|
|
||||||
include = mkOption {
|
|
||||||
default = [ ];
|
|
||||||
description = mdDoc ''
|
|
||||||
Files to include in the Kerberos configuration.
|
|
||||||
'';
|
|
||||||
type = coercedTo path singleton (listOf path);
|
|
||||||
};
|
|
||||||
includedir = mkOption {
|
|
||||||
default = [ ];
|
|
||||||
description = mdDoc ''
|
|
||||||
Directories containing files to include in the Kerberos configuration.
|
|
||||||
'';
|
|
||||||
type = coercedTo path singleton (listOf path);
|
|
||||||
};
|
|
||||||
module = mkOption {
|
|
||||||
default = [ ];
|
|
||||||
description = mdDoc ''
|
|
||||||
Modules to obtain Kerberos configuration from.
|
|
||||||
'';
|
|
||||||
type = coercedTo path singleton (listOf path);
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
generate = let
|
|
||||||
indent = str: concatMapStringsSep "\n" (line: " " + line) (splitString "\n" str);
|
|
||||||
|
|
||||||
formatToplevel = args @ {
|
|
||||||
include ? [ ],
|
|
||||||
includedir ? [ ],
|
|
||||||
module ? [ ],
|
|
||||||
...
|
|
||||||
}: let
|
|
||||||
sections = removeAttrs args [ "include" "includedir" "module" ];
|
|
||||||
in concatStringsSep "\n" (filter (x: x != "") [
|
|
||||||
(concatStringsSep "\n" (mapAttrsToList formatSection sections))
|
|
||||||
(concatMapStringsSep "\n" (m: "module ${m}") module)
|
|
||||||
(concatMapStringsSep "\n" (i: "include ${i}") include)
|
|
||||||
(concatMapStringsSep "\n" (i: "includedir ${i}") includedir)
|
|
||||||
]);
|
|
||||||
|
|
||||||
formatSection = name: section: ''
|
|
||||||
[${name}]
|
|
||||||
${indent (concatStringsSep "\n" (mapAttrsToList formatRelation section))}
|
|
||||||
'';
|
|
||||||
|
|
||||||
formatRelation = name: relation:
|
|
||||||
if isAttrs relation
|
|
||||||
then ''
|
|
||||||
${name} = {
|
|
||||||
${indent (concatStringsSep "\n" (mapAttrsToList formatValue relation))}
|
|
||||||
}''
|
|
||||||
else formatValue name relation;
|
|
||||||
|
|
||||||
formatValue = name: value:
|
|
||||||
if isList value
|
|
||||||
then concatMapStringsSep "\n" (formatAtom name) value
|
|
||||||
else formatAtom name value;
|
|
||||||
|
|
||||||
formatAtom = name: atom: let
|
|
||||||
v = if isBool atom then boolToString atom else toString atom;
|
|
||||||
in "${name} = ${v}";
|
|
||||||
in
|
|
||||||
name: value: pkgs.writeText name ''
|
|
||||||
${formatToplevel value}
|
|
||||||
'';
|
|
||||||
}
|
|
|
@ -1,90 +0,0 @@
|
||||||
{ config, lib, pkgs, ... }:
|
|
||||||
let
|
|
||||||
inherit (lib) mdDoc mkIf mkOption mkPackageOption mkRemovedOptionModule;
|
|
||||||
inherit (lib.types) bool;
|
|
||||||
|
|
||||||
mkRemovedOptionModule' = name: reason: mkRemovedOptionModule ["krb5" name] reason;
|
|
||||||
mkRemovedOptionModuleCfg = name: mkRemovedOptionModule' name ''
|
|
||||||
The option `krb5.${name}' has been removed. Use
|
|
||||||
`security.krb5.settings.${name}' for structured configuration.
|
|
||||||
'';
|
|
||||||
|
|
||||||
cfg = config.security.krb5;
|
|
||||||
format = import ./krb5-conf-format.nix { inherit pkgs lib; } { };
|
|
||||||
in {
|
|
||||||
imports = [
|
|
||||||
(mkRemovedOptionModuleCfg "libdefaults")
|
|
||||||
(mkRemovedOptionModuleCfg "realms")
|
|
||||||
(mkRemovedOptionModuleCfg "domain_realm")
|
|
||||||
(mkRemovedOptionModuleCfg "capaths")
|
|
||||||
(mkRemovedOptionModuleCfg "appdefaults")
|
|
||||||
(mkRemovedOptionModuleCfg "plugins")
|
|
||||||
(mkRemovedOptionModuleCfg "config")
|
|
||||||
(mkRemovedOptionModuleCfg "extraConfig")
|
|
||||||
(mkRemovedOptionModule' "kerberos" ''
|
|
||||||
The option `krb5.kerberos' has been moved to `security.krb5.package'.
|
|
||||||
'')
|
|
||||||
];
|
|
||||||
|
|
||||||
options = {
|
|
||||||
security.krb5 = {
|
|
||||||
enable = mkOption {
|
|
||||||
default = false;
|
|
||||||
description = mdDoc "Enable and configure Kerberos utilities";
|
|
||||||
type = bool;
|
|
||||||
};
|
|
||||||
|
|
||||||
package = mkPackageOption pkgs "krb5" {
|
|
||||||
example = "heimdal";
|
|
||||||
};
|
|
||||||
|
|
||||||
settings = mkOption {
|
|
||||||
default = { };
|
|
||||||
type = format.type;
|
|
||||||
description = mdDoc ''
|
|
||||||
Structured contents of the {file}`krb5.conf` file. See
|
|
||||||
{manpage}`krb5.conf(5)` for details about configuration.
|
|
||||||
'';
|
|
||||||
example = {
|
|
||||||
include = [ "/run/secrets/secret-krb5.conf" ];
|
|
||||||
includedir = [ "/run/secrets/secret-krb5.conf.d" ];
|
|
||||||
|
|
||||||
libdefaults = {
|
|
||||||
default_realm = "ATHENA.MIT.EDU";
|
|
||||||
};
|
|
||||||
|
|
||||||
realms = {
|
|
||||||
"ATHENA.MIT.EDU" = {
|
|
||||||
admin_server = "athena.mit.edu";
|
|
||||||
kdc = [
|
|
||||||
"athena01.mit.edu"
|
|
||||||
"athena02.mit.edu"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
domain_realm = {
|
|
||||||
"mit.edu" = "ATHENA.MIT.EDU";
|
|
||||||
};
|
|
||||||
|
|
||||||
logging = {
|
|
||||||
kdc = "SYSLOG:NOTICE";
|
|
||||||
admin_server = "SYSLOG:NOTICE";
|
|
||||||
default = "SYSLOG:NOTICE";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
environment = {
|
|
||||||
systemPackages = [ cfg.package ];
|
|
||||||
etc."krb5.conf".source = format.generate "krb5.conf" cfg.settings;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
meta.maintainers = builtins.attrValues {
|
|
||||||
inherit (lib.maintainers) dblsaiko h7x4;
|
|
||||||
};
|
|
||||||
}
|
|
File diff suppressed because it is too large
Load Diff
|
@ -1,4 +1,4 @@
|
||||||
{ pkgs, lib, config, values, pkgs-unstable, ... }: let
|
{ pkgs, lib, config, values, ... }: let
|
||||||
cfg = config.services.mediawiki;
|
cfg = config.services.mediawiki;
|
||||||
|
|
||||||
# "mediawiki"
|
# "mediawiki"
|
||||||
|
|
|
@ -1,178 +0,0 @@
|
||||||
{ lib
|
|
||||||
, stdenv
|
|
||||||
, fetchFromGitHub
|
|
||||||
, autoreconfHook
|
|
||||||
, pkg-config
|
|
||||||
, python3
|
|
||||||
, perl
|
|
||||||
, bison
|
|
||||||
, flex
|
|
||||||
, texinfo
|
|
||||||
, perlPackages
|
|
||||||
|
|
||||||
, openldap
|
|
||||||
, libcap_ng
|
|
||||||
, sqlite
|
|
||||||
, openssl
|
|
||||||
, db
|
|
||||||
, libedit
|
|
||||||
, pam
|
|
||||||
, krb5
|
|
||||||
, libmicrohttpd
|
|
||||||
, cjson
|
|
||||||
|
|
||||||
, CoreFoundation
|
|
||||||
, Security
|
|
||||||
, SystemConfiguration
|
|
||||||
|
|
||||||
, curl
|
|
||||||
, jdk
|
|
||||||
, unzip
|
|
||||||
, which
|
|
||||||
|
|
||||||
, nixosTests
|
|
||||||
|
|
||||||
, withCJSON ? true
|
|
||||||
, withCapNG ? stdenv.isLinux
|
|
||||||
# libmicrohttpd should theoretically work for darwin as well, but something is broken.
|
|
||||||
# It affects tests check-bx509d and check-httpkadmind.
|
|
||||||
, withMicroHTTPD ? stdenv.isLinux
|
|
||||||
, withOpenLDAP ? true
|
|
||||||
, withOpenLDAPAsHDBModule ? false
|
|
||||||
, withOpenSSL ? true
|
|
||||||
, withSQLite3 ? true
|
|
||||||
}:
|
|
||||||
|
|
||||||
assert lib.assertMsg (withOpenLDAPAsHDBModule -> withOpenLDAP) ''
|
|
||||||
OpenLDAP needs to be enabled in order to build the OpenLDAP HDB Module.
|
|
||||||
'';
|
|
||||||
|
|
||||||
stdenv.mkDerivation {
|
|
||||||
pname = "heimdal";
|
|
||||||
version = "7.8.0-unstable-2023-11-29";
|
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "heimdal";
|
|
||||||
repo = "heimdal";
|
|
||||||
rev = "3253c49544eacb33d5ad2f6f919b0696e5aab794";
|
|
||||||
hash = "sha256-uljzQBzXrZCZjcIWfioqHN8YsbUUNy14Vo+A3vZIXzM=";
|
|
||||||
};
|
|
||||||
|
|
||||||
outputs = [ "out" "dev" "man" "info" ];
|
|
||||||
|
|
||||||
nativeBuildInputs = [
|
|
||||||
autoreconfHook
|
|
||||||
pkg-config
|
|
||||||
python3
|
|
||||||
perl
|
|
||||||
bison
|
|
||||||
flex
|
|
||||||
texinfo
|
|
||||||
]
|
|
||||||
++ (with perlPackages; [ JSON ]);
|
|
||||||
|
|
||||||
buildInputs = [ db libedit pam ]
|
|
||||||
++ lib.optionals (stdenv.isDarwin) [ CoreFoundation Security SystemConfiguration ]
|
|
||||||
++ lib.optionals (withCJSON) [ cjson ]
|
|
||||||
++ lib.optionals (withCapNG) [ libcap_ng ]
|
|
||||||
++ lib.optionals (withMicroHTTPD) [ libmicrohttpd ]
|
|
||||||
++ lib.optionals (withOpenLDAP) [ openldap ]
|
|
||||||
++ lib.optionals (withOpenSSL) [ openssl ]
|
|
||||||
++ lib.optionals (withSQLite3) [ sqlite ];
|
|
||||||
|
|
||||||
doCheck = true;
|
|
||||||
nativeCheckInputs = [
|
|
||||||
curl
|
|
||||||
jdk
|
|
||||||
unzip
|
|
||||||
which
|
|
||||||
];
|
|
||||||
|
|
||||||
configureFlags = [
|
|
||||||
"--with-libedit-include=${libedit.dev}/include"
|
|
||||||
"--with-libedit-lib=${libedit}/lib"
|
|
||||||
"--with-berkeley-db-include=${db.dev}/include"
|
|
||||||
"--with-berkeley-db"
|
|
||||||
|
|
||||||
"--without-x"
|
|
||||||
"--disable-afs-string-to-key"
|
|
||||||
] ++ lib.optionals (withCapNG) [
|
|
||||||
"--with-capng"
|
|
||||||
] ++ lib.optionals (withCJSON) [
|
|
||||||
"--with-cjson=${cjson}"
|
|
||||||
] ++ lib.optionals (withOpenLDAP) [
|
|
||||||
"--with-openldap=${openldap.dev}"
|
|
||||||
] ++ lib.optionals (withOpenLDAPAsHDBModule) [
|
|
||||||
"--enable-hdb-openldap-module"
|
|
||||||
] ++ lib.optionals (withSQLite3) [
|
|
||||||
"--with-sqlite3=${sqlite.dev}"
|
|
||||||
];
|
|
||||||
|
|
||||||
# (check-ldap) slapd resides within ${openldap}/libexec,
|
|
||||||
# which is not part of $PATH by default.
|
|
||||||
# (check-ldap) prepending ${openldap}/bin to the path to avoid
|
|
||||||
# using the default installation of openldap on unsandboxed darwin systems,
|
|
||||||
# which does not support the new mdb backend at the moment (2024-01-13).
|
|
||||||
# (check-ldap) the bdb backend got deprecated in favour of mdb in openldap 2.5.0,
|
|
||||||
# but the heimdal tests still seem to expect bdb as the openldap backend.
|
|
||||||
# This might be fixed upstream in a future update.
|
|
||||||
patchPhase = ''
|
|
||||||
runHook prePatch
|
|
||||||
|
|
||||||
substituteInPlace tests/ldap/slapd-init.in \
|
|
||||||
--replace 'SCHEMA_PATHS="' 'SCHEMA_PATHS="${openldap}/etc/schema '
|
|
||||||
substituteInPlace tests/ldap/check-ldap.in \
|
|
||||||
--replace 'PATH=' 'PATH=${openldap}/libexec:${openldap}/bin:'
|
|
||||||
substituteInPlace tests/ldap/slapd.conf \
|
|
||||||
--replace 'database bdb' 'database mdb'
|
|
||||||
|
|
||||||
runHook postPatch
|
|
||||||
'';
|
|
||||||
|
|
||||||
# (test_cc) heimdal uses librokens implementation of `secure_getenv` on darwin,
|
|
||||||
# which expects either USER or LOGNAME to be set.
|
|
||||||
preCheck = lib.optionalString (stdenv.isDarwin) ''
|
|
||||||
export USER=nix-builder
|
|
||||||
'';
|
|
||||||
|
|
||||||
# We need to build hcrypt for applications like samba
|
|
||||||
postBuild = ''
|
|
||||||
(cd include/hcrypto; make -j $NIX_BUILD_CORES)
|
|
||||||
(cd lib/hcrypto; make -j $NIX_BUILD_CORES)
|
|
||||||
'';
|
|
||||||
|
|
||||||
postInstall = ''
|
|
||||||
# Install hcrypto
|
|
||||||
(cd include/hcrypto; make -j $NIX_BUILD_CORES install)
|
|
||||||
(cd lib/hcrypto; make -j $NIX_BUILD_CORES install)
|
|
||||||
|
|
||||||
mkdir -p $dev/bin
|
|
||||||
mv $out/bin/krb5-config $dev/bin/
|
|
||||||
|
|
||||||
# asn1 compilers, move them to $dev
|
|
||||||
mv $out/libexec/heimdal/* $dev/bin
|
|
||||||
rmdir $out/libexec/heimdal
|
|
||||||
|
|
||||||
# compile_et is needed for cross-compiling this package and samba
|
|
||||||
mv lib/com_err/.libs/compile_et $dev/bin
|
|
||||||
'';
|
|
||||||
|
|
||||||
# Issues with hydra
|
|
||||||
# In file included from hxtool.c:34:0:
|
|
||||||
# hx_locl.h:67:25: fatal error: pkcs10_asn1.h: No such file or directory
|
|
||||||
#enableParallelBuilding = true;
|
|
||||||
|
|
||||||
passthru = {
|
|
||||||
implementation = "heimdal";
|
|
||||||
tests.nixos = nixosTests.kerberos.heimdal;
|
|
||||||
};
|
|
||||||
|
|
||||||
meta = with lib; {
|
|
||||||
homepage = "https://www.heimdal.software";
|
|
||||||
changelog = "https://github.com/heimdal/heimdal/releases";
|
|
||||||
description = "An implementation of Kerberos 5 (and some more stuff)";
|
|
||||||
license = licenses.bsd3;
|
|
||||||
platforms = platforms.unix;
|
|
||||||
maintainers = with maintainers; [ h7x4 ];
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,36 +0,0 @@
|
||||||
{ php
|
|
||||||
, writeText
|
|
||||||
, fetchFromGitHub
|
|
||||||
, configFile ? "config/config.php.dist"
|
|
||||||
, authsourcesFile ? "config/authsources.php.dist"
|
|
||||||
, saml20-idp-remoteFile ? writeText "saml20-idp-remote.php" "<?php ?>"
|
|
||||||
}:
|
|
||||||
|
|
||||||
php.buildComposerProject rec {
|
|
||||||
pname = "simplesamlphp";
|
|
||||||
version = "2.2.1";
|
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "simplesamlphp";
|
|
||||||
repo = "simplesamlphp";
|
|
||||||
rev = "v${version}";
|
|
||||||
hash = "sha256-jo7xma60M4VZgeDgyFumvJp1Sm+RP4XaugDkttQVB+k=";
|
|
||||||
};
|
|
||||||
|
|
||||||
composerStrictValidation = false;
|
|
||||||
|
|
||||||
vendorHash = "sha256-n6lJ/Fb6xI124PkKJMbJBDiuISlukWQcHl043uHoBb4=";
|
|
||||||
|
|
||||||
# TODO: metadata could be fetched automagically with these:
|
|
||||||
# - https://simplesamlphp.org/docs/contrib_modules/metarefresh/simplesamlphp-automated_metadata.html
|
|
||||||
# - https://idp.pvv.ntnu.no/simplesaml/saml2/idp/metadata.php
|
|
||||||
postPatch = ''
|
|
||||||
install -Dm444 "${configFile}" "config/config.php"
|
|
||||||
install -Dm444 "${authsourcesFile}" "config/authsources.php"
|
|
||||||
install -Dm444 "${saml20-idp-remoteFile}" "metadata/saml20-idp-remote.php"
|
|
||||||
'';
|
|
||||||
|
|
||||||
postInstall = ''
|
|
||||||
ln -sr $out/share/php/simplesamlphp/vendor/simplesamlphp/simplesamlphp-assets-base $out/share/php/simplesamlphp/public/assets/base
|
|
||||||
'';
|
|
||||||
}
|
|
Loading…
Reference in New Issue