2020-12-02 16:45:03 +01:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
cfg = config.services.globalprotect;
|
|
|
|
|
|
|
|
execStart = if cfg.csdWrapper == null then
|
|
|
|
"${pkgs.globalprotect-openconnect}/bin/gpservice"
|
|
|
|
else
|
|
|
|
"${pkgs.globalprotect-openconnect}/bin/gpservice --csd-wrapper=${cfg.csdWrapper}";
|
|
|
|
in
|
|
|
|
|
|
|
|
{
|
|
|
|
options.services.globalprotect = {
|
|
|
|
enable = mkEnableOption "globalprotect";
|
|
|
|
|
|
|
|
csdWrapper = mkOption {
|
|
|
|
description = ''
|
|
|
|
A script that will produce a Host Integrity Protection (HIP) report,
|
|
|
|
as described at <link xlink:href="https://www.infradead.org/openconnect/hip.html" />
|
|
|
|
'';
|
|
|
|
default = null;
|
|
|
|
example = literalExample "\${pkgs.openconnect}/libexec/openconnect/hipreport.sh";
|
|
|
|
type = types.nullOr types.path;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2021-06-28 03:55:09 +02:00
|
|
|
config = mkIf cfg.enable {
|
2020-12-02 16:45:03 +01:00
|
|
|
services.dbus.packages = [ pkgs.globalprotect-openconnect ];
|
|
|
|
|
|
|
|
systemd.services.gpservice = {
|
|
|
|
description = "GlobalProtect openconnect DBus service";
|
|
|
|
serviceConfig = {
|
|
|
|
Type="dbus";
|
|
|
|
BusName="com.yuezk.qt.GPService";
|
|
|
|
ExecStart=execStart;
|
|
|
|
};
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
after = [ "network.target" ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|