oauth2_proxy module: fix manual build
This commit is contained in:
parent
589082646a
commit
c1cb5ca57e
@ -77,17 +77,12 @@ let
|
|||||||
in
|
in
|
||||||
{
|
{
|
||||||
options.services.oauth2_proxy = {
|
options.services.oauth2_proxy = {
|
||||||
enable = mkOption {
|
enable = mkEnableOption "oauth2_proxy";
|
||||||
type = types.bool;
|
|
||||||
default = false;
|
|
||||||
description = ''
|
|
||||||
Whether to run oauth2_proxy.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
package = mkOption {
|
package = mkOption {
|
||||||
type = types.package;
|
type = types.package;
|
||||||
default = pkgs.oauth2_proxy;
|
default = pkgs.oauth2_proxy;
|
||||||
|
defaultText = "pkgs.oauth2_proxy";
|
||||||
description = ''
|
description = ''
|
||||||
The package that provides oauth2_proxy.
|
The package that provides oauth2_proxy.
|
||||||
'';
|
'';
|
||||||
@ -137,8 +132,8 @@ in
|
|||||||
type = types.listOf types.str;
|
type = types.listOf types.str;
|
||||||
default = [];
|
default = [];
|
||||||
description = ''
|
description = ''
|
||||||
List of regular expressions which will bypass authentication when
|
Skip authentication for requests matching any of these regular
|
||||||
requests path's match.
|
expressions.
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -148,7 +143,8 @@ in
|
|||||||
type = types.listOf types.str;
|
type = types.listOf types.str;
|
||||||
default = [];
|
default = [];
|
||||||
description = ''
|
description = ''
|
||||||
Authenticate emails with the specified domains. Use * to authenticate any email.
|
Authenticate emails with the specified domains. Use
|
||||||
|
<literal>*</literal> to authenticate any email.
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -238,7 +234,7 @@ in
|
|||||||
Directory API, thus the service account needs to impersonate one of
|
Directory API, thus the service account needs to impersonate one of
|
||||||
those users to access the Admin SDK Directory API.
|
those users to access the Admin SDK Directory API.
|
||||||
|
|
||||||
See <link xlink="https://developers.google.com/admin-sdk/directory/v1/guides/delegation#delegate_domain-wide_authority_to_your_service_account" />
|
See <link xlink:href="https://developers.google.com/admin-sdk/directory/v1/guides/delegation#delegate_domain-wide_authority_to_your_service_account" />.
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -282,8 +278,8 @@ in
|
|||||||
upstream = mkOption {
|
upstream = mkOption {
|
||||||
type = types.commas;
|
type = types.commas;
|
||||||
description = ''
|
description = ''
|
||||||
The http url(s) of the upstream endpoint or file:// paths for static
|
The http url(s) of the upstream endpoint or <literal>file://</literal>
|
||||||
files. Routing is based on the path.
|
paths for static files. Routing is based on the path.
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -395,11 +391,9 @@ in
|
|||||||
type = types.str;
|
type = types.str;
|
||||||
default = "127.0.0.1:4180";
|
default = "127.0.0.1:4180";
|
||||||
description = ''
|
description = ''
|
||||||
[http://]<addr>:<port> or unix://<path> to listen on for HTTP clients.
|
HTTPS listening address. This module does not expose the port by
|
||||||
|
default. If you want this URL to be accessible to other machines, please
|
||||||
This module does *not* expose the port by default. If you want this URL
|
add the port to <literal>networking.firewall.allowedTCPPorts</literal>.
|
||||||
to be accessible to other machines, please add the port to
|
|
||||||
networking.firewall.allowedTCPPorts.
|
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -409,7 +403,7 @@ in
|
|||||||
default = null;
|
default = null;
|
||||||
description = ''
|
description = ''
|
||||||
Additionally authenticate against a htpasswd file. Entries must be
|
Additionally authenticate against a htpasswd file. Entries must be
|
||||||
created with "htpasswd -s" for SHA encryption.
|
created with <literal>htpasswd -s</literal> for SHA encryption.
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -434,7 +428,7 @@ in
|
|||||||
type = types.str;
|
type = types.str;
|
||||||
default = "/oauth2";
|
default = "/oauth2";
|
||||||
description = ''
|
description = ''
|
||||||
The url root path that this proxy should be nested under (e.g. /<oauth2>/sign_in);
|
The url root path that this proxy should be nested under.
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -465,10 +459,11 @@ in
|
|||||||
type = types.str;
|
type = types.str;
|
||||||
default = ":443";
|
default = ":443";
|
||||||
description = ''
|
description = ''
|
||||||
<addr>:<port> to listen on for HTTPS clients.
|
<literal>addr:port</literal> to listen on for HTTPS clients.
|
||||||
|
|
||||||
Remember to add <port> to allowedTCPPorts if you want other machines
|
Remember to add <literal>port</literal> to
|
||||||
to be able to connect to it.
|
<literal>allowedTCPPorts</literal> if you want other machines to be
|
||||||
|
able to connect to it.
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
Loading…
x
Reference in New Issue
Block a user