2015-07-24 09:22:21 +00:00
|
|
|
{ config, pkgs, lib, ... }:
|
2016-02-14 15:43:44 +00:00
|
|
|
with config.krebs.lib;
|
2015-07-24 09:22:21 +00:00
|
|
|
let
|
|
|
|
cfg = config.krebs.retiolum;
|
|
|
|
|
|
|
|
out = {
|
|
|
|
options.krebs.retiolum = api;
|
2016-02-14 15:43:44 +00:00
|
|
|
config = lib.mkIf cfg.enable imp;
|
2015-07-24 09:22:21 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
api = {
|
|
|
|
enable = mkEnableOption "krebs.retiolum";
|
|
|
|
|
|
|
|
name = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = config.networking.hostName;
|
|
|
|
# Description stolen from tinc.conf(5).
|
|
|
|
description = ''
|
|
|
|
This is the name which identifies this tinc daemon. It must
|
|
|
|
be unique for the virtual private network this daemon will
|
|
|
|
connect to. The Name may only consist of alphanumeric and
|
|
|
|
underscore characters. If Name starts with a $, then the
|
|
|
|
contents of the environment variable that follows will be
|
|
|
|
used. In that case, invalid characters will be converted to
|
|
|
|
underscores. If Name is $HOST, but no such environment
|
|
|
|
variable exist, the hostname will be read using the
|
|
|
|
gethostnname() system call This is the name which identifies
|
|
|
|
the this tinc daemon.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2016-02-06 14:11:30 +00:00
|
|
|
netname = mkOption {
|
2015-07-24 09:22:21 +00:00
|
|
|
type = types.str;
|
|
|
|
default = "retiolum";
|
|
|
|
description = ''
|
|
|
|
The tinc network name.
|
2016-02-06 14:43:24 +00:00
|
|
|
It is used to name the TUN device and to generate the default value for
|
|
|
|
<literal>config.krebs.retiolum.hosts</literal>.
|
2015-07-24 09:22:21 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2015-12-14 13:18:08 +00:00
|
|
|
extraConfig = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "";
|
|
|
|
description = ''
|
|
|
|
Extra Configuration to be appended to tinc.conf
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2015-07-24 09:22:21 +00:00
|
|
|
tincPackage = mkOption {
|
|
|
|
type = types.package;
|
|
|
|
default = pkgs.tinc;
|
|
|
|
description = "Tincd package to use.";
|
|
|
|
};
|
|
|
|
|
|
|
|
hosts = mkOption {
|
2016-02-06 14:11:30 +00:00
|
|
|
type = with types; attrsOf host;
|
|
|
|
default =
|
|
|
|
filterAttrs (_: h: hasAttr cfg.netname h.nets) config.krebs.hosts;
|
2015-07-24 09:22:21 +00:00
|
|
|
description = ''
|
2016-02-11 22:49:45 +00:00
|
|
|
Hosts to generate <literal>config.krebs.retiolum.hostsPackage</literal>.
|
|
|
|
Note that these hosts must have a network named
|
|
|
|
<literal>config.krebs.retiolum.netname</literal>.
|
2015-07-24 09:22:21 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2016-02-11 22:16:08 +00:00
|
|
|
hostsPackage = mkOption {
|
|
|
|
type = types.package;
|
|
|
|
default = pkgs.stdenv.mkDerivation {
|
|
|
|
name = "${cfg.netname}-tinc-hosts";
|
|
|
|
phases = [ "installPhase" ];
|
|
|
|
installPhase = ''
|
|
|
|
mkdir $out
|
|
|
|
${concatStrings (mapAttrsToList (_: host: ''
|
|
|
|
echo ${shell.escape host.nets.${cfg.netname}.tinc.config} \
|
|
|
|
> $out/${shell.escape host.name}
|
|
|
|
'') cfg.hosts)}
|
|
|
|
'';
|
|
|
|
};
|
2016-02-11 22:49:45 +00:00
|
|
|
description = ''
|
|
|
|
Package of tinc host configuration files. By default, a package will
|
|
|
|
be generated from <literal>config.krebs.retiolum.hosts</literal>. This
|
|
|
|
option's main purpose is to expose the generated hosts package to other
|
|
|
|
modules, like <literal>config.krebs.tinc_graphs</literal>. But it can
|
|
|
|
also be used to provide a custom hosts directory.
|
|
|
|
'';
|
|
|
|
example = literalExample ''
|
|
|
|
(pkgs.stdenv.mkDerivation {
|
|
|
|
name = "my-tinc-hosts";
|
|
|
|
src = /home/tv/my-tinc-hosts;
|
|
|
|
installPhase = "cp -R . $out";
|
|
|
|
})
|
|
|
|
'';
|
2016-02-11 22:16:08 +00:00
|
|
|
};
|
|
|
|
|
2015-07-24 09:22:21 +00:00
|
|
|
iproutePackage = mkOption {
|
|
|
|
type = types.package;
|
|
|
|
default = pkgs.iproute;
|
|
|
|
description = "Iproute2 package to use.";
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
privateKeyFile = mkOption {
|
|
|
|
# TODO if it's types.path then it gets copied to /nix/store with
|
|
|
|
# bad unsafe permissions...
|
|
|
|
type = types.str;
|
2015-09-26 22:22:50 +00:00
|
|
|
default = toString <secrets/retiolum.rsa_key.priv>;
|
2015-07-24 12:06:48 +00:00
|
|
|
description = ''
|
|
|
|
Generate file with <literal>tincd -K</literal>.
|
|
|
|
This file must exist on the local system. The default points to
|
|
|
|
<secrets/retiolum.rsa_key.priv>.
|
|
|
|
'';
|
2015-07-24 09:22:21 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
connectTo = mkOption {
|
|
|
|
type = types.listOf types.str;
|
2016-03-11 00:33:23 +00:00
|
|
|
default = [ "fastpoke" "cd" "prism" "gum" ];
|
2015-07-24 09:22:21 +00:00
|
|
|
description = ''
|
|
|
|
The list of hosts in the network which the client will try to connect
|
|
|
|
to. These hosts should have an 'Address' configured which points to a
|
|
|
|
routeable IPv4 or IPv6 address.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
imp = {
|
2016-02-06 14:11:30 +00:00
|
|
|
environment.systemPackages = [ tinc iproute ];
|
2015-07-24 09:22:21 +00:00
|
|
|
|
|
|
|
systemd.services.retiolum = {
|
|
|
|
description = "Tinc daemon for Retiolum";
|
|
|
|
after = [ "network.target" ];
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
path = [ tinc iproute ];
|
2015-09-09 13:15:22 +00:00
|
|
|
serviceConfig = rec {
|
2015-07-24 09:22:21 +00:00
|
|
|
PermissionsStartOnly = "true";
|
|
|
|
PrivateTmp = "true";
|
|
|
|
Restart = "always";
|
|
|
|
# TODO we cannot chroot (-R) b/c we use symlinks to hosts
|
|
|
|
# and the private key.
|
|
|
|
ExecStartPre = pkgs.writeScript "retiolum-init" ''
|
|
|
|
#! /bin/sh
|
|
|
|
install -o ${user.name} -m 0400 ${cfg.privateKeyFile} /tmp/retiolum-rsa_key.priv
|
|
|
|
'';
|
2015-09-09 13:15:22 +00:00
|
|
|
ExecStart = "${tinc}/sbin/tincd -c ${confDir} -d 0 -U ${user.name} -D --pidfile=/var/run/tinc.${SyslogIdentifier}.pid";
|
2015-07-24 09:22:21 +00:00
|
|
|
SyslogIdentifier = "retiolum";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
users.extraUsers = singleton {
|
|
|
|
inherit (user) name uid;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2015-12-26 04:55:13 +00:00
|
|
|
user = rec {
|
2015-07-24 09:22:21 +00:00
|
|
|
name = "retiolum";
|
2015-12-26 04:55:13 +00:00
|
|
|
uid = genid name;
|
2015-07-24 09:22:21 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
tinc = cfg.tincPackage;
|
2015-07-24 10:41:41 +00:00
|
|
|
|
2015-07-24 09:22:21 +00:00
|
|
|
iproute = cfg.iproutePackage;
|
|
|
|
|
|
|
|
confDir = pkgs.runCommand "retiolum" {
|
|
|
|
# TODO text
|
|
|
|
executable = true;
|
|
|
|
preferLocalBuild = true;
|
|
|
|
} ''
|
|
|
|
set -euf
|
|
|
|
|
|
|
|
mkdir -p $out
|
|
|
|
|
2016-02-11 22:16:08 +00:00
|
|
|
ln -s ${cfg.hostsPackage} $out/hosts
|
2015-07-24 09:22:21 +00:00
|
|
|
|
|
|
|
cat > $out/tinc.conf <<EOF
|
|
|
|
Name = ${cfg.name}
|
|
|
|
Device = /dev/net/tun
|
2016-02-06 14:11:30 +00:00
|
|
|
Interface = ${cfg.netname}
|
2015-07-24 09:22:21 +00:00
|
|
|
${concatStrings (map (c : "ConnectTo = " + c + "\n") cfg.connectTo)}
|
|
|
|
PrivateKeyFile = /tmp/retiolum-rsa_key.priv
|
2015-12-14 13:18:08 +00:00
|
|
|
${cfg.extraConfig}
|
2015-07-24 09:22:21 +00:00
|
|
|
EOF
|
|
|
|
|
|
|
|
# source: krebscode/painload/retiolum/scripts/tinc_setup/tinc-up
|
|
|
|
cat > $out/tinc-up <<EOF
|
|
|
|
host=$out/hosts/${cfg.name}
|
|
|
|
${iproute}/sbin/ip link set \$INTERFACE up
|
|
|
|
|
|
|
|
addr4=\$(sed -n 's|^ *Subnet *= *\(10[.][^ ]*\) *$|\1|p' \$host)
|
|
|
|
if [ -n "\$addr4" ];then
|
|
|
|
${iproute}/sbin/ip -4 addr add \$addr4 dev \$INTERFACE
|
|
|
|
${iproute}/sbin/ip -4 route add 10.243.0.0/16 dev \$INTERFACE
|
|
|
|
fi
|
|
|
|
addr6=\$(sed -n 's|^ *Subnet *= *\(42[:][^ ]*\) *$|\1|p' \$host)
|
|
|
|
${iproute}/sbin/ip -6 addr add \$addr6 dev \$INTERFACE
|
|
|
|
${iproute}/sbin/ip -6 route add 42::/16 dev \$INTERFACE
|
|
|
|
EOF
|
|
|
|
|
|
|
|
chmod +x $out/tinc-up
|
|
|
|
'';
|
2015-07-24 10:41:41 +00:00
|
|
|
|
|
|
|
in out
|