2016-10-20 18:54:38 +00:00
|
|
|
|
with import <stockholm/lib>;
|
2021-12-23 02:16:44 +00:00
|
|
|
|
{ config, pkgs, ... }: {
|
|
|
|
|
options.krebs.tinc = mkOption {
|
2016-07-20 08:06:04 +00:00
|
|
|
|
default = {};
|
|
|
|
|
description = ''
|
|
|
|
|
define a tinc network
|
|
|
|
|
'';
|
2017-10-03 16:40:44 +00:00
|
|
|
|
type = types.attrsOf (types.submodule (tinc: {
|
2016-07-26 12:02:04 +00:00
|
|
|
|
options = let
|
|
|
|
|
netname = tinc.config._module.args.name;
|
|
|
|
|
in {
|
2016-07-20 12:15:47 +00:00
|
|
|
|
|
2016-07-26 12:02:04 +00:00
|
|
|
|
enable = mkEnableOption "krebs.tinc.${netname}" // { default = true; };
|
2016-07-20 12:15:47 +00:00
|
|
|
|
|
2017-05-16 20:03:42 +00:00
|
|
|
|
confDir = mkOption {
|
|
|
|
|
type = types.package;
|
|
|
|
|
default = pkgs.linkFarm "${netname}-etc-tinc"
|
|
|
|
|
(mapAttrsToList (name: path: { inherit name path; }) {
|
|
|
|
|
"hosts" = tinc.config.hostsPackage;
|
|
|
|
|
"tinc.conf" = pkgs.writeText "${netname}-tinc.conf" ''
|
|
|
|
|
Name = ${tinc.config.host.name}
|
2022-03-03 09:53:25 +00:00
|
|
|
|
LogLevel = ${toString tinc.config.logLevel}
|
2017-05-16 20:03:42 +00:00
|
|
|
|
Interface = ${netname}
|
2019-01-16 10:10:34 +00:00
|
|
|
|
Broadcast = no
|
2017-05-16 20:03:42 +00:00
|
|
|
|
${concatMapStrings (c: "ConnectTo = ${c}\n") tinc.config.connectTo}
|
|
|
|
|
Port = ${toString tinc.config.host.nets.${netname}.tinc.port}
|
|
|
|
|
${tinc.config.extraConfig}
|
|
|
|
|
'';
|
2023-01-23 17:44:56 +00:00
|
|
|
|
"tinc-up" = pkgs.writeDash "${netname}-tinc-up" tinc.config.tincUp;
|
2017-05-16 20:03:42 +00:00
|
|
|
|
});
|
|
|
|
|
};
|
|
|
|
|
|
2016-07-20 08:06:04 +00:00
|
|
|
|
host = mkOption {
|
|
|
|
|
type = types.host;
|
|
|
|
|
default = config.krebs.build.host;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
netname = mkOption {
|
|
|
|
|
type = types.enum (attrNames tinc.config.host.nets);
|
2016-07-26 12:02:04 +00:00
|
|
|
|
default = netname;
|
2016-07-20 08:06:04 +00:00
|
|
|
|
description = ''
|
|
|
|
|
The tinc network name.
|
|
|
|
|
It is used to name the TUN device and to generate the default value for
|
|
|
|
|
<literal>config.krebs.tinc.retiolum.hosts</literal>.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
extraConfig = mkOption {
|
2022-01-29 22:45:55 +00:00
|
|
|
|
type = types.lines;
|
2016-07-20 08:06:04 +00:00
|
|
|
|
default = "";
|
|
|
|
|
description = ''
|
|
|
|
|
Extra Configuration to be appended to tinc.conf
|
|
|
|
|
'';
|
|
|
|
|
};
|
2016-07-26 12:02:04 +00:00
|
|
|
|
tincUp = mkOption {
|
2020-01-14 19:39:30 +00:00
|
|
|
|
type = types.str;
|
2016-07-26 12:02:04 +00:00
|
|
|
|
default = let
|
|
|
|
|
net = tinc.config.host.nets.${netname};
|
2022-03-06 09:51:05 +00:00
|
|
|
|
iproute = tinc.config.iproutePackage;
|
2023-01-23 17:24:47 +00:00
|
|
|
|
in /* sh */ ''
|
|
|
|
|
${tinc.config.iproutePackage}/sbin/ip link set ${netname} up
|
2016-07-26 12:02:04 +00:00
|
|
|
|
${optionalString (net.ip4 != null) /* sh */ ''
|
2022-03-06 09:51:05 +00:00
|
|
|
|
${iproute}/sbin/ip -4 addr add ${net.ip4.addr} dev ${netname}
|
|
|
|
|
${iproute}/sbin/ip -4 route add ${net.ip4.prefix} dev ${netname}
|
2016-07-26 12:02:04 +00:00
|
|
|
|
''}
|
|
|
|
|
${optionalString (net.ip6 != null) /* sh */ ''
|
2022-03-06 09:51:05 +00:00
|
|
|
|
${iproute}/sbin/ip -6 addr add ${net.ip6.addr} dev ${netname}
|
|
|
|
|
${iproute}/sbin/ip -6 route add ${net.ip6.prefix} dev ${netname}
|
2016-07-26 12:02:04 +00:00
|
|
|
|
''}
|
|
|
|
|
'';
|
2023-01-23 17:24:47 +00:00
|
|
|
|
defaultText = /* sh */ ''
|
|
|
|
|
ip link set ‹netname› up
|
|
|
|
|
ip -4 addr add ‹net.ip4.addr› dev ‹netname›
|
|
|
|
|
ip -4 route add ‹net.ip4.prefix› dev ‹netname›
|
|
|
|
|
ip -6 addr add ‹net.ip6.addr› dev ‹netname›
|
|
|
|
|
ip -6 route add ‹net.ip6.prefix› dev ‹netname›
|
2021-11-08 00:54:39 +00:00
|
|
|
|
'';
|
2016-07-26 12:02:04 +00:00
|
|
|
|
description = ''
|
|
|
|
|
tinc-up script to be used. Defaults to setting the
|
2021-11-08 00:54:39 +00:00
|
|
|
|
krebs.host.nets.‹netname›.ip4 and ip6 for the new ips and
|
2016-07-26 12:02:04 +00:00
|
|
|
|
configures forwarding of the respecitive netmask as subnet.
|
|
|
|
|
'';
|
|
|
|
|
};
|
2016-07-20 08:06:04 +00:00
|
|
|
|
|
|
|
|
|
tincPackage = mkOption {
|
|
|
|
|
type = types.package;
|
2021-12-21 11:08:47 +00:00
|
|
|
|
default = pkgs.tinc_pre;
|
2016-07-20 08:06:04 +00:00
|
|
|
|
description = "Tincd package to use.";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
hosts = mkOption {
|
|
|
|
|
type = with types; attrsOf host;
|
|
|
|
|
default =
|
|
|
|
|
filterAttrs (_: h: hasAttr tinc.config.netname h.nets) config.krebs.hosts;
|
2021-11-08 00:54:39 +00:00
|
|
|
|
defaultText = "‹all-hosts-of-‹netname››";
|
2016-07-20 08:06:04 +00:00
|
|
|
|
description = ''
|
2016-07-20 15:20:47 +00:00
|
|
|
|
Hosts to generate <literal>config.krebs.tinc.retiolum.hostsPackage</literal>.
|
2016-07-20 08:06:04 +00:00
|
|
|
|
Note that these hosts must have a network named
|
2016-07-20 15:20:47 +00:00
|
|
|
|
<literal>config.krebs.tinc.retiolum.netname</literal>.
|
2016-07-20 08:06:04 +00:00
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2016-10-27 20:04:21 +00:00
|
|
|
|
hostsArchive = mkOption {
|
|
|
|
|
type = types.package;
|
2020-11-19 22:36:52 +00:00
|
|
|
|
default = pkgs.runCommand "retiolum-hosts.tar.bz2" {
|
|
|
|
|
nativeBuildInputs = [ pkgs.gnutar pkgs.coreutils ];
|
|
|
|
|
} ''
|
2019-09-11 12:37:26 +00:00
|
|
|
|
cp \
|
|
|
|
|
--no-preserve=mode \
|
|
|
|
|
--recursive \
|
|
|
|
|
${tinc.config.hostsPackage} \
|
|
|
|
|
hosts
|
2020-11-19 22:36:52 +00:00
|
|
|
|
tar -cjf $out hosts
|
2016-10-27 20:04:21 +00:00
|
|
|
|
'';
|
|
|
|
|
readOnly = true;
|
|
|
|
|
};
|
|
|
|
|
|
2016-07-20 08:06:04 +00:00
|
|
|
|
hostsPackage = mkOption {
|
|
|
|
|
type = types.package;
|
2023-01-19 14:23:03 +00:00
|
|
|
|
default =
|
|
|
|
|
pkgs.write "${tinc.config.netname}-tinc-hosts"
|
|
|
|
|
(mapAttrs'
|
2023-01-19 14:38:56 +00:00
|
|
|
|
(_: host: nameValuePair "/${host.name}" {
|
2023-01-19 14:23:03 +00:00
|
|
|
|
text = host.nets.${tinc.config.netname}.tinc.config;
|
2023-01-19 14:38:56 +00:00
|
|
|
|
})
|
2023-01-19 14:23:03 +00:00
|
|
|
|
tinc.config.hosts);
|
2021-11-08 00:54:39 +00:00
|
|
|
|
defaultText = "‹netname›-tinc-hosts";
|
2016-07-20 08:06:04 +00:00
|
|
|
|
description = ''
|
|
|
|
|
Package of tinc host configuration files. By default, a package will
|
2021-11-08 00:54:39 +00:00
|
|
|
|
be generated from <literal>config.krebs.‹netname›.hosts</literal>. This
|
2016-07-20 08:06:04 +00:00
|
|
|
|
option's main purpose is to expose the generated hosts package to other
|
|
|
|
|
modules, like <literal>config.krebs.tinc_graphs</literal>. But it can
|
|
|
|
|
also be used to provide a custom hosts directory.
|
|
|
|
|
'';
|
|
|
|
|
example = literalExample ''
|
|
|
|
|
(pkgs.stdenv.mkDerivation {
|
|
|
|
|
name = "my-tinc-hosts";
|
|
|
|
|
src = /home/tv/my-tinc-hosts;
|
|
|
|
|
installPhase = "cp -R . $out";
|
|
|
|
|
})
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
iproutePackage = mkOption {
|
|
|
|
|
type = types.package;
|
2022-09-27 10:28:15 +00:00
|
|
|
|
default = pkgs.iproute2;
|
2016-07-20 08:06:04 +00:00
|
|
|
|
description = "Iproute2 package to use.";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
privkey = mkOption {
|
2021-12-23 00:12:38 +00:00
|
|
|
|
type = types.absolute-pathname;
|
|
|
|
|
default = toString <secrets> + "/${tinc.config.netname}.rsa_key.priv";
|
2021-11-08 00:54:39 +00:00
|
|
|
|
defaultText = "‹secrets/‹netname›.rsa_key.priv›";
|
2016-07-20 08:06:04 +00:00
|
|
|
|
};
|
|
|
|
|
|
2020-09-04 23:17:51 +00:00
|
|
|
|
privkey_ed25519 = mkOption {
|
2021-12-23 00:12:38 +00:00
|
|
|
|
type = types.nullOr types.absolute-pathname;
|
2020-09-04 23:17:51 +00:00
|
|
|
|
default =
|
2021-12-23 00:12:38 +00:00
|
|
|
|
if tinc.config.host.nets.${netname}.tinc.pubkey_ed25519 == null
|
|
|
|
|
then null
|
|
|
|
|
else toString <secrets> + "/${tinc.config.netname}.ed25519_key.priv";
|
2021-11-08 00:54:39 +00:00
|
|
|
|
defaultText = "‹secrets/‹netname›.ed25519_key.priv›";
|
2020-09-04 23:17:51 +00:00
|
|
|
|
};
|
|
|
|
|
|
2016-07-20 08:06:04 +00:00
|
|
|
|
connectTo = mkOption {
|
|
|
|
|
type = types.listOf types.str;
|
2021-11-08 00:54:39 +00:00
|
|
|
|
${if netname == "retiolum" then "default" else null} = [
|
2022-02-08 17:20:21 +00:00
|
|
|
|
"eve"
|
2016-11-10 22:00:04 +00:00
|
|
|
|
"ni"
|
|
|
|
|
"prism"
|
|
|
|
|
];
|
2016-07-20 08:06:04 +00:00
|
|
|
|
description = ''
|
|
|
|
|
The list of hosts in the network which the client will try to connect
|
|
|
|
|
to. These hosts should have an 'Address' configured which points to a
|
|
|
|
|
routeable IPv4 or IPv6 address.
|
|
|
|
|
|
|
|
|
|
In stockholm this can be done by configuring:
|
2021-11-08 00:54:39 +00:00
|
|
|
|
{
|
|
|
|
|
krebs.hosts.‹host›.nets.‹netname›.via.ip4.addr = external-ip;
|
|
|
|
|
krebs.hosts.‹host›.nets.‹netname›.tinc.port = 1655;
|
|
|
|
|
}
|
2016-07-20 08:06:04 +00:00
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2022-03-03 09:53:25 +00:00
|
|
|
|
logLevel = mkOption {
|
|
|
|
|
type = types.int;
|
|
|
|
|
description = ''
|
|
|
|
|
LogLevel in tinc.conf
|
|
|
|
|
'';
|
|
|
|
|
default = 3;
|
|
|
|
|
};
|
|
|
|
|
|
2023-05-15 11:31:19 +00:00
|
|
|
|
username = mkOption {
|
|
|
|
|
type = types.username;
|
|
|
|
|
default = tinc.config.netname;
|
|
|
|
|
defaultText = literalExample "netname";
|
2016-07-20 08:06:04 +00:00
|
|
|
|
};
|
2016-02-11 22:16:08 +00:00
|
|
|
|
};
|
2016-07-20 08:06:04 +00:00
|
|
|
|
}));
|
|
|
|
|
};
|
2016-07-20 12:38:59 +00:00
|
|
|
|
|
2021-12-23 02:16:44 +00:00
|
|
|
|
config = {
|
2021-12-23 02:12:02 +00:00
|
|
|
|
krebs.systemd.services = mapAttrs (netname: cfg: {
|
2022-12-29 12:44:45 +00:00
|
|
|
|
restartIfCredentialsChange = true;
|
2021-12-23 19:09:06 +00:00
|
|
|
|
}) config.krebs.tinc;
|
|
|
|
|
|
|
|
|
|
systemd.services = mapAttrs (netname: cfg: {
|
2021-12-23 02:12:02 +00:00
|
|
|
|
description = "Tinc daemon for ${netname}";
|
|
|
|
|
after = [ "network.target" ];
|
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
2022-03-06 10:35:22 +00:00
|
|
|
|
# Restart the service in a single step in order to prevent potential
|
|
|
|
|
# connection timeouts and subsequent issues while deploying via tinc.
|
|
|
|
|
stopIfChanged = false;
|
2021-12-23 02:12:02 +00:00
|
|
|
|
serviceConfig = {
|
|
|
|
|
Restart = "always";
|
2021-12-23 22:42:59 +00:00
|
|
|
|
LoadCredential = filter (x: x != "") [
|
|
|
|
|
(optionalString (cfg.privkey_ed25519 != null)
|
2022-03-06 14:55:04 +00:00
|
|
|
|
"ed25519_key.priv:${cfg.privkey_ed25519}"
|
2021-12-23 22:42:59 +00:00
|
|
|
|
)
|
2022-03-06 14:55:04 +00:00
|
|
|
|
"rsa_key.priv:${cfg.privkey}"
|
2021-12-23 22:42:59 +00:00
|
|
|
|
];
|
2023-05-15 11:31:19 +00:00
|
|
|
|
ExecStartPre = "+" + pkgs.writers.writeDash "init-tinc-${netname}" ''
|
2022-03-06 15:07:07 +00:00
|
|
|
|
set -efu
|
2022-01-02 22:21:28 +00:00
|
|
|
|
${pkgs.coreutils}/bin/mkdir -p /etc/tinc
|
2022-03-06 13:24:02 +00:00
|
|
|
|
${pkgs.rsync}/bin/rsync -Lacv --delete \
|
2023-05-15 11:31:19 +00:00
|
|
|
|
--chown ${cfg.username} \
|
2022-01-02 22:21:28 +00:00
|
|
|
|
--chmod u=rwX,g=rX \
|
2022-03-06 14:55:04 +00:00
|
|
|
|
--exclude='/*.priv' \
|
2022-01-02 22:21:28 +00:00
|
|
|
|
${cfg.confDir}/ /etc/tinc/${netname}/
|
2022-03-06 14:55:04 +00:00
|
|
|
|
${optionalString (cfg.privkey_ed25519 != null) /* sh */ ''
|
|
|
|
|
${pkgs.coreutils}/bin/ln -fns \
|
|
|
|
|
"$CREDENTIALS_DIRECTORY"/ed25519_key.priv \
|
|
|
|
|
/etc/tinc/${netname}/
|
|
|
|
|
''}
|
|
|
|
|
${pkgs.coreutils}/bin/ln -fns \
|
|
|
|
|
"$CREDENTIALS_DIRECTORY"/rsa_key.priv \
|
|
|
|
|
/etc/tinc/${netname}/
|
2022-01-02 22:21:28 +00:00
|
|
|
|
'';
|
2023-05-15 11:31:19 +00:00
|
|
|
|
ExecStart = "+" + toString [
|
2021-12-23 02:12:02 +00:00
|
|
|
|
"${cfg.tincPackage}/sbin/tincd"
|
|
|
|
|
"-D"
|
2023-05-15 11:31:19 +00:00
|
|
|
|
"-U ${cfg.username}"
|
2021-12-23 02:12:02 +00:00
|
|
|
|
"-d 0"
|
2022-03-06 14:14:21 +00:00
|
|
|
|
"-n ${netname}"
|
2021-12-23 02:12:02 +00:00
|
|
|
|
];
|
|
|
|
|
SyslogIdentifier = netname;
|
2023-05-15 11:31:19 +00:00
|
|
|
|
DynamicUser = true;
|
|
|
|
|
User = cfg.username;
|
2021-12-23 02:12:02 +00:00
|
|
|
|
};
|
|
|
|
|
}) config.krebs.tinc;
|
2016-07-20 12:15:47 +00:00
|
|
|
|
};
|
2021-12-23 02:16:44 +00:00
|
|
|
|
}
|