2009-05-28 12:43:54 +00:00
|
|
|
|
# /etc files related to networking, such as /etc/services.
|
|
|
|
|
|
2014-04-14 14:26:48 +00:00
|
|
|
|
{ config, lib, pkgs, ... }:
|
2009-05-28 12:43:54 +00:00
|
|
|
|
|
2014-04-14 14:26:48 +00:00
|
|
|
|
with lib;
|
2012-10-19 19:41:01 +00:00
|
|
|
|
|
2009-05-28 12:43:54 +00:00
|
|
|
|
let
|
2012-10-19 19:41:01 +00:00
|
|
|
|
|
2011-11-09 21:02:01 +00:00
|
|
|
|
cfg = config.networking;
|
2014-07-02 22:59:35 +00:00
|
|
|
|
dnsmasqResolve = config.services.dnsmasq.enable &&
|
|
|
|
|
config.services.dnsmasq.resolveLocalQueries;
|
|
|
|
|
hasLocalResolver = config.services.bind.enable || dnsmasqResolve;
|
2009-05-28 12:43:54 +00:00
|
|
|
|
|
2013-09-04 11:05:09 +00:00
|
|
|
|
in
|
|
|
|
|
|
|
|
|
|
{
|
|
|
|
|
|
2009-05-28 12:43:54 +00:00
|
|
|
|
options = {
|
|
|
|
|
|
2014-05-05 18:58:51 +00:00
|
|
|
|
networking.extraHosts = lib.mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
|
type = types.lines;
|
2009-05-28 12:43:54 +00:00
|
|
|
|
default = "";
|
|
|
|
|
example = "192.168.0.1 lanlocalhost";
|
|
|
|
|
description = ''
|
|
|
|
|
Additional entries to be appended to <filename>/etc/hosts</filename>.
|
|
|
|
|
'';
|
|
|
|
|
};
|
2011-09-14 18:20:50 +00:00
|
|
|
|
|
2014-05-05 18:58:51 +00:00
|
|
|
|
networking.dnsSingleRequest = lib.mkOption {
|
2013-10-30 16:37:45 +00:00
|
|
|
|
type = types.bool;
|
2012-10-22 04:46:05 +00:00
|
|
|
|
default = false;
|
|
|
|
|
description = ''
|
|
|
|
|
Recent versions of glibc will issue both ipv4 (A) and ipv6 (AAAA)
|
|
|
|
|
address queries at the same time, from the same port. Sometimes upstream
|
|
|
|
|
routers will systemically drop the ipv4 queries. The symptom of this problem is
|
|
|
|
|
that 'getent hosts example.com' only returns ipv6 (or perhaps only ipv4) addresses. The
|
|
|
|
|
workaround for this is to specify the option 'single-request' in
|
2013-05-04 09:26:56 +00:00
|
|
|
|
/etc/resolv.conf. This option enables that.
|
2012-10-22 04:46:05 +00:00
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2015-09-21 21:39:03 +00:00
|
|
|
|
networking.extraResolvconfConf = lib.mkOption {
|
|
|
|
|
type = types.lines;
|
|
|
|
|
default = "";
|
|
|
|
|
example = "libc=NO";
|
|
|
|
|
description = ''
|
|
|
|
|
Extra configuration to append to <filename>resolvconf.conf</filename>.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
2014-11-19 19:13:54 +00:00
|
|
|
|
networking.proxy = {
|
|
|
|
|
|
|
|
|
|
default = lib.mkOption {
|
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
|
default = null;
|
|
|
|
|
description = ''
|
|
|
|
|
This option specifies the default value for httpProxy, httpsProxy, ftpProxy and rsyncProxy.
|
|
|
|
|
'';
|
|
|
|
|
example = "http://127.0.0.1:3128";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
httpProxy = lib.mkOption {
|
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
|
default = cfg.proxy.default;
|
|
|
|
|
description = ''
|
|
|
|
|
This option specifies the http_proxy environment variable.
|
|
|
|
|
'';
|
|
|
|
|
example = "http://127.0.0.1:3128";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
httpsProxy = lib.mkOption {
|
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
|
default = cfg.proxy.default;
|
|
|
|
|
description = ''
|
|
|
|
|
This option specifies the https_proxy environment variable.
|
|
|
|
|
'';
|
|
|
|
|
example = "http://127.0.0.1:3128";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
ftpProxy = lib.mkOption {
|
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
|
default = cfg.proxy.default;
|
|
|
|
|
description = ''
|
|
|
|
|
This option specifies the ftp_proxy environment variable.
|
|
|
|
|
'';
|
|
|
|
|
example = "http://127.0.0.1:3128";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
rsyncProxy = lib.mkOption {
|
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
|
default = cfg.proxy.default;
|
|
|
|
|
description = ''
|
|
|
|
|
This option specifies the rsync_proxy environment variable.
|
|
|
|
|
'';
|
|
|
|
|
example = "http://127.0.0.1:3128";
|
|
|
|
|
};
|
|
|
|
|
|
2015-12-11 08:17:06 +00:00
|
|
|
|
allProxy = lib.mkOption {
|
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
|
default = cfg.proxy.default;
|
|
|
|
|
description = ''
|
|
|
|
|
This option specifies the all_proxy environment variable.
|
|
|
|
|
'';
|
|
|
|
|
example = "http://127.0.0.1:3128";
|
|
|
|
|
};
|
|
|
|
|
|
2014-11-19 19:13:54 +00:00
|
|
|
|
noProxy = lib.mkOption {
|
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
|
default = null;
|
|
|
|
|
description = ''
|
|
|
|
|
This option specifies the no_proxy environment variable.
|
|
|
|
|
If a default proxy is used and noProxy is null,
|
|
|
|
|
then noProxy will be set to 127.0.0.1,localhost.
|
|
|
|
|
'';
|
|
|
|
|
example = "127.0.0.1,localhost,.localdomain";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
envVars = lib.mkOption {
|
|
|
|
|
type = types.attrs;
|
|
|
|
|
internal = true;
|
|
|
|
|
default = {};
|
|
|
|
|
description = ''
|
|
|
|
|
Environment variables used for the network proxy.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
};
|
2009-05-28 12:43:54 +00:00
|
|
|
|
};
|
|
|
|
|
|
2013-09-04 11:05:09 +00:00
|
|
|
|
config = {
|
2009-05-28 12:43:54 +00:00
|
|
|
|
|
2013-09-04 11:05:09 +00:00
|
|
|
|
environment.etc =
|
|
|
|
|
{ # /etc/services: TCP/UDP port assignments.
|
|
|
|
|
"services".source = pkgs.iana_etc + "/etc/services";
|
|
|
|
|
|
|
|
|
|
# /etc/protocols: IP protocol numbers.
|
|
|
|
|
"protocols".source = pkgs.iana_etc + "/etc/protocols";
|
|
|
|
|
|
|
|
|
|
# /etc/rpc: RPC program numbers.
|
|
|
|
|
"rpc".source = pkgs.glibc + "/etc/rpc";
|
|
|
|
|
|
|
|
|
|
# /etc/hosts: Hostname-to-IP mappings.
|
|
|
|
|
"hosts".text =
|
2012-03-01 14:46:47 +00:00
|
|
|
|
''
|
2013-09-04 11:05:09 +00:00
|
|
|
|
127.0.0.1 localhost
|
|
|
|
|
${optionalString cfg.enableIPv6 ''
|
|
|
|
|
::1 localhost
|
|
|
|
|
''}
|
|
|
|
|
${cfg.extraHosts}
|
2013-02-03 13:12:49 +00:00
|
|
|
|
'';
|
2014-11-23 11:04:02 +00:00
|
|
|
|
|
2013-09-04 11:05:09 +00:00
|
|
|
|
# /etc/resolvconf.conf: Configuration for openresolv.
|
|
|
|
|
"resolvconf.conf".text =
|
|
|
|
|
''
|
|
|
|
|
# This is the default, but we must set it here to prevent
|
|
|
|
|
# a collision with an apparently unrelated environment
|
|
|
|
|
# variable with the same name exported by dhcpcd.
|
|
|
|
|
interface_order='lo lo[0-9]*'
|
|
|
|
|
'' + optionalString config.services.nscd.enable ''
|
|
|
|
|
# Invalidate the nscd cache whenever resolv.conf is
|
|
|
|
|
# regenerated.
|
2014-12-11 08:55:58 +00:00
|
|
|
|
libc_restart='${pkgs.systemd}/bin/systemctl try-restart --no-block nscd.service 2> /dev/null'
|
2013-09-04 11:05:09 +00:00
|
|
|
|
'' + optionalString cfg.dnsSingleRequest ''
|
|
|
|
|
# only send one DNS request at a time
|
|
|
|
|
resolv_conf_options='single-request'
|
2014-07-02 22:59:35 +00:00
|
|
|
|
'' + optionalString hasLocalResolver ''
|
2013-09-04 11:05:09 +00:00
|
|
|
|
# This hosts runs a full-blown DNS resolver.
|
|
|
|
|
name_servers='127.0.0.1'
|
2014-07-02 22:59:35 +00:00
|
|
|
|
'' + optionalString dnsmasqResolve ''
|
|
|
|
|
dnsmasq_conf=/etc/dnsmasq-conf.conf
|
|
|
|
|
dnsmasq_resolv=/etc/dnsmasq-resolv.conf
|
2015-09-21 21:39:03 +00:00
|
|
|
|
'' + cfg.extraResolvconfConf + ''
|
2013-09-04 11:05:09 +00:00
|
|
|
|
'';
|
2014-11-23 11:04:02 +00:00
|
|
|
|
|
|
|
|
|
} // (optionalAttrs config.services.resolved.enable (
|
|
|
|
|
if dnsmasqResolve then {
|
|
|
|
|
"dnsmasq-resolv.conf".source = "/run/systemd/resolve/resolv.conf";
|
|
|
|
|
} else {
|
|
|
|
|
"resolv.conf".source = "/run/systemd/resolve/resolv.conf";
|
|
|
|
|
}
|
|
|
|
|
));
|
2013-09-04 11:05:09 +00:00
|
|
|
|
|
2014-11-19 19:13:54 +00:00
|
|
|
|
networking.proxy.envVars =
|
|
|
|
|
optionalAttrs (cfg.proxy.default != null) {
|
|
|
|
|
# other options already fallback to proxy.default
|
|
|
|
|
no_proxy = "127.0.0.1,localhost";
|
|
|
|
|
} // optionalAttrs (cfg.proxy.httpProxy != null) {
|
|
|
|
|
http_proxy = cfg.proxy.httpProxy;
|
|
|
|
|
} // optionalAttrs (cfg.proxy.httpsProxy != null) {
|
|
|
|
|
https_proxy = cfg.proxy.httpsProxy;
|
|
|
|
|
} // optionalAttrs (cfg.proxy.rsyncProxy != null) {
|
|
|
|
|
rsync_proxy = cfg.proxy.rsyncProxy;
|
|
|
|
|
} // optionalAttrs (cfg.proxy.ftpProxy != null) {
|
|
|
|
|
ftp_proxy = cfg.proxy.ftpProxy;
|
2015-12-11 08:17:06 +00:00
|
|
|
|
} // optionalAttrs (cfg.proxy.allProxy != null) {
|
|
|
|
|
all_proxy = cfg.proxy.allProxy;
|
2014-11-19 19:13:54 +00:00
|
|
|
|
} // optionalAttrs (cfg.proxy.noProxy != null) {
|
|
|
|
|
no_proxy = cfg.proxy.noProxy;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
# Install the proxy environment variables
|
2014-11-30 13:48:41 +00:00
|
|
|
|
environment.sessionVariables = cfg.proxy.envVars;
|
2014-11-19 19:13:54 +00:00
|
|
|
|
|
2013-09-04 11:05:09 +00:00
|
|
|
|
# The ‘ip-up’ target is started when we have IP connectivity. So
|
|
|
|
|
# services that depend on IP connectivity (like ntpd) should be
|
|
|
|
|
# pulled in by this target.
|
|
|
|
|
systemd.targets.ip-up.description = "Services Requiring IP Connectivity";
|
|
|
|
|
|
2014-11-24 08:50:26 +00:00
|
|
|
|
# This is needed when /etc/resolv.conf is being overriden by networkd
|
|
|
|
|
# and other configurations. If the file is destroyed by an environment
|
|
|
|
|
# activation then it must be rebuilt so that applications which interface
|
|
|
|
|
# with /etc/resolv.conf directly don't break.
|
|
|
|
|
system.activationScripts.resolvconf = stringAfter [ "etc" "tmpfs" "var" ]
|
|
|
|
|
''
|
|
|
|
|
# Systemd resolved controls its own resolv.conf
|
|
|
|
|
rm -f /run/resolvconf/interfaces/systemd
|
|
|
|
|
${optionalString config.services.resolved.enable ''
|
|
|
|
|
rm -rf /run/resolvconf/interfaces
|
|
|
|
|
mkdir -p /run/resolvconf/interfaces
|
|
|
|
|
ln -s /run/systemd/resolve/resolv.conf /run/resolvconf/interfaces/systemd
|
|
|
|
|
''}
|
|
|
|
|
|
2014-11-26 19:19:31 +00:00
|
|
|
|
# Make sure resolv.conf is up to date if not managed by systemd
|
|
|
|
|
${optionalString (!config.services.resolved.enable) ''
|
|
|
|
|
${pkgs.openresolv}/bin/resolvconf -u
|
|
|
|
|
''}
|
2014-11-24 08:50:26 +00:00
|
|
|
|
'';
|
|
|
|
|
|
2013-09-04 11:05:09 +00:00
|
|
|
|
};
|
|
|
|
|
|
2014-11-19 19:13:54 +00:00
|
|
|
|
}
|