2019-03-21 12:23:12 +00:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
let
|
|
|
|
cfg = config.programs.captive-browser;
|
|
|
|
in
|
|
|
|
{
|
|
|
|
###### interface
|
|
|
|
|
|
|
|
options = {
|
|
|
|
programs.captive-browser = {
|
|
|
|
enable = mkEnableOption "captive browser";
|
|
|
|
|
|
|
|
package = mkOption {
|
|
|
|
type = types.package;
|
|
|
|
default = pkgs.captive-browser;
|
2019-06-14 18:17:37 +00:00
|
|
|
defaultText = "pkgs.captive-browser";
|
|
|
|
description = "Which package to use for captive-browser";
|
2019-03-21 12:23:12 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
interface = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
description = "your public network interface (wlp3s0, wlan0, eth0, ...)";
|
|
|
|
};
|
|
|
|
|
|
|
|
# the options below are the same as in "captive-browser.toml"
|
|
|
|
browser = mkOption {
|
|
|
|
type = types.str;
|
2020-10-02 04:50:27 +00:00
|
|
|
default = concatStringsSep " " [
|
|
|
|
''${pkgs.chromium}/bin/chromium''
|
|
|
|
''--user-data-dir=''${XDG_DATA_HOME:-$HOME/.local/share}/chromium-captive''
|
|
|
|
''--proxy-server="socks5://$PROXY"''
|
|
|
|
''--host-resolver-rules="MAP * ~NOTFOUND , EXCLUDE localhost"''
|
|
|
|
''--no-first-run''
|
|
|
|
''--new-window''
|
|
|
|
''--incognito''
|
|
|
|
''-no-default-browser-check''
|
|
|
|
''http://cache.nixos.org/''
|
|
|
|
];
|
2019-03-21 12:23:12 +00:00
|
|
|
description = ''
|
2019-06-14 18:17:37 +00:00
|
|
|
The shell (/bin/sh) command executed once the proxy starts.
|
2019-03-21 12:23:12 +00:00
|
|
|
When browser exits, the proxy exits. An extra env var PROXY is available.
|
|
|
|
|
|
|
|
Here, we use a separate Chrome instance in Incognito mode, so that
|
|
|
|
it can run (and be waited for) alongside the default one, and that
|
|
|
|
it maintains no state across runs. To configure this browser open a
|
|
|
|
normal window in it, settings will be preserved.
|
|
|
|
|
|
|
|
@volth: chromium is to open a plain HTTP (not HTTPS nor redirect to HTTPS!) website.
|
|
|
|
upstream uses http://example.com but I have seen captive portals whose DNS server resolves "example.com" to 127.0.0.1
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
dhcp-dns = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
description = ''
|
2019-06-14 18:17:37 +00:00
|
|
|
The shell (/bin/sh) command executed to obtain the DHCP
|
2019-03-21 12:23:12 +00:00
|
|
|
DNS server address. The first match of an IPv4 regex is used.
|
|
|
|
IPv4 only, because let's be real, it's a captive portal.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
socks5-addr = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "localhost:1666";
|
2021-01-24 09:19:10 +00:00
|
|
|
description = "the listen address for the SOCKS5 proxy server";
|
2019-03-21 12:23:12 +00:00
|
|
|
};
|
2019-06-14 18:17:37 +00:00
|
|
|
|
|
|
|
bindInterface = mkOption {
|
|
|
|
default = true;
|
|
|
|
type = types.bool;
|
|
|
|
description = ''
|
|
|
|
Binds <package>captive-browser</package> to the network interface declared in
|
|
|
|
<literal>cfg.interface</literal>. This can be used to avoid collisions
|
|
|
|
with private subnets.
|
|
|
|
'';
|
|
|
|
};
|
2019-03-21 12:23:12 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
###### implementation
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
|
2020-10-02 04:50:27 +00:00
|
|
|
programs.captive-browser.dhcp-dns =
|
|
|
|
let
|
|
|
|
iface = prefix:
|
|
|
|
optionalString cfg.bindInterface (concatStringsSep " " (map escapeShellArg [ prefix cfg.interface ]));
|
|
|
|
in
|
|
|
|
mkOptionDefault (
|
|
|
|
if config.networking.networkmanager.enable then
|
|
|
|
"${pkgs.networkmanager}/bin/nmcli dev show ${iface ""} | ${pkgs.gnugrep}/bin/fgrep IP4.DNS"
|
|
|
|
else if config.networking.dhcpcd.enable then
|
|
|
|
"${pkgs.dhcpcd}/bin/dhcpcd ${iface "-U"} | ${pkgs.gnugrep}/bin/fgrep domain_name_servers"
|
|
|
|
else if config.networking.useNetworkd then
|
|
|
|
"${cfg.package}/bin/systemd-networkd-dns ${iface ""}"
|
|
|
|
else
|
|
|
|
"${config.security.wrapperDir}/udhcpc --quit --now -f ${iface "-i"} -O dns --script ${
|
|
|
|
pkgs.writeShellScript "udhcp-script" ''
|
|
|
|
if [ "$1" = bound ]; then
|
|
|
|
echo "$dns"
|
|
|
|
fi
|
|
|
|
''}"
|
|
|
|
);
|
2019-03-21 12:23:12 +00:00
|
|
|
|
|
|
|
security.wrappers.udhcpc = {
|
2020-10-02 04:50:27 +00:00
|
|
|
capabilities = "cap_net_raw+p";
|
|
|
|
source = "${pkgs.busybox}/bin/udhcpc";
|
2019-03-21 12:23:12 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
security.wrappers.captive-browser = {
|
2020-10-02 04:50:27 +00:00
|
|
|
capabilities = "cap_net_raw+p";
|
|
|
|
source = pkgs.writeShellScript "captive-browser" ''
|
|
|
|
export XDG_CONFIG_HOME=${pkgs.writeTextDir "captive-browser.toml" ''
|
|
|
|
browser = """${cfg.browser}"""
|
|
|
|
dhcp-dns = """${cfg.dhcp-dns}"""
|
|
|
|
socks5-addr = """${cfg.socks5-addr}"""
|
|
|
|
${optionalString cfg.bindInterface ''
|
|
|
|
bind-device = """${cfg.interface}"""
|
|
|
|
''}
|
|
|
|
''}
|
|
|
|
exec ${cfg.package}/bin/captive-browser
|
|
|
|
'';
|
2019-03-21 12:23:12 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|