forked from mirrors/nixpkgs
84 lines
2.1 KiB
Nix
84 lines
2.1 KiB
Nix
|
{ config, lib, pkgs, ... }:
|
||
|
|
||
|
with lib;
|
||
|
|
||
|
let
|
||
|
cfg = config.services.sslh;
|
||
|
configFile = pkgs.writeText "sslh.conf" ''
|
||
|
verbose: ${if cfg.verbose then "true" else "false"};
|
||
|
foreground: false;
|
||
|
inetd: false;
|
||
|
numeric: false;
|
||
|
transparent: false;
|
||
|
timeout: "${toString cfg.timeout}";
|
||
|
user: "nobody";
|
||
|
pidfile: "/run/sslh.pid";
|
||
|
|
||
|
listen:
|
||
|
(
|
||
|
{ host: "${cfg.host}"; port: "${toString cfg.port}"; }
|
||
|
);
|
||
|
|
||
|
${cfg.appendConfig}
|
||
|
'';
|
||
|
defaultAppendConfig = ''
|
||
|
protocols:
|
||
|
(
|
||
|
{ name: "ssh"; service: "ssh"; host: "localhost"; port: "22"; probe: "builtin"; },
|
||
|
{ name: "openvpn"; host: "localhost"; port: "1194"; probe: "builtin"; },
|
||
|
{ name: "xmpp"; host: "localhost"; port: "5222"; probe: "builtin"; },
|
||
|
{ name: "http"; host: "localhost"; port: "80"; probe: "builtin"; },
|
||
|
{ name: "ssl"; host: "localhost"; port: "443"; probe: "builtin"; },
|
||
|
{ name: "anyprot"; host: "localhost"; port: "443"; probe: "builtin"; }
|
||
|
);
|
||
|
'';
|
||
|
in
|
||
|
{
|
||
|
options = {
|
||
|
services.sslh = {
|
||
|
enable = mkEnableOption "sslh";
|
||
|
|
||
|
verbose = mkOption {
|
||
|
type = types.bool;
|
||
|
default = false;
|
||
|
description = "Verbose logs.";
|
||
|
};
|
||
|
|
||
|
timeout = mkOption {
|
||
|
type = types.int;
|
||
|
default = 2;
|
||
|
description = "Timeout in seconds.";
|
||
|
};
|
||
|
|
||
|
host = mkOption {
|
||
|
type = types.str;
|
||
|
default = config.networking.hostName;
|
||
|
description = "Listening hostname.";
|
||
|
};
|
||
|
|
||
|
port = mkOption {
|
||
|
type = types.int;
|
||
|
default = 443;
|
||
|
description = "Listening port.";
|
||
|
};
|
||
|
|
||
|
appendConfig = mkOption {
|
||
|
type = types.str;
|
||
|
default = defaultAppendConfig;
|
||
|
description = "Verbatim configuration file.";
|
||
|
};
|
||
|
};
|
||
|
};
|
||
|
|
||
|
config = mkIf cfg.enable {
|
||
|
systemd.services.sslh = {
|
||
|
description = "Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)";
|
||
|
after = [ "network.target" ];
|
||
|
wantedBy = [ "multi-user.target" ];
|
||
|
serviceConfig.ExecStart = "${pkgs.sslh}/bin/sslh -F ${configFile}";
|
||
|
serviceConfig.KillMode = "process";
|
||
|
serviceConfig.PIDFile = "/run/sslh.pid";
|
||
|
};
|
||
|
};
|
||
|
}
|