forked from mirrors/nixpkgs
140 lines
3.4 KiB
Nix
140 lines
3.4 KiB
Nix
|
{ config, lib, pkgs, ... }:
|
||
|
|
||
|
with lib;
|
||
|
|
||
|
let
|
||
|
|
||
|
cfg = config.services.nylon;
|
||
|
|
||
|
homeDir = "/var/lib/nylon";
|
||
|
|
||
|
configFile = pkgs.writeText "nylon.conf" ''
|
||
|
[General]
|
||
|
No-Simultaneous-Conn=${toString cfg.nrConnections}
|
||
|
Log=${if cfg.logging then "1" else "0"}
|
||
|
Verbose=${if cfg.verbosity then "1" else "0"}
|
||
|
|
||
|
[Server]
|
||
|
Binding-Interface=${cfg.acceptInterface}
|
||
|
Connecting-Interface=${cfg.bindInterface}
|
||
|
Port=${toString cfg.port}
|
||
|
Allow-IP=${concatStringsSep " " cfg.allowedIPRanges}
|
||
|
Deny-IP=${concatStringsSep " " cfg.deniedIPRanges}
|
||
|
'';
|
||
|
|
||
|
in
|
||
|
|
||
|
{
|
||
|
|
||
|
###### interface
|
||
|
|
||
|
options = {
|
||
|
|
||
|
services.nylon = {
|
||
|
|
||
|
enable = mkOption {
|
||
|
type = types.bool;
|
||
|
default = false;
|
||
|
description = ''
|
||
|
Enables nylon as a running service upon activation.
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
nrConnections = mkOption {
|
||
|
type = types.int;
|
||
|
default = 10;
|
||
|
description = ''
|
||
|
The number of allowed simultaneous connections to the daemon, default 10.
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
logging = mkOption {
|
||
|
type = types.bool;
|
||
|
default = false;
|
||
|
description = ''
|
||
|
Enable logging, default is no logging.
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
verbosity = mkOption {
|
||
|
type = types.bool;
|
||
|
default = false;
|
||
|
description = ''
|
||
|
Enable verbose output, default is to not be verbose.
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
acceptInterface = mkOption {
|
||
|
type = types.string;
|
||
|
default = "lo";
|
||
|
description = ''
|
||
|
Tell nylon which interface to listen for client requests on, default is "lo".
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
bindInterface = mkOption {
|
||
|
type = types.string;
|
||
|
default = "enp3s0f0";
|
||
|
description = ''
|
||
|
Tell nylon which interface to use as an uplink, default is "enp3s0f0".
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
port = mkOption {
|
||
|
type = types.int;
|
||
|
default = 1080;
|
||
|
description = ''
|
||
|
What port to listen for client requests, default is 1080.
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
allowedIPRanges = mkOption {
|
||
|
type = with types; listOf string;
|
||
|
default = [ "192.168.0.0/16" "127.0.0.1/8" "172.16.0.1/12" "10.0.0.0/8" ];
|
||
|
description = ''
|
||
|
Allowed client IP ranges are evaluated first, defaults to ARIN IPv4 private ranges:
|
||
|
[ "192.168.0.0/16" "127.0.0.0/8" "172.16.0.0/12" "10.0.0.0/8" ]
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
deniedIPRanges = mkOption {
|
||
|
type = with types; listOf string;
|
||
|
default = [ "0.0.0.0/0" ];
|
||
|
description = ''
|
||
|
Denied client IP ranges, these gets evaluated after the allowed IP ranges, defaults to all IPv4 addresses:
|
||
|
[ "0.0.0.0/0" ]
|
||
|
To block all other access than the allowed.
|
||
|
'';
|
||
|
};
|
||
|
};
|
||
|
};
|
||
|
|
||
|
###### implementation
|
||
|
|
||
|
config = mkIf cfg.enable {
|
||
|
|
||
|
users.extraUsers.nylon= {
|
||
|
group = "nylon";
|
||
|
description = "Nylon SOCKS Proxy";
|
||
|
home = homeDir;
|
||
|
createHome = true;
|
||
|
uid = config.ids.uids.nylon;
|
||
|
};
|
||
|
|
||
|
users.extraGroups.nylon.gid = config.ids.gids.nylon;
|
||
|
|
||
|
systemd.services.nylon = {
|
||
|
description = "Nylon, a lightweight SOCKS proxy server";
|
||
|
after = [ "network.target" ];
|
||
|
wantedBy = [ "multi-user.target" ];
|
||
|
serviceConfig =
|
||
|
{
|
||
|
User = "nylon";
|
||
|
Group = "nylon";
|
||
|
WorkingDirectory = homeDir;
|
||
|
ExecStart = "${pkgs.nylon}/bin/nylon -f -c ${configFile}";
|
||
|
};
|
||
|
};
|
||
|
};
|
||
|
}
|