forked from mirrors/nixpkgs
nixos: Remove torify module
'torify' now ships with the tor bundle itself; and using torsocks is recommended over tsocks (torify will use torsocks automatically.) Signed-off-by: Austin Seipp <aseipp@pobox.com>
This commit is contained in:
parent
47eabfabe2
commit
1b26faeb69
|
@ -302,7 +302,6 @@
|
||||||
./services/security/fprot.nix
|
./services/security/fprot.nix
|
||||||
./services/security/frandom.nix
|
./services/security/frandom.nix
|
||||||
./services/security/haveged.nix
|
./services/security/haveged.nix
|
||||||
./services/security/torify.nix
|
|
||||||
./services/security/tor.nix
|
./services/security/tor.nix
|
||||||
./services/security/torsocks.nix
|
./services/security/torsocks.nix
|
||||||
./services/system/dbus.nix
|
./services/system/dbus.nix
|
||||||
|
|
|
@ -1,69 +0,0 @@
|
||||||
{ config, lib, pkgs, ... }:
|
|
||||||
with lib;
|
|
||||||
let
|
|
||||||
|
|
||||||
cfg = config.services.tor;
|
|
||||||
|
|
||||||
torify = pkgs.writeTextFile {
|
|
||||||
name = "torify";
|
|
||||||
text = ''
|
|
||||||
#!${pkgs.stdenv.shell}
|
|
||||||
TSOCKS_CONF_FILE=${pkgs.writeText "tsocks.conf" cfg.torify.config} LD_PRELOAD="${pkgs.tsocks}/lib/libtsocks.so $LD_PRELOAD" "$@"
|
|
||||||
'';
|
|
||||||
executable = true;
|
|
||||||
destination = "/bin/torify";
|
|
||||||
};
|
|
||||||
|
|
||||||
in
|
|
||||||
|
|
||||||
{
|
|
||||||
|
|
||||||
###### interface
|
|
||||||
|
|
||||||
options = {
|
|
||||||
|
|
||||||
services.tor.torify = {
|
|
||||||
|
|
||||||
enable = mkOption {
|
|
||||||
default = cfg.client.enable;
|
|
||||||
description = ''
|
|
||||||
Whether to build torify scipt to relay application traffic via TOR.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
server = mkOption {
|
|
||||||
default = "localhost:9050";
|
|
||||||
example = "192.168.0.20";
|
|
||||||
description = ''
|
|
||||||
IP address of TOR client to use.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
config = mkOption {
|
|
||||||
default = "";
|
|
||||||
description = ''
|
|
||||||
Extra configuration. Contents will be added verbatim to TSocks
|
|
||||||
configuration file.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
};
|
|
||||||
|
|
||||||
};
|
|
||||||
|
|
||||||
###### implementation
|
|
||||||
|
|
||||||
config = mkIf cfg.torify.enable {
|
|
||||||
|
|
||||||
environment.systemPackages = [ torify ]; # expose it to the users
|
|
||||||
|
|
||||||
services.tor.torify.config = ''
|
|
||||||
server = ${toString(head (splitString ":" cfg.torify.server))}
|
|
||||||
server_port = ${toString(tail (splitString ":" cfg.torify.server))}
|
|
||||||
|
|
||||||
local = 127.0.0.0/255.128.0.0
|
|
||||||
local = 127.128.0.0/255.192.0.0
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
}
|
|
Loading…
Reference in a new issue