forked from mirrors/nixpkgs
ef176dcf7e
conversions were done using https://github.com/pennae/nix-doc-munge using (probably) rev f34e145 running nix-doc-munge nixos/**/*.nix nix-doc-munge --import nixos/**/*.nix the tool ensures that only changes that could affect the generated manual *but don't* are committed, other changes require manual review and are discarded.
83 lines
2.4 KiB
Nix
83 lines
2.4 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.corerad;
|
|
settingsFormat = pkgs.formats.toml {};
|
|
|
|
in {
|
|
meta.maintainers = with maintainers; [ mdlayher ];
|
|
|
|
options.services.corerad = {
|
|
enable = mkEnableOption (lib.mdDoc "CoreRAD IPv6 NDP RA daemon");
|
|
|
|
settings = mkOption {
|
|
type = settingsFormat.type;
|
|
example = literalExpression ''
|
|
{
|
|
interfaces = [
|
|
# eth0 is an upstream interface monitoring for IPv6 router advertisements.
|
|
{
|
|
name = "eth0";
|
|
monitor = true;
|
|
}
|
|
# eth1 is a downstream interface advertising IPv6 prefixes for SLAAC.
|
|
{
|
|
name = "eth1";
|
|
advertise = true;
|
|
prefix = [{ prefix = "::/64"; }];
|
|
}
|
|
];
|
|
# Optionally enable Prometheus metrics.
|
|
debug = {
|
|
address = "localhost:9430";
|
|
prometheus = true;
|
|
};
|
|
}
|
|
'';
|
|
description = lib.mdDoc ''
|
|
Configuration for CoreRAD, see <https://github.com/mdlayher/corerad/blob/main/internal/config/reference.toml>
|
|
for supported values. Ignored if configFile is set.
|
|
'';
|
|
};
|
|
|
|
configFile = mkOption {
|
|
type = types.path;
|
|
example = literalExpression ''"''${pkgs.corerad}/etc/corerad/corerad.toml"'';
|
|
description = lib.mdDoc "Path to CoreRAD TOML configuration file.";
|
|
};
|
|
|
|
package = mkOption {
|
|
default = pkgs.corerad;
|
|
defaultText = literalExpression "pkgs.corerad";
|
|
type = types.package;
|
|
description = lib.mdDoc "CoreRAD package to use.";
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
# Prefer the config file over settings if both are set.
|
|
services.corerad.configFile = mkDefault (settingsFormat.generate "corerad.toml" cfg.settings);
|
|
|
|
systemd.services.corerad = {
|
|
description = "CoreRAD IPv6 NDP RA daemon";
|
|
after = [ "network.target" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
serviceConfig = {
|
|
LimitNPROC = 512;
|
|
LimitNOFILE = 1048576;
|
|
CapabilityBoundingSet = "CAP_NET_ADMIN CAP_NET_RAW";
|
|
AmbientCapabilities = "CAP_NET_ADMIN CAP_NET_RAW";
|
|
NoNewPrivileges = true;
|
|
DynamicUser = true;
|
|
Type = "notify";
|
|
NotifyAccess = "main";
|
|
ExecStart = "${getBin cfg.package}/bin/corerad -c=${cfg.configFile}";
|
|
Restart = "on-failure";
|
|
RestartKillSignal = "SIGHUP";
|
|
};
|
|
};
|
|
};
|
|
}
|