forked from mirrors/nixpkgs
4f442dde0e
Systemd 250: > DHCPv4 client support in systemd-networkd learnt a new Label= option > for configuring the address label to apply to configure IPv4 > addresses. > The [IPv6AcceptRA] section of .network files gained support for a new > UseMTU= setting that may be used to control whether to apply the > announced MTU settings to the local interface. > The [DHCPv4] section in .network file gained a new Use6RD= boolean > setting to control whether the DHCPv4 client request and process the > DHCP 6RD option. > The [DHCPv6] section in .network file gained a new setting > UseDelegatedPrefix= to control whether the delegated prefixes will be > propagated to the downstream interfaces. > The [IPv6AcceptRA] section of .network files now understands two new > settings UseGateway=/UseRoutePrefix= for explicitly configuring > whether to use the relevant fields from the IPv6 Router Advertisement > records. > The [RoutingPolicyRule] section of .network file gained a new > SuppressInterfaceGroup= setting. > The IgnoreCarrierLoss= setting in the [Network] section of .network > files now allows a duration to be specified, controlling how long to > wait before reacting to carrier loss. Systemd 246: > systemd-networkd's [DHCPv4] section gained a new setting UseGateway= > which may be used to turn off use of the gateway information provided > by the DHCP lease. A new FallbackLeaseLifetimeSec= setting may be > used to configure how to process leases that lack a lifetime option.
2016 lines
63 KiB
Nix
2016 lines
63 KiB
Nix
{ config, lib, pkgs, utils, ... }:
|
|
|
|
with utils.systemdUtils.unitOptions;
|
|
with utils.systemdUtils.lib;
|
|
with lib;
|
|
|
|
let
|
|
|
|
cfg = config.systemd.network;
|
|
|
|
check = {
|
|
|
|
global = {
|
|
sectionNetwork = checkUnitConfig "Network" [
|
|
(assertOnlyFields [
|
|
"SpeedMeter"
|
|
"SpeedMeterIntervalSec"
|
|
"ManageForeignRoutingPolicyRules"
|
|
"ManageForeignRoutes"
|
|
"RouteTable"
|
|
])
|
|
(assertValueOneOf "SpeedMeter" boolValues)
|
|
(assertInt "SpeedMeterIntervalSec")
|
|
(assertValueOneOf "ManageForeignRoutingPolicyRules" boolValues)
|
|
(assertValueOneOf "ManageForeignRoutes" boolValues)
|
|
];
|
|
|
|
sectionDHCPv4 = checkUnitConfig "DHCPv4" [
|
|
(assertOnlyFields [
|
|
"DUIDType"
|
|
"DUIDRawData"
|
|
])
|
|
];
|
|
|
|
sectionDHCPv6 = checkUnitConfig "DHCPv6" [
|
|
(assertOnlyFields [
|
|
"DUIDType"
|
|
"DUIDRawData"
|
|
])
|
|
];
|
|
};
|
|
|
|
link = {
|
|
|
|
sectionLink = checkUnitConfig "Link" [
|
|
(assertOnlyFields [
|
|
"Description"
|
|
"Alias"
|
|
"MACAddressPolicy"
|
|
"MACAddress"
|
|
"NamePolicy"
|
|
"Name"
|
|
"AlternativeNamesPolicy"
|
|
"AlternativeName"
|
|
"MTUBytes"
|
|
"BitsPerSecond"
|
|
"Duplex"
|
|
"AutoNegotiation"
|
|
"WakeOnLan"
|
|
"Port"
|
|
"Advertise"
|
|
"ReceiveChecksumOffload"
|
|
"TransmitChecksumOffload"
|
|
"TCPSegmentationOffload"
|
|
"TCP6SegmentationOffload"
|
|
"GenericSegmentationOffload"
|
|
"GenericReceiveOffload"
|
|
"LargeReceiveOffload"
|
|
"RxChannels"
|
|
"TxChannels"
|
|
"OtherChannels"
|
|
"CombinedChannels"
|
|
"RxBufferSize"
|
|
"TxBufferSize"
|
|
])
|
|
(assertValueOneOf "MACAddressPolicy" ["persistent" "random" "none"])
|
|
(assertMacAddress "MACAddress")
|
|
(assertByteFormat "MTUBytes")
|
|
(assertByteFormat "BitsPerSecond")
|
|
(assertValueOneOf "Duplex" ["half" "full"])
|
|
(assertValueOneOf "AutoNegotiation" boolValues)
|
|
(assertValueOneOf "WakeOnLan" ["phy" "unicast" "multicast" "broadcast" "arp" "magic" "secureon" "off"])
|
|
(assertValueOneOf "Port" ["tp" "aui" "bnc" "mii" "fibre"])
|
|
(assertValueOneOf "ReceiveChecksumOffload" boolValues)
|
|
(assertValueOneOf "TransmitChecksumOffload" boolValues)
|
|
(assertValueOneOf "TCPSegmentationOffload" boolValues)
|
|
(assertValueOneOf "TCP6SegmentationOffload" boolValues)
|
|
(assertValueOneOf "GenericSegmentationOffload" boolValues)
|
|
(assertValueOneOf "GenericReceiveOffload" boolValues)
|
|
(assertValueOneOf "LargeReceiveOffload" boolValues)
|
|
(assertInt "RxChannels")
|
|
(assertRange "RxChannels" 1 4294967295)
|
|
(assertInt "TxChannels")
|
|
(assertRange "TxChannels" 1 4294967295)
|
|
(assertInt "OtherChannels")
|
|
(assertRange "OtherChannels" 1 4294967295)
|
|
(assertInt "CombinedChannels")
|
|
(assertRange "CombinedChannels" 1 4294967295)
|
|
(assertInt "RxBufferSize")
|
|
(assertInt "TxBufferSize")
|
|
];
|
|
};
|
|
|
|
netdev = let
|
|
|
|
tunChecks = [
|
|
(assertOnlyFields [
|
|
"MultiQueue"
|
|
"PacketInfo"
|
|
"VNetHeader"
|
|
"User"
|
|
"Group"
|
|
])
|
|
(assertValueOneOf "MultiQueue" boolValues)
|
|
(assertValueOneOf "PacketInfo" boolValues)
|
|
(assertValueOneOf "VNetHeader" boolValues)
|
|
];
|
|
in {
|
|
|
|
sectionNetdev = checkUnitConfig "Netdev" [
|
|
(assertOnlyFields [
|
|
"Description"
|
|
"Name"
|
|
"Kind"
|
|
"MTUBytes"
|
|
"MACAddress"
|
|
])
|
|
(assertHasField "Name")
|
|
(assertHasField "Kind")
|
|
(assertValueOneOf "Kind" [
|
|
"bond"
|
|
"bridge"
|
|
"dummy"
|
|
"gre"
|
|
"gretap"
|
|
"erspan"
|
|
"ip6gre"
|
|
"ip6tnl"
|
|
"ip6gretap"
|
|
"ipip"
|
|
"ipvlan"
|
|
"macvlan"
|
|
"macvtap"
|
|
"sit"
|
|
"tap"
|
|
"tun"
|
|
"veth"
|
|
"vlan"
|
|
"vti"
|
|
"vti6"
|
|
"vxlan"
|
|
"geneve"
|
|
"l2tp"
|
|
"macsec"
|
|
"vrf"
|
|
"vcan"
|
|
"vxcan"
|
|
"wireguard"
|
|
"netdevsim"
|
|
"nlmon"
|
|
"fou"
|
|
"xfrm"
|
|
"ifb"
|
|
"batadv"
|
|
])
|
|
(assertByteFormat "MTUBytes")
|
|
(assertMacAddress "MACAddress")
|
|
];
|
|
|
|
sectionVLAN = checkUnitConfig "VLAN" [
|
|
(assertOnlyFields [
|
|
"Id"
|
|
"GVRP"
|
|
"MVRP"
|
|
"LooseBinding"
|
|
"ReorderHeader"
|
|
])
|
|
(assertInt "Id")
|
|
(assertRange "Id" 0 4094)
|
|
(assertValueOneOf "GVRP" boolValues)
|
|
(assertValueOneOf "MVRP" boolValues)
|
|
(assertValueOneOf "LooseBinding" boolValues)
|
|
(assertValueOneOf "ReorderHeader" boolValues)
|
|
];
|
|
|
|
sectionMACVLAN = checkUnitConfig "MACVLAN" [
|
|
(assertOnlyFields [
|
|
"Mode"
|
|
])
|
|
(assertValueOneOf "Mode" ["private" "vepa" "bridge" "passthru"])
|
|
];
|
|
|
|
sectionVXLAN = checkUnitConfig "VXLAN" [
|
|
(assertOnlyFields [
|
|
"VNI"
|
|
"Remote"
|
|
"Local"
|
|
"Group"
|
|
"TOS"
|
|
"TTL"
|
|
"MacLearning"
|
|
"FDBAgeingSec"
|
|
"MaximumFDBEntries"
|
|
"ReduceARPProxy"
|
|
"L2MissNotification"
|
|
"L3MissNotification"
|
|
"RouteShortCircuit"
|
|
"UDPChecksum"
|
|
"UDP6ZeroChecksumTx"
|
|
"UDP6ZeroChecksumRx"
|
|
"RemoteChecksumTx"
|
|
"RemoteChecksumRx"
|
|
"GroupPolicyExtension"
|
|
"GenericProtocolExtension"
|
|
"DestinationPort"
|
|
"PortRange"
|
|
"FlowLabel"
|
|
"IPDoNotFragment"
|
|
])
|
|
(assertInt "VNI")
|
|
(assertRange "VNI" 1 16777215)
|
|
(assertValueOneOf "MacLearning" boolValues)
|
|
(assertInt "MaximumFDBEntries")
|
|
(assertValueOneOf "ReduceARPProxy" boolValues)
|
|
(assertValueOneOf "L2MissNotification" boolValues)
|
|
(assertValueOneOf "L3MissNotification" boolValues)
|
|
(assertValueOneOf "RouteShortCircuit" boolValues)
|
|
(assertValueOneOf "UDPChecksum" boolValues)
|
|
(assertValueOneOf "UDP6ZeroChecksumTx" boolValues)
|
|
(assertValueOneOf "UDP6ZeroChecksumRx" boolValues)
|
|
(assertValueOneOf "RemoteChecksumTx" boolValues)
|
|
(assertValueOneOf "RemoteChecksumRx" boolValues)
|
|
(assertValueOneOf "GroupPolicyExtension" boolValues)
|
|
(assertValueOneOf "GenericProtocolExtension" boolValues)
|
|
(assertInt "FlowLabel")
|
|
(assertRange "FlowLabel" 0 1048575)
|
|
(assertValueOneOf "IPDoNotFragment" (boolValues + ["inherit"]))
|
|
];
|
|
|
|
sectionTunnel = checkUnitConfig "Tunnel" [
|
|
(assertOnlyFields [
|
|
"Local"
|
|
"Remote"
|
|
"TOS"
|
|
"TTL"
|
|
"DiscoverPathMTU"
|
|
"IPv6FlowLabel"
|
|
"CopyDSCP"
|
|
"EncapsulationLimit"
|
|
"Key"
|
|
"InputKey"
|
|
"OutputKey"
|
|
"Mode"
|
|
"Independent"
|
|
"AssignToLoopback"
|
|
"AllowLocalRemote"
|
|
"FooOverUDP"
|
|
"FOUDestinationPort"
|
|
"FOUSourcePort"
|
|
"Encapsulation"
|
|
"IPv6RapidDeploymentPrefix"
|
|
"ISATAP"
|
|
"SerializeTunneledPackets"
|
|
"ERSPANIndex"
|
|
])
|
|
(assertInt "TTL")
|
|
(assertRange "TTL" 0 255)
|
|
(assertValueOneOf "DiscoverPathMTU" boolValues)
|
|
(assertValueOneOf "CopyDSCP" boolValues)
|
|
(assertValueOneOf "Mode" ["ip6ip6" "ipip6" "any"])
|
|
(assertValueOneOf "Independent" boolValues)
|
|
(assertValueOneOf "AssignToLoopback" boolValues)
|
|
(assertValueOneOf "AllowLocalRemote" boolValues)
|
|
(assertValueOneOf "FooOverUDP" boolValues)
|
|
(assertPort "FOUDestinationPort")
|
|
(assertPort "FOUSourcePort")
|
|
(assertValueOneOf "Encapsulation" ["FooOverUDP" "GenericUDPEncapsulation"])
|
|
(assertValueOneOf "ISATAP" boolValues)
|
|
(assertValueOneOf "SerializeTunneledPackets" boolValues)
|
|
(assertInt "ERSPANIndex")
|
|
(assertRange "ERSPANIndex" 1 1048575)
|
|
];
|
|
|
|
sectionFooOverUDP = checkUnitConfig "FooOverUDP" [
|
|
(assertOnlyFields [
|
|
"Port"
|
|
"Encapsulation"
|
|
"Protocol"
|
|
])
|
|
(assertPort "Port")
|
|
(assertValueOneOf "Encapsulation" ["FooOverUDP" "GenericUDPEncapsulation"])
|
|
];
|
|
|
|
sectionPeer = checkUnitConfig "Peer" [
|
|
(assertOnlyFields [
|
|
"Name"
|
|
"MACAddress"
|
|
])
|
|
(assertMacAddress "MACAddress")
|
|
];
|
|
|
|
sectionTun = checkUnitConfig "Tun" tunChecks;
|
|
|
|
sectionTap = checkUnitConfig "Tap" tunChecks;
|
|
|
|
# NOTE The PrivateKey directive is missing on purpose here, please
|
|
# do not add it to this list. The nix store is world-readable let's
|
|
# refrain ourselves from providing a footgun.
|
|
sectionWireGuard = checkUnitConfig "WireGuard" [
|
|
(assertOnlyFields [
|
|
"PrivateKeyFile"
|
|
"ListenPort"
|
|
"FirewallMark"
|
|
"RouteTable"
|
|
"RouteMetric"
|
|
])
|
|
(assertInt "FirewallMark")
|
|
(assertRange "FirewallMark" 1 4294967295)
|
|
];
|
|
|
|
# NOTE The PresharedKey directive is missing on purpose here, please
|
|
# do not add it to this list. The nix store is world-readable,let's
|
|
# refrain ourselves from providing a footgun.
|
|
sectionWireGuardPeer = checkUnitConfig "WireGuardPeer" [
|
|
(assertOnlyFields [
|
|
"PublicKey"
|
|
"PresharedKeyFile"
|
|
"AllowedIPs"
|
|
"Endpoint"
|
|
"PersistentKeepalive"
|
|
"RouteTable"
|
|
"RouteMetric"
|
|
])
|
|
(assertInt "PersistentKeepalive")
|
|
(assertRange "PersistentKeepalive" 0 65535)
|
|
];
|
|
|
|
sectionBond = checkUnitConfig "Bond" [
|
|
(assertOnlyFields [
|
|
"Mode"
|
|
"TransmitHashPolicy"
|
|
"LACPTransmitRate"
|
|
"MIIMonitorSec"
|
|
"UpDelaySec"
|
|
"DownDelaySec"
|
|
"LearnPacketIntervalSec"
|
|
"AdSelect"
|
|
"AdActorSystemPriority"
|
|
"AdUserPortKey"
|
|
"AdActorSystem"
|
|
"FailOverMACPolicy"
|
|
"ARPValidate"
|
|
"ARPIntervalSec"
|
|
"ARPIPTargets"
|
|
"ARPAllTargets"
|
|
"PrimaryReselectPolicy"
|
|
"ResendIGMP"
|
|
"PacketsPerSlave"
|
|
"GratuitousARP"
|
|
"AllSlavesActive"
|
|
"DynamicTransmitLoadBalancing"
|
|
"MinLinks"
|
|
])
|
|
(assertValueOneOf "Mode" [
|
|
"balance-rr"
|
|
"active-backup"
|
|
"balance-xor"
|
|
"broadcast"
|
|
"802.3ad"
|
|
"balance-tlb"
|
|
"balance-alb"
|
|
])
|
|
(assertValueOneOf "TransmitHashPolicy" [
|
|
"layer2"
|
|
"layer3+4"
|
|
"layer2+3"
|
|
"encap2+3"
|
|
"encap3+4"
|
|
])
|
|
(assertValueOneOf "LACPTransmitRate" ["slow" "fast"])
|
|
(assertValueOneOf "AdSelect" ["stable" "bandwidth" "count"])
|
|
(assertInt "AdActorSystemPriority")
|
|
(assertRange "AdActorSystemPriority" 1 65535)
|
|
(assertInt "AdUserPortKey")
|
|
(assertRange "AdUserPortKey" 0 1023)
|
|
(assertValueOneOf "FailOverMACPolicy" ["none" "active" "follow"])
|
|
(assertValueOneOf "ARPValidate" ["none" "active" "backup" "all"])
|
|
(assertValueOneOf "ARPAllTargets" ["any" "all"])
|
|
(assertValueOneOf "PrimaryReselectPolicy" ["always" "better" "failure"])
|
|
(assertInt "ResendIGMP")
|
|
(assertRange "ResendIGMP" 0 255)
|
|
(assertInt "PacketsPerSlave")
|
|
(assertRange "PacketsPerSlave" 0 65535)
|
|
(assertInt "GratuitousARP")
|
|
(assertRange "GratuitousARP" 0 255)
|
|
(assertValueOneOf "AllSlavesActive" boolValues)
|
|
(assertValueOneOf "DynamicTransmitLoadBalancing" boolValues)
|
|
(assertInt "MinLinks")
|
|
(assertMinimum "MinLinks" 0)
|
|
];
|
|
|
|
sectionXfrm = checkUnitConfig "Xfrm" [
|
|
(assertOnlyFields [
|
|
"InterfaceId"
|
|
"Independent"
|
|
])
|
|
(assertInt "InterfaceId")
|
|
(assertRange "InterfaceId" 1 4294967295)
|
|
(assertValueOneOf "Independent" boolValues)
|
|
];
|
|
|
|
sectionVRF = checkUnitConfig "VRF" [
|
|
(assertOnlyFields [
|
|
"Table"
|
|
])
|
|
(assertInt "Table")
|
|
(assertMinimum "Table" 0)
|
|
];
|
|
|
|
sectionBatmanAdvanced = checkUnitConfig "BatmanAdvanced" [
|
|
(assertOnlyFields [
|
|
"GatewayMode"
|
|
"Aggregation"
|
|
"BridgeLoopAvoidance"
|
|
"DistributedArpTable"
|
|
"Fragmentation"
|
|
"HopPenalty"
|
|
"OriginatorIntervalSec"
|
|
"GatewayBandwithDown"
|
|
"GatewayBandwithUp"
|
|
"RoutingAlgorithm"
|
|
])
|
|
(assertValueOneOf "GatewayMode" ["off" "client" "server"])
|
|
(assertValueOneOf "Aggregation" boolValues)
|
|
(assertValueOneOf "BridgeLoopAvoidance" boolValues)
|
|
(assertValueOneOf "DistributedArpTable" boolValues)
|
|
(assertValueOneOf "Fragmentation" boolValues)
|
|
(assertInt "HopPenalty")
|
|
(assertRange "HopPenalty" 0 255)
|
|
(assertValueOneOf "RoutingAlgorithm" ["batman-v" "batman-iv"])
|
|
];
|
|
};
|
|
|
|
network = {
|
|
|
|
sectionLink = checkUnitConfig "Link" [
|
|
(assertOnlyFields [
|
|
"MACAddress"
|
|
"MTUBytes"
|
|
"ARP"
|
|
"Multicast"
|
|
"AllMulticast"
|
|
"Unmanaged"
|
|
"Group"
|
|
"RequiredForOnline"
|
|
"RequiredFamilyForOnline"
|
|
"ActivationPolicy"
|
|
"Promiscuous"
|
|
])
|
|
(assertMacAddress "MACAddress")
|
|
(assertByteFormat "MTUBytes")
|
|
(assertValueOneOf "ARP" boolValues)
|
|
(assertValueOneOf "Multicast" boolValues)
|
|
(assertValueOneOf "AllMulticast" boolValues)
|
|
(assertValueOneOf "Promiscuous" boolValues)
|
|
(assertValueOneOf "Unmanaged" boolValues)
|
|
(assertInt "Group")
|
|
(assertRange "Group" 0 2147483647)
|
|
(assertValueOneOf "RequiredForOnline" (boolValues ++ [
|
|
"missing"
|
|
"off"
|
|
"no-carrier"
|
|
"dormant"
|
|
"degraded-carrier"
|
|
"carrier"
|
|
"degraded"
|
|
"enslaved"
|
|
"routable"
|
|
]))
|
|
(assertValueOneOf "RequiredFamilyForOnline" [
|
|
"ipv4"
|
|
"ipv6"
|
|
"both"
|
|
"any"
|
|
])
|
|
(assertValueOneOf "ActivationPolicy" ([
|
|
"up"
|
|
"always-up"
|
|
"manual"
|
|
"always-down"
|
|
"down"
|
|
"bound"
|
|
]))
|
|
];
|
|
|
|
sectionNetwork = checkUnitConfig "Network" [
|
|
(assertOnlyFields [
|
|
"Description"
|
|
"DHCP"
|
|
"DHCPServer"
|
|
"LinkLocalAddressing"
|
|
"IPv4LLRoute"
|
|
"DefaultRouteOnDevice"
|
|
"LLMNR"
|
|
"MulticastDNS"
|
|
"DNSOverTLS"
|
|
"DNSSEC"
|
|
"DNSSECNegativeTrustAnchors"
|
|
"LLDP"
|
|
"EmitLLDP"
|
|
"BindCarrier"
|
|
"Address"
|
|
"Gateway"
|
|
"DNS"
|
|
"Domains"
|
|
"DNSDefaultRoute"
|
|
"NTP"
|
|
"IPForward"
|
|
"IPMasquerade"
|
|
"IPv6PrivacyExtensions"
|
|
"IPv6AcceptRA"
|
|
"IPv6DuplicateAddressDetection"
|
|
"IPv6HopLimit"
|
|
"IPv4ProxyARP"
|
|
"IPv6ProxyNDP"
|
|
"IPv6ProxyNDPAddress"
|
|
"IPv6SendRA"
|
|
"DHCPPrefixDelegation"
|
|
"IPv6MTUBytes"
|
|
"Bridge"
|
|
"Bond"
|
|
"VRF"
|
|
"VLAN"
|
|
"IPVLAN"
|
|
"MACVLAN"
|
|
"VXLAN"
|
|
"Tunnel"
|
|
"MACsec"
|
|
"ActiveSlave"
|
|
"PrimarySlave"
|
|
"ConfigureWithoutCarrier"
|
|
"IgnoreCarrierLoss"
|
|
"Xfrm"
|
|
"KeepConfiguration"
|
|
"BatmanAdvanced"
|
|
])
|
|
# Note: For DHCP the values both, none, v4, v6 are deprecated
|
|
(assertValueOneOf "DHCP" ["yes" "no" "ipv4" "ipv6"])
|
|
(assertValueOneOf "DHCPServer" boolValues)
|
|
(assertValueOneOf "LinkLocalAddressing" ["yes" "no" "ipv4" "ipv6" "fallback" "ipv4-fallback"])
|
|
(assertValueOneOf "IPv4LLRoute" boolValues)
|
|
(assertValueOneOf "DefaultRouteOnDevice" boolValues)
|
|
(assertValueOneOf "LLMNR" (boolValues ++ ["resolve"]))
|
|
(assertValueOneOf "MulticastDNS" (boolValues ++ ["resolve"]))
|
|
(assertValueOneOf "DNSOverTLS" (boolValues ++ ["opportunistic"]))
|
|
(assertValueOneOf "DNSSEC" (boolValues ++ ["allow-downgrade"]))
|
|
(assertValueOneOf "LLDP" (boolValues ++ ["routers-only"]))
|
|
(assertValueOneOf "EmitLLDP" (boolValues ++ ["nearest-bridge" "non-tpmr-bridge" "customer-bridge"]))
|
|
(assertValueOneOf "DNSDefaultRoute" boolValues)
|
|
(assertValueOneOf "IPForward" (boolValues ++ ["ipv4" "ipv6"]))
|
|
(assertValueOneOf "IPMasquerade" (boolValues ++ ["ipv4" "ipv6" "both"]))
|
|
(assertValueOneOf "IPv6PrivacyExtensions" (boolValues ++ ["prefer-public" "kernel"]))
|
|
(assertValueOneOf "IPv6AcceptRA" boolValues)
|
|
(assertInt "IPv6DuplicateAddressDetection")
|
|
(assertMinimum "IPv6DuplicateAddressDetection" 0)
|
|
(assertInt "IPv6HopLimit")
|
|
(assertMinimum "IPv6HopLimit" 0)
|
|
(assertValueOneOf "IPv4ProxyARP" boolValues)
|
|
(assertValueOneOf "IPv6ProxyNDP" boolValues)
|
|
(assertValueOneOf "IPv6SendRA" boolValues)
|
|
(assertValueOneOf "DHCPPrefixDelegation" boolValues)
|
|
(assertByteFormat "IPv6MTUBytes")
|
|
(assertValueOneOf "ActiveSlave" boolValues)
|
|
(assertValueOneOf "PrimarySlave" boolValues)
|
|
(assertValueOneOf "ConfigureWithoutCarrier" boolValues)
|
|
(assertValueOneOf "KeepConfiguration" (boolValues ++ ["static" "dhcp-on-stop" "dhcp"]))
|
|
];
|
|
|
|
sectionAddress = checkUnitConfig "Address" [
|
|
(assertOnlyFields [
|
|
"Address"
|
|
"Peer"
|
|
"Broadcast"
|
|
"Label"
|
|
"PreferredLifetime"
|
|
"Scope"
|
|
"HomeAddress"
|
|
"DuplicateAddressDetection"
|
|
"ManageTemporaryAddress"
|
|
"AddPrefixRoute"
|
|
"AutoJoin"
|
|
])
|
|
(assertHasField "Address")
|
|
(assertValueOneOf "PreferredLifetime" ["forever" "infinity" "0" 0])
|
|
(assertValueOneOf "HomeAddress" boolValues)
|
|
(assertValueOneOf "DuplicateAddressDetection" ["ipv4" "ipv6" "both" "none"])
|
|
(assertValueOneOf "ManageTemporaryAddress" boolValues)
|
|
(assertValueOneOf "AddPrefixRoute" boolValues)
|
|
(assertValueOneOf "AutoJoin" boolValues)
|
|
];
|
|
|
|
sectionRoutingPolicyRule = checkUnitConfig "RoutingPolicyRule" [
|
|
(assertOnlyFields [
|
|
"TypeOfService"
|
|
"From"
|
|
"To"
|
|
"FirewallMark"
|
|
"Table"
|
|
"Priority"
|
|
"IncomingInterface"
|
|
"OutgoingInterface"
|
|
"SourcePort"
|
|
"DestinationPort"
|
|
"IPProtocol"
|
|
"InvertRule"
|
|
"Family"
|
|
"User"
|
|
"SuppressPrefixLength"
|
|
"Type"
|
|
"SuppressInterfaceGroup"
|
|
])
|
|
(assertInt "TypeOfService")
|
|
(assertRange "TypeOfService" 0 255)
|
|
(assertInt "FirewallMark")
|
|
(assertRange "FirewallMark" 1 4294967295)
|
|
(assertInt "Priority")
|
|
(assertPort "SourcePort")
|
|
(assertPort "DestinationPort")
|
|
(assertValueOneOf "InvertRule" boolValues)
|
|
(assertValueOneOf "Family" ["ipv4" "ipv6" "both"])
|
|
(assertInt "SuppressPrefixLength")
|
|
(assertRange "SuppressPrefixLength" 0 128)
|
|
(assertValueOneOf "Type" ["blackhole" "unreachable" "prohibit"])
|
|
(assertRange "SuppressInterfaceGroup" 0 2147483647)
|
|
];
|
|
|
|
sectionRoute = checkUnitConfig "Route" [
|
|
(assertOnlyFields [
|
|
"Gateway"
|
|
"GatewayOnLink"
|
|
"Destination"
|
|
"Source"
|
|
"Metric"
|
|
"IPv6Preference"
|
|
"Scope"
|
|
"PreferredSource"
|
|
"Table"
|
|
"Protocol"
|
|
"Type"
|
|
"InitialCongestionWindow"
|
|
"InitialAdvertisedReceiveWindow"
|
|
"QuickAck"
|
|
"FastOpenNoCookie"
|
|
"TTLPropagate"
|
|
"MTUBytes"
|
|
"IPServiceType"
|
|
"MultiPathRoute"
|
|
])
|
|
(assertValueOneOf "GatewayOnLink" boolValues)
|
|
(assertInt "Metric")
|
|
(assertValueOneOf "IPv6Preference" ["low" "medium" "high"])
|
|
(assertValueOneOf "Scope" ["global" "site" "link" "host" "nowhere"])
|
|
(assertValueOneOf "Type" [
|
|
"unicast"
|
|
"local"
|
|
"broadcast"
|
|
"anycast"
|
|
"multicast"
|
|
"blackhole"
|
|
"unreachable"
|
|
"prohibit"
|
|
"throw"
|
|
"nat"
|
|
"xresolve"
|
|
])
|
|
(assertValueOneOf "QuickAck" boolValues)
|
|
(assertValueOneOf "FastOpenNoCookie" boolValues)
|
|
(assertValueOneOf "TTLPropagate" boolValues)
|
|
(assertByteFormat "MTUBytes")
|
|
(assertValueOneOf "IPServiceType" ["CS6" "CS4"])
|
|
];
|
|
|
|
sectionDHCPv4 = checkUnitConfig "DHCPv4" [
|
|
(assertOnlyFields [
|
|
"UseDNS"
|
|
"RoutesToDNS"
|
|
"UseNTP"
|
|
"UseSIP"
|
|
"UseMTU"
|
|
"Anonymize"
|
|
"SendHostname"
|
|
"UseHostname"
|
|
"Hostname"
|
|
"UseDomains"
|
|
"UseRoutes"
|
|
"UseTimezone"
|
|
"ClientIdentifier"
|
|
"VendorClassIdentifier"
|
|
"UserClass"
|
|
"MaxAttempts"
|
|
"DUIDType"
|
|
"DUIDRawData"
|
|
"IAID"
|
|
"RequestBroadcast"
|
|
"RouteMetric"
|
|
"RouteTable"
|
|
"RouteMTUBytes"
|
|
"ListenPort"
|
|
"SendRelease"
|
|
"SendDecline"
|
|
"BlackList"
|
|
"RequestOptions"
|
|
"SendOption"
|
|
"FallbackLeaseLifetimeSec"
|
|
"Label"
|
|
"Use6RD"
|
|
])
|
|
(assertValueOneOf "UseDNS" boolValues)
|
|
(assertValueOneOf "RoutesToDNS" boolValues)
|
|
(assertValueOneOf "UseNTP" boolValues)
|
|
(assertValueOneOf "UseSIP" boolValues)
|
|
(assertValueOneOf "UseMTU" boolValues)
|
|
(assertValueOneOf "Anonymize" boolValues)
|
|
(assertValueOneOf "SendHostname" boolValues)
|
|
(assertValueOneOf "UseHostname" boolValues)
|
|
(assertValueOneOf "UseDomains" (boolValues ++ ["route"]))
|
|
(assertValueOneOf "UseRoutes" boolValues)
|
|
(assertValueOneOf "UseTimezone" boolValues)
|
|
(assertValueOneOf "ClientIdentifier" ["mac" "duid" "duid-only"])
|
|
(assertInt "IAID")
|
|
(assertValueOneOf "RequestBroadcast" boolValues)
|
|
(assertInt "RouteMetric")
|
|
(assertInt "RouteTable")
|
|
(assertRange "RouteTable" 0 4294967295)
|
|
(assertByteFormat "RouteMTUBytes")
|
|
(assertPort "ListenPort")
|
|
(assertValueOneOf "SendRelease" boolValues)
|
|
(assertValueOneOf "SendDecline" boolValues)
|
|
(assertValueOneOf "FallbackLeaseLifetimeSec" ["forever" "infinity"])
|
|
(assertValueOneOf "Use6RD" boolValues)
|
|
];
|
|
|
|
sectionDHCPv6 = checkUnitConfig "DHCPv6" [
|
|
(assertOnlyFields [
|
|
"UseAddress"
|
|
"UseDNS"
|
|
"UseNTP"
|
|
"RouteMetric"
|
|
"RapidCommit"
|
|
"MUDURL"
|
|
"RequestOptions"
|
|
"SendVendorOption"
|
|
"PrefixDelegationHint"
|
|
"WithoutRA"
|
|
"SendOption"
|
|
"UserClass"
|
|
"VendorClass"
|
|
"DUIDType"
|
|
"DUIDRawData"
|
|
"IAID"
|
|
"UseDelegatedPrefix"
|
|
])
|
|
(assertValueOneOf "UseAddress" boolValues)
|
|
(assertValueOneOf "UseDNS" boolValues)
|
|
(assertValueOneOf "UseNTP" boolValues)
|
|
(assertInt "RouteMetric")
|
|
(assertValueOneOf "RapidCommit" boolValues)
|
|
(assertValueOneOf "WithoutRA" ["no" "solicit" "information-request"])
|
|
(assertRange "SendOption" 1 65536)
|
|
(assertInt "IAID")
|
|
(assertValueOneOf "UseDelegatedPrefix" boolValues)
|
|
];
|
|
|
|
sectionDHCPPrefixDelegation = checkUnitConfig "DHCPPrefixDelegation" [
|
|
(assertOnlyFields [
|
|
"UplinkInterface"
|
|
"SubnetId"
|
|
"Announce"
|
|
"Assign"
|
|
"Token"
|
|
"ManageTemporaryAddress"
|
|
"RouteMetric"
|
|
])
|
|
(assertValueOneOf "Announce" boolValues)
|
|
(assertValueOneOf "Assign" boolValues)
|
|
(assertValueOneOf "ManageTemporaryAddress" boolValues)
|
|
(assertRange "RouteMetric" 0 4294967295)
|
|
];
|
|
|
|
sectionIPv6AcceptRA = checkUnitConfig "IPv6AcceptRA" [
|
|
(assertOnlyFields [
|
|
"UseDNS"
|
|
"UseDomains"
|
|
"RouteTable"
|
|
"UseAutonomousPrefix"
|
|
"UseOnLinkPrefix"
|
|
"RouterDenyList"
|
|
"RouterAllowList"
|
|
"PrefixDenyList"
|
|
"PrefixAllowList"
|
|
"RouteDenyList"
|
|
"RouteAllowList"
|
|
"DHCPv6Client"
|
|
"RouteMetric"
|
|
"UseMTU"
|
|
"UseGateway"
|
|
"UseRoutePrefix"
|
|
"Token"
|
|
])
|
|
(assertValueOneOf "UseDNS" boolValues)
|
|
(assertValueOneOf "UseDomains" (boolValues ++ ["route"]))
|
|
(assertRange "RouteTable" 0 4294967295)
|
|
(assertValueOneOf "UseAutonomousPrefix" boolValues)
|
|
(assertValueOneOf "UseOnLinkPrefix" boolValues)
|
|
(assertValueOneOf "DHCPv6Client" (boolValues ++ ["always"]))
|
|
(assertValueOneOf "UseMTU" boolValues)
|
|
(assertValueOneOf "UseGateway" boolValues)
|
|
(assertValueOneOf "UseRoutePrefix" boolValues)
|
|
];
|
|
|
|
sectionDHCPServer = checkUnitConfig "DHCPServer" [
|
|
(assertOnlyFields [
|
|
"ServerAddress"
|
|
"PoolOffset"
|
|
"PoolSize"
|
|
"DefaultLeaseTimeSec"
|
|
"MaxLeaseTimeSec"
|
|
"UplinkInterface"
|
|
"EmitDNS"
|
|
"DNS"
|
|
"EmitNTP"
|
|
"NTP"
|
|
"EmitSIP"
|
|
"SIP"
|
|
"EmitPOP3"
|
|
"POP3"
|
|
"EmitSMTP"
|
|
"SMTP"
|
|
"EmitLPR"
|
|
"LPR"
|
|
"EmitRouter"
|
|
"Router"
|
|
"EmitTimezone"
|
|
"Timezone"
|
|
"SendOption"
|
|
"SendVendorOption"
|
|
"BindToInterface"
|
|
"RelayTarget"
|
|
"RelayAgentCircuitId"
|
|
"RelayAgentRemoteId"
|
|
])
|
|
(assertInt "PoolOffset")
|
|
(assertMinimum "PoolOffset" 0)
|
|
(assertInt "PoolSize")
|
|
(assertMinimum "PoolSize" 0)
|
|
(assertValueOneOf "EmitDNS" boolValues)
|
|
(assertValueOneOf "EmitNTP" boolValues)
|
|
(assertValueOneOf "EmitSIP" boolValues)
|
|
(assertValueOneOf "EmitPOP3" boolValues)
|
|
(assertValueOneOf "EmitSMTP" boolValues)
|
|
(assertValueOneOf "EmitLPR" boolValues)
|
|
(assertValueOneOf "EmitRouter" boolValues)
|
|
(assertValueOneOf "EmitTimezone" boolValues)
|
|
(assertValueOneOf "BindToInterface" boolValues)
|
|
];
|
|
|
|
sectionIPv6SendRA = checkUnitConfig "IPv6SendRA" [
|
|
(assertOnlyFields [
|
|
"Managed"
|
|
"OtherInformation"
|
|
"RouterLifetimeSec"
|
|
"RouterPreference"
|
|
"UplinkInterface"
|
|
"EmitDNS"
|
|
"DNS"
|
|
"EmitDomains"
|
|
"Domains"
|
|
"DNSLifetimeSec"
|
|
])
|
|
(assertValueOneOf "Managed" boolValues)
|
|
(assertValueOneOf "OtherInformation" boolValues)
|
|
(assertValueOneOf "RouterPreference" ["high" "medium" "low" "normal" "default"])
|
|
(assertValueOneOf "EmitDNS" boolValues)
|
|
(assertValueOneOf "EmitDomains" boolValues)
|
|
];
|
|
|
|
sectionIPv6Prefix = checkUnitConfig "IPv6Prefix" [
|
|
(assertOnlyFields [
|
|
"AddressAutoconfiguration"
|
|
"OnLink"
|
|
"Prefix"
|
|
"PreferredLifetimeSec"
|
|
"ValidLifetimeSec"
|
|
"Token"
|
|
])
|
|
(assertValueOneOf "AddressAutoconfiguration" boolValues)
|
|
(assertValueOneOf "OnLink" boolValues)
|
|
];
|
|
|
|
sectionIPv6RoutePrefix = checkUnitConfig "IPv6RoutePrefix" [
|
|
(assertOnlyFields [
|
|
"Route"
|
|
"LifetimeSec"
|
|
])
|
|
(assertHasField "Route")
|
|
(assertInt "LifetimeSec")
|
|
];
|
|
|
|
sectionDHCPServerStaticLease = checkUnitConfig "DHCPServerStaticLease" [
|
|
(assertOnlyFields [
|
|
"MACAddress"
|
|
"Address"
|
|
])
|
|
(assertHasField "MACAddress")
|
|
(assertHasField "Address")
|
|
(assertMacAddress "MACAddress")
|
|
];
|
|
|
|
};
|
|
};
|
|
|
|
commonNetworkOptions = {
|
|
|
|
enable = mkOption {
|
|
default = true;
|
|
type = types.bool;
|
|
description = lib.mdDoc ''
|
|
Whether to manage network configuration using {command}`systemd-network`.
|
|
'';
|
|
};
|
|
|
|
matchConfig = mkOption {
|
|
default = {};
|
|
example = { Name = "eth0"; };
|
|
type = types.attrsOf unitOption;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[Match]` section of the unit. See
|
|
{manpage}`systemd.link(5)`
|
|
{manpage}`systemd.netdev(5)`
|
|
{manpage}`systemd.network(5)`
|
|
for details.
|
|
'';
|
|
};
|
|
|
|
extraConfig = mkOption {
|
|
default = "";
|
|
type = types.lines;
|
|
description = lib.mdDoc "Extra configuration append to unit";
|
|
};
|
|
};
|
|
|
|
networkdOptions = {
|
|
networkConfig = mkOption {
|
|
default = {};
|
|
example = { SpeedMeter = true; ManageForeignRoutingPolicyRules = false; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.global.sectionNetwork;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[Network]` section of the networkd config.
|
|
See {manpage}`networkd.conf(5)` for details.
|
|
'';
|
|
};
|
|
|
|
dhcpV4Config = mkOption {
|
|
default = {};
|
|
example = { DUIDType = "vendor"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.global.sectionDHCPv4;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[DHCPv4]` section of the networkd config.
|
|
See {manpage}`networkd.conf(5)` for details.
|
|
'';
|
|
};
|
|
|
|
dhcpV6Config = mkOption {
|
|
default = {};
|
|
example = { DUIDType = "vendor"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.global.sectionDHCPv6;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[DHCPv6]` section of the networkd config.
|
|
See {manpage}`networkd.conf(5)` for details.
|
|
'';
|
|
};
|
|
};
|
|
|
|
linkOptions = commonNetworkOptions // {
|
|
# overwrite enable option from above
|
|
enable = mkOption {
|
|
default = true;
|
|
type = types.bool;
|
|
description = lib.mdDoc ''
|
|
Whether to enable this .link unit. It's handled by udev no matter if {command}`systemd-networkd` is enabled or not
|
|
'';
|
|
};
|
|
|
|
linkConfig = mkOption {
|
|
default = {};
|
|
example = { MACAddress = "00:ff:ee:aa:cc:dd"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.link.sectionLink;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[Link]` section of the unit. See
|
|
{manpage}`systemd.link(5)` for details.
|
|
'';
|
|
};
|
|
|
|
};
|
|
|
|
wireguardPeerOptions = {
|
|
options = {
|
|
wireguardPeerConfig = mkOption {
|
|
default = {};
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionWireGuardPeer;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[WireGuardPeer]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
netdevOptions = commonNetworkOptions // {
|
|
|
|
netdevConfig = mkOption {
|
|
example = { Name = "mybridge"; Kind = "bridge"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionNetdev;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[Netdev]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
'';
|
|
};
|
|
|
|
vlanConfig = mkOption {
|
|
default = {};
|
|
example = { Id = 4; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionVLAN;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[VLAN]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
'';
|
|
};
|
|
|
|
macvlanConfig = mkOption {
|
|
default = {};
|
|
example = { Mode = "private"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionMACVLAN;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[MACVLAN]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
'';
|
|
};
|
|
|
|
vxlanConfig = mkOption {
|
|
default = {};
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionVXLAN;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[VXLAN]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
'';
|
|
};
|
|
|
|
tunnelConfig = mkOption {
|
|
default = {};
|
|
example = { Remote = "192.168.1.1"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionTunnel;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[Tunnel]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
'';
|
|
};
|
|
|
|
fooOverUDPConfig = mkOption {
|
|
default = { };
|
|
example = { Port = 9001; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionFooOverUDP;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[FooOverUDP]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
'';
|
|
};
|
|
|
|
peerConfig = mkOption {
|
|
default = {};
|
|
example = { Name = "veth2"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionPeer;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[Peer]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
'';
|
|
};
|
|
|
|
tunConfig = mkOption {
|
|
default = {};
|
|
example = { User = "openvpn"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionTun;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[Tun]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
'';
|
|
};
|
|
|
|
tapConfig = mkOption {
|
|
default = {};
|
|
example = { User = "openvpn"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionTap;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[Tap]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
'';
|
|
};
|
|
|
|
wireguardConfig = mkOption {
|
|
default = {};
|
|
example = {
|
|
PrivateKeyFile = "/etc/wireguard/secret.key";
|
|
ListenPort = 51820;
|
|
FirewallMark = 42;
|
|
};
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionWireGuard;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[WireGuard]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
Use `PrivateKeyFile` instead of
|
|
`PrivateKey`: the nix store is
|
|
world-readable.
|
|
'';
|
|
};
|
|
|
|
wireguardPeers = mkOption {
|
|
default = [];
|
|
example = [ { wireguardPeerConfig={
|
|
Endpoint = "192.168.1.1:51820";
|
|
PublicKey = "27s0OvaBBdHoJYkH9osZpjpgSOVNw+RaKfboT/Sfq0g=";
|
|
PresharedKeyFile = "/etc/wireguard/psk.key";
|
|
AllowedIPs = [ "10.0.0.1/32" ];
|
|
PersistentKeepalive = 15;
|
|
};}];
|
|
type = with types; listOf (submodule wireguardPeerOptions);
|
|
description = lib.mdDoc ''
|
|
Each item in this array specifies an option in the
|
|
`[WireGuardPeer]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
Use `PresharedKeyFile` instead of
|
|
`PresharedKey`: the nix store is
|
|
world-readable.
|
|
'';
|
|
};
|
|
|
|
bondConfig = mkOption {
|
|
default = {};
|
|
example = { Mode = "802.3ad"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionBond;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[Bond]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
'';
|
|
};
|
|
|
|
xfrmConfig = mkOption {
|
|
default = {};
|
|
example = { InterfaceId = 1; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionXfrm;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[Xfrm]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
'';
|
|
};
|
|
|
|
vrfConfig = mkOption {
|
|
default = {};
|
|
example = { Table = 2342; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionVRF;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[VRF]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
A detailed explanation about how VRFs work can be found in the
|
|
[kernel docs](https://www.kernel.org/doc/Documentation/networking/vrf.txt).
|
|
'';
|
|
};
|
|
|
|
batmanAdvancedConfig = mkOption {
|
|
default = {};
|
|
example = {
|
|
GatewayMode = "server";
|
|
RoutingAlgorithm = "batman-v";
|
|
};
|
|
type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionBatmanAdvanced;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[BatmanAdvanced]` section of the unit. See
|
|
{manpage}`systemd.netdev(5)` for details.
|
|
'';
|
|
};
|
|
|
|
};
|
|
|
|
addressOptions = {
|
|
options = {
|
|
addressConfig = mkOption {
|
|
example = { Address = "192.168.0.100/24"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.network.sectionAddress;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[Address]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
routingPolicyRulesOptions = {
|
|
options = {
|
|
routingPolicyRuleConfig = mkOption {
|
|
default = { };
|
|
example = { Table = 10; IncomingInterface = "eth1"; Family = "both"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.network.sectionRoutingPolicyRule;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[RoutingPolicyRule]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
routeOptions = {
|
|
options = {
|
|
routeConfig = mkOption {
|
|
default = {};
|
|
example = { Gateway = "192.168.0.1"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.network.sectionRoute;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[Route]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
ipv6PrefixOptions = {
|
|
options = {
|
|
ipv6PrefixConfig = mkOption {
|
|
default = {};
|
|
example = { Prefix = "fd00::/64"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.network.sectionIPv6Prefix;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[IPv6Prefix]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
ipv6RoutePrefixOptions = {
|
|
options = {
|
|
ipv6RoutePrefixConfig = mkOption {
|
|
default = {};
|
|
example = { Route = "fd00::/64"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.network.sectionIPv6RoutePrefix;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[IPv6RoutePrefix]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
dhcpServerStaticLeaseOptions = {
|
|
options = {
|
|
dhcpServerStaticLeaseConfig = mkOption {
|
|
default = {};
|
|
example = { MACAddress = "65:43:4a:5b:d8:5f"; Address = "192.168.1.42"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.network.sectionDHCPServerStaticLease;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[DHCPServerStaticLease]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
|
|
Make sure to configure the corresponding client interface to use
|
|
`ClientIdentifier=mac`.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
networkOptions = commonNetworkOptions // {
|
|
|
|
linkConfig = mkOption {
|
|
default = {};
|
|
example = { Unmanaged = true; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.network.sectionLink;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[Link]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
networkConfig = mkOption {
|
|
default = {};
|
|
example = { Description = "My Network"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.network.sectionNetwork;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[Network]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
# systemd.network.networks.*.dhcpConfig has been deprecated in favor of ….dhcpV4Config
|
|
# Produce a nice warning message so users know it is gone.
|
|
dhcpConfig = mkOption {
|
|
visible = false;
|
|
apply = _: throw "The option `systemd.network.networks.*.dhcpConfig` can no longer be used since it's been removed. Please use `systemd.network.networks.*.dhcpV4Config` instead.";
|
|
};
|
|
|
|
dhcpV4Config = mkOption {
|
|
default = {};
|
|
example = { UseDNS = true; UseRoutes = true; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.network.sectionDHCPv4;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[DHCPv4]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
dhcpV6Config = mkOption {
|
|
default = {};
|
|
example = { UseDNS = true; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.network.sectionDHCPv6;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[DHCPv6]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
dhcpV6PrefixDelegationConfig = mkOption {
|
|
visible = false;
|
|
apply = _: throw "The option `systemd.network.networks.<name>.dhcpV6PrefixDelegationConfig` has been renamed to `systemd.network.networks.<name>.dhcpPrefixDelegationConfig`.";
|
|
};
|
|
|
|
dhcpPrefixDelegationConfig = mkOption {
|
|
default = {};
|
|
example = { SubnetId = "auto"; Announce = true; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.network.sectionDHCPPrefixDelegation;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[DHCPPrefixDelegation]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
ipv6AcceptRAConfig = mkOption {
|
|
default = {};
|
|
example = { UseDNS = true; DHCPv6Client = "always"; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.network.sectionIPv6AcceptRA;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[IPv6AcceptRA]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
dhcpServerConfig = mkOption {
|
|
default = {};
|
|
example = { PoolOffset = 50; EmitDNS = false; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.network.sectionDHCPServer;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[DHCPServer]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
# systemd.network.networks.*.ipv6PrefixDelegationConfig has been deprecated
|
|
# in 247 in favor of systemd.network.networks.*.ipv6SendRAConfig.
|
|
ipv6PrefixDelegationConfig = mkOption {
|
|
visible = false;
|
|
apply = _: throw "The option `systemd.network.networks.*.ipv6PrefixDelegationConfig` has been replaced by `systemd.network.networks.*.ipv6SendRAConfig`.";
|
|
};
|
|
|
|
ipv6SendRAConfig = mkOption {
|
|
default = {};
|
|
example = { EmitDNS = true; Managed = true; OtherInformation = true; };
|
|
type = types.addCheck (types.attrsOf unitOption) check.network.sectionIPv6SendRA;
|
|
description = lib.mdDoc ''
|
|
Each attribute in this set specifies an option in the
|
|
`[IPv6SendRA]` section of the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
dhcpServerStaticLeases = mkOption {
|
|
default = [];
|
|
example = [ { dhcpServerStaticLeaseConfig = { MACAddress = "65:43:4a:5b:d8:5f"; Address = "192.168.1.42"; }; } ];
|
|
type = with types; listOf (submodule dhcpServerStaticLeaseOptions);
|
|
description = lib.mdDoc ''
|
|
A list of DHCPServerStaticLease sections to be added to the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
ipv6Prefixes = mkOption {
|
|
default = [];
|
|
example = [ { ipv6PrefixConfig = { AddressAutoconfiguration = true; OnLink = true; }; } ];
|
|
type = with types; listOf (submodule ipv6PrefixOptions);
|
|
description = lib.mdDoc ''
|
|
A list of ipv6Prefix sections to be added to the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
ipv6RoutePrefixes = mkOption {
|
|
default = [];
|
|
example = [ { ipv6RoutePrefixConfig = { Route = "fd00::/64"; LifetimeSec = 3600; }; } ];
|
|
type = with types; listOf (submodule ipv6RoutePrefixOptions);
|
|
description = lib.mdDoc ''
|
|
A list of ipv6RoutePrefix sections to be added to the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
name = mkOption {
|
|
type = types.nullOr types.str;
|
|
default = null;
|
|
description = lib.mdDoc ''
|
|
The name of the network interface to match against.
|
|
'';
|
|
};
|
|
|
|
DHCP = mkOption {
|
|
type = types.nullOr types.str;
|
|
default = null;
|
|
description = lib.mdDoc ''
|
|
Whether to enable DHCP on the interfaces matched.
|
|
'';
|
|
};
|
|
|
|
domains = mkOption {
|
|
type = types.nullOr (types.listOf types.str);
|
|
default = null;
|
|
description = lib.mdDoc ''
|
|
A list of domains to pass to the network config.
|
|
'';
|
|
};
|
|
|
|
address = mkOption {
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
description = lib.mdDoc ''
|
|
A list of addresses to be added to the network section of the
|
|
unit. See {manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
gateway = mkOption {
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
description = lib.mdDoc ''
|
|
A list of gateways to be added to the network section of the
|
|
unit. See {manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
dns = mkOption {
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
description = lib.mdDoc ''
|
|
A list of dns servers to be added to the network section of the
|
|
unit. See {manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
ntp = mkOption {
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
description = lib.mdDoc ''
|
|
A list of ntp servers to be added to the network section of the
|
|
unit. See {manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
bridge = mkOption {
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
description = lib.mdDoc ''
|
|
A list of bridge interfaces to be added to the network section of the
|
|
unit. See {manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
bond = mkOption {
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
description = lib.mdDoc ''
|
|
A list of bond interfaces to be added to the network section of the
|
|
unit. See {manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
vrf = mkOption {
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
description = lib.mdDoc ''
|
|
A list of vrf interfaces to be added to the network section of the
|
|
unit. See {manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
vlan = mkOption {
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
description = lib.mdDoc ''
|
|
A list of vlan interfaces to be added to the network section of the
|
|
unit. See {manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
macvlan = mkOption {
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
description = lib.mdDoc ''
|
|
A list of macvlan interfaces to be added to the network section of the
|
|
unit. See {manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
vxlan = mkOption {
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
description = lib.mdDoc ''
|
|
A list of vxlan interfaces to be added to the network section of the
|
|
unit. See {manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
tunnel = mkOption {
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
description = lib.mdDoc ''
|
|
A list of tunnel interfaces to be added to the network section of the
|
|
unit. See {manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
xfrm = mkOption {
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
description = lib.mdDoc ''
|
|
A list of xfrm interfaces to be added to the network section of the
|
|
unit. See {manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
addresses = mkOption {
|
|
default = [ ];
|
|
type = with types; listOf (submodule addressOptions);
|
|
description = lib.mdDoc ''
|
|
A list of address sections to be added to the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
routingPolicyRules = mkOption {
|
|
default = [ ];
|
|
type = with types; listOf (submodule routingPolicyRulesOptions);
|
|
description = lib.mdDoc ''
|
|
A list of routing policy rules sections to be added to the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
routes = mkOption {
|
|
default = [ ];
|
|
type = with types; listOf (submodule routeOptions);
|
|
description = lib.mdDoc ''
|
|
A list of route sections to be added to the unit. See
|
|
{manpage}`systemd.network(5)` for details.
|
|
'';
|
|
};
|
|
|
|
};
|
|
|
|
networkConfig = { config, ... }: {
|
|
config = {
|
|
matchConfig = optionalAttrs (config.name != null) {
|
|
Name = config.name;
|
|
};
|
|
networkConfig = optionalAttrs (config.DHCP != null) {
|
|
DHCP = config.DHCP;
|
|
} // optionalAttrs (config.domains != null) {
|
|
Domains = concatStringsSep " " config.domains;
|
|
};
|
|
};
|
|
};
|
|
|
|
networkdConfig = { config, ... }: {
|
|
options = {
|
|
routeTables = mkOption {
|
|
default = {};
|
|
example = { foo = 27; };
|
|
type = with types; attrsOf int;
|
|
description = lib.mdDoc ''
|
|
Defines route table names as an attrset of name to number.
|
|
See {manpage}`networkd.conf(5)` for details.
|
|
'';
|
|
};
|
|
|
|
addRouteTablesToIPRoute2 = mkOption {
|
|
default = true;
|
|
example = false;
|
|
type = types.bool;
|
|
description = lib.mdDoc ''
|
|
If true and routeTables are set, then the specified route tables
|
|
will also be installed into /etc/iproute2/rt_tables.
|
|
'';
|
|
};
|
|
};
|
|
|
|
config = {
|
|
networkConfig = optionalAttrs (config.routeTables != { }) {
|
|
RouteTable = mapAttrsToList
|
|
(name: number: "${name}:${toString number}")
|
|
config.routeTables;
|
|
};
|
|
};
|
|
};
|
|
|
|
commonMatchText = def: optionalString (def.matchConfig != { }) ''
|
|
[Match]
|
|
${attrsToSection def.matchConfig}
|
|
'';
|
|
|
|
linkToUnit = name: def:
|
|
{ inherit (def) enable;
|
|
text = commonMatchText def
|
|
+ ''
|
|
[Link]
|
|
${attrsToSection def.linkConfig}
|
|
''
|
|
+ def.extraConfig;
|
|
};
|
|
|
|
netdevToUnit = name: def:
|
|
{ inherit (def) enable;
|
|
text = commonMatchText def
|
|
+ ''
|
|
[NetDev]
|
|
${attrsToSection def.netdevConfig}
|
|
''
|
|
+ optionalString (def.vlanConfig != { }) ''
|
|
[VLAN]
|
|
${attrsToSection def.vlanConfig}
|
|
''
|
|
+ optionalString (def.macvlanConfig != { }) ''
|
|
[MACVLAN]
|
|
${attrsToSection def.macvlanConfig}
|
|
''
|
|
+ optionalString (def.vxlanConfig != { }) ''
|
|
[VXLAN]
|
|
${attrsToSection def.vxlanConfig}
|
|
''
|
|
+ optionalString (def.tunnelConfig != { }) ''
|
|
[Tunnel]
|
|
${attrsToSection def.tunnelConfig}
|
|
''
|
|
+ optionalString (def.fooOverUDPConfig != { }) ''
|
|
[FooOverUDP]
|
|
${attrsToSection def.fooOverUDPConfig}
|
|
''
|
|
+ optionalString (def.peerConfig != { }) ''
|
|
[Peer]
|
|
${attrsToSection def.peerConfig}
|
|
''
|
|
+ optionalString (def.tunConfig != { }) ''
|
|
[Tun]
|
|
${attrsToSection def.tunConfig}
|
|
''
|
|
+ optionalString (def.tapConfig != { }) ''
|
|
[Tap]
|
|
${attrsToSection def.tapConfig}
|
|
''
|
|
+ optionalString (def.wireguardConfig != { }) ''
|
|
[WireGuard]
|
|
${attrsToSection def.wireguardConfig}
|
|
''
|
|
+ flip concatMapStrings def.wireguardPeers (x: ''
|
|
[WireGuardPeer]
|
|
${attrsToSection x.wireguardPeerConfig}
|
|
'')
|
|
+ optionalString (def.bondConfig != { }) ''
|
|
[Bond]
|
|
${attrsToSection def.bondConfig}
|
|
''
|
|
+ optionalString (def.xfrmConfig != { }) ''
|
|
[Xfrm]
|
|
${attrsToSection def.xfrmConfig}
|
|
''
|
|
+ optionalString (def.vrfConfig != { }) ''
|
|
[VRF]
|
|
${attrsToSection def.vrfConfig}
|
|
''
|
|
+ optionalString (def.batmanAdvancedConfig != { }) ''
|
|
[BatmanAdvanced]
|
|
${attrsToSection def.batmanAdvancedConfig}
|
|
''
|
|
+ def.extraConfig;
|
|
};
|
|
|
|
renderConfig = def:
|
|
{ text = ''
|
|
[Network]
|
|
${attrsToSection def.networkConfig}
|
|
''
|
|
+ optionalString (def.dhcpV4Config != { }) ''
|
|
[DHCPv4]
|
|
${attrsToSection def.dhcpV4Config}
|
|
''
|
|
+ optionalString (def.dhcpV6Config != { }) ''
|
|
[DHCPv6]
|
|
${attrsToSection def.dhcpV6Config}
|
|
''; };
|
|
|
|
networkToUnit = name: def:
|
|
{ inherit (def) enable;
|
|
text = commonMatchText def
|
|
+ optionalString (def.linkConfig != { }) ''
|
|
[Link]
|
|
${attrsToSection def.linkConfig}
|
|
''
|
|
+ ''
|
|
[Network]
|
|
''
|
|
+ attrsToSection def.networkConfig
|
|
+ optionalString (def.address != [ ]) ''
|
|
${concatStringsSep "\n" (map (s: "Address=${s}") def.address)}
|
|
''
|
|
+ optionalString (def.gateway != [ ]) ''
|
|
${concatStringsSep "\n" (map (s: "Gateway=${s}") def.gateway)}
|
|
''
|
|
+ optionalString (def.dns != [ ]) ''
|
|
${concatStringsSep "\n" (map (s: "DNS=${s}") def.dns)}
|
|
''
|
|
+ optionalString (def.ntp != [ ]) ''
|
|
${concatStringsSep "\n" (map (s: "NTP=${s}") def.ntp)}
|
|
''
|
|
+ optionalString (def.bridge != [ ]) ''
|
|
${concatStringsSep "\n" (map (s: "Bridge=${s}") def.bridge)}
|
|
''
|
|
+ optionalString (def.bond != [ ]) ''
|
|
${concatStringsSep "\n" (map (s: "Bond=${s}") def.bond)}
|
|
''
|
|
+ optionalString (def.vrf != [ ]) ''
|
|
${concatStringsSep "\n" (map (s: "VRF=${s}") def.vrf)}
|
|
''
|
|
+ optionalString (def.vlan != [ ]) ''
|
|
${concatStringsSep "\n" (map (s: "VLAN=${s}") def.vlan)}
|
|
''
|
|
+ optionalString (def.macvlan != [ ]) ''
|
|
${concatStringsSep "\n" (map (s: "MACVLAN=${s}") def.macvlan)}
|
|
''
|
|
+ optionalString (def.vxlan != [ ]) ''
|
|
${concatStringsSep "\n" (map (s: "VXLAN=${s}") def.vxlan)}
|
|
''
|
|
+ optionalString (def.tunnel != [ ]) ''
|
|
${concatStringsSep "\n" (map (s: "Tunnel=${s}") def.tunnel)}
|
|
''
|
|
+ optionalString (def.xfrm != [ ]) ''
|
|
${concatStringsSep "\n" (map (s: "Xfrm=${s}") def.xfrm)}
|
|
''
|
|
+ ''
|
|
|
|
''
|
|
+ flip concatMapStrings def.addresses (x: ''
|
|
[Address]
|
|
${attrsToSection x.addressConfig}
|
|
'')
|
|
+ flip concatMapStrings def.routingPolicyRules (x: ''
|
|
[RoutingPolicyRule]
|
|
${attrsToSection x.routingPolicyRuleConfig}
|
|
'')
|
|
+ flip concatMapStrings def.routes (x: ''
|
|
[Route]
|
|
${attrsToSection x.routeConfig}
|
|
'')
|
|
+ optionalString (def.dhcpV4Config != { }) ''
|
|
[DHCPv4]
|
|
${attrsToSection def.dhcpV4Config}
|
|
''
|
|
+ optionalString (def.dhcpV6Config != { }) ''
|
|
[DHCPv6]
|
|
${attrsToSection def.dhcpV6Config}
|
|
''
|
|
+ optionalString (def.dhcpPrefixDelegationConfig != { }) ''
|
|
[DHCPPrefixDelegation]
|
|
${attrsToSection def.dhcpPrefixDelegationConfig}
|
|
''
|
|
+ optionalString (def.ipv6AcceptRAConfig != { }) ''
|
|
[IPv6AcceptRA]
|
|
${attrsToSection def.ipv6AcceptRAConfig}
|
|
''
|
|
+ optionalString (def.dhcpServerConfig != { }) ''
|
|
[DHCPServer]
|
|
${attrsToSection def.dhcpServerConfig}
|
|
''
|
|
+ optionalString (def.ipv6SendRAConfig != { }) ''
|
|
[IPv6SendRA]
|
|
${attrsToSection def.ipv6SendRAConfig}
|
|
''
|
|
+ flip concatMapStrings def.ipv6Prefixes (x: ''
|
|
[IPv6Prefix]
|
|
${attrsToSection x.ipv6PrefixConfig}
|
|
'')
|
|
+ flip concatMapStrings def.ipv6RoutePrefixes (x: ''
|
|
[IPv6RoutePrefix]
|
|
${attrsToSection x.ipv6RoutePrefixConfig}
|
|
'')
|
|
+ flip concatMapStrings def.dhcpServerStaticLeases (x: ''
|
|
[DHCPServerStaticLease]
|
|
${attrsToSection x.dhcpServerStaticLeaseConfig}
|
|
'')
|
|
+ def.extraConfig;
|
|
};
|
|
|
|
unitFiles = listToAttrs (map (name: {
|
|
name = "systemd/network/${name}";
|
|
value.source = "${cfg.units.${name}.unit}/${name}";
|
|
}) (attrNames cfg.units));
|
|
in
|
|
|
|
{
|
|
options = {
|
|
|
|
systemd.network.enable = mkOption {
|
|
default = false;
|
|
type = types.bool;
|
|
description = lib.mdDoc ''
|
|
Whether to enable networkd or not.
|
|
'';
|
|
};
|
|
|
|
systemd.network.links = mkOption {
|
|
default = {};
|
|
type = with types; attrsOf (submodule [ { options = linkOptions; } ]);
|
|
description = lib.mdDoc "Definition of systemd network links.";
|
|
};
|
|
|
|
systemd.network.netdevs = mkOption {
|
|
default = {};
|
|
type = with types; attrsOf (submodule [ { options = netdevOptions; } ]);
|
|
description = lib.mdDoc "Definition of systemd network devices.";
|
|
};
|
|
|
|
systemd.network.networks = mkOption {
|
|
default = {};
|
|
type = with types; attrsOf (submodule [ { options = networkOptions; } networkConfig ]);
|
|
description = lib.mdDoc "Definition of systemd networks.";
|
|
};
|
|
|
|
systemd.network.config = mkOption {
|
|
default = {};
|
|
type = with types; submodule [ { options = networkdOptions; } networkdConfig ];
|
|
description = lib.mdDoc "Definition of global systemd network config.";
|
|
};
|
|
|
|
systemd.network.units = mkOption {
|
|
description = lib.mdDoc "Definition of networkd units.";
|
|
default = {};
|
|
internal = true;
|
|
type = with types; attrsOf (submodule (
|
|
{ name, config, ... }:
|
|
{ options = mapAttrs (_: x: x // { internal = true; }) concreteUnitOptions;
|
|
config = {
|
|
unit = mkDefault (makeUnit name config);
|
|
};
|
|
}));
|
|
};
|
|
|
|
systemd.network.wait-online = {
|
|
anyInterface = mkOption {
|
|
description = lib.mdDoc ''
|
|
Whether to consider the network online when any interface is online, as opposed to all of them.
|
|
This is useful on portable machines with a wired and a wireless interface, for example.
|
|
'';
|
|
type = types.bool;
|
|
default = false;
|
|
};
|
|
|
|
ignoredInterfaces = mkOption {
|
|
description = lib.mdDoc ''
|
|
Network interfaces to be ignored when deciding if the system is online.
|
|
'';
|
|
type = with types; listOf str;
|
|
default = [];
|
|
example = [ "wg0" ];
|
|
};
|
|
|
|
timeout = mkOption {
|
|
description = lib.mdDoc ''
|
|
Time to wait for the network to come online, in seconds. Set to 0 to disable.
|
|
'';
|
|
type = types.ints.unsigned;
|
|
default = 120;
|
|
example = 0;
|
|
};
|
|
|
|
extraArgs = mkOption {
|
|
description = lib.mdDoc ''
|
|
Extra command-line arguments to pass to systemd-networkd-wait-online.
|
|
These also affect per-interface `systemd-network-wait-online@` services.
|
|
|
|
See [{manpage}`systemd-networkd-wait-online.service(8)`](https://www.freedesktop.org/software/systemd/man/systemd-networkd-wait-online.service.html) for all available options.
|
|
'';
|
|
type = with types; listOf str;
|
|
default = [];
|
|
};
|
|
};
|
|
|
|
};
|
|
|
|
config = mkMerge [
|
|
|
|
# .link units are honored by udev, no matter if systemd-networkd is enabled or not.
|
|
{
|
|
systemd.network.units = mapAttrs' (n: v: nameValuePair "${n}.link" (linkToUnit n v)) cfg.links;
|
|
environment.etc = unitFiles;
|
|
|
|
systemd.network.wait-online.extraArgs =
|
|
[ "--timeout=${toString cfg.wait-online.timeout}" ]
|
|
++ optional cfg.wait-online.anyInterface "--any"
|
|
++ map (i: "--ignore=${i}") cfg.wait-online.ignoredInterfaces;
|
|
}
|
|
|
|
(mkIf config.systemd.network.enable {
|
|
|
|
users.users.systemd-network.group = "systemd-network";
|
|
|
|
systemd.additionalUpstreamSystemUnits = [
|
|
"systemd-networkd-wait-online.service"
|
|
"systemd-networkd.service"
|
|
"systemd-networkd.socket"
|
|
];
|
|
|
|
systemd.network.units = mapAttrs' (n: v: nameValuePair "${n}.netdev" (netdevToUnit n v)) cfg.netdevs
|
|
// mapAttrs' (n: v: nameValuePair "${n}.network" (networkToUnit n v)) cfg.networks;
|
|
|
|
# systemd-networkd is socket-activated by kernel netlink route change
|
|
# messages. It is important to have systemd buffer those on behalf of
|
|
# networkd.
|
|
systemd.sockets.systemd-networkd.wantedBy = [ "sockets.target" ];
|
|
|
|
systemd.services.systemd-networkd = {
|
|
wantedBy = [ "multi-user.target" ];
|
|
aliases = [ "dbus-org.freedesktop.network1.service" ];
|
|
restartTriggers = map (x: x.source) (attrValues unitFiles) ++ [
|
|
config.environment.etc."systemd/networkd.conf".source
|
|
];
|
|
};
|
|
|
|
systemd.services.systemd-networkd-wait-online = {
|
|
wantedBy = [ "network-online.target" ];
|
|
serviceConfig.ExecStart = [
|
|
""
|
|
"${config.systemd.package}/lib/systemd/systemd-networkd-wait-online ${utils.escapeSystemdExecArgs cfg.wait-online.extraArgs}"
|
|
];
|
|
};
|
|
|
|
systemd.services."systemd-network-wait-online@" = {
|
|
description = "Wait for Network Interface %I to be Configured";
|
|
conflicts = [ "shutdown.target" ];
|
|
requisite = [ "systemd-networkd.service" ];
|
|
after = [ "systemd-networkd.service" ];
|
|
serviceConfig = {
|
|
Type = "oneshot";
|
|
RemainAfterExit = true;
|
|
ExecStart = "${config.systemd.package}/lib/systemd/systemd-networkd-wait-online -i %I ${utils.escapeSystemdExecArgs cfg.wait-online.extraArgs}";
|
|
};
|
|
};
|
|
|
|
environment.etc."systemd/networkd.conf" = renderConfig cfg.config;
|
|
|
|
networking.iproute2 = mkIf (cfg.config.addRouteTablesToIPRoute2 && cfg.config.routeTables != { }) {
|
|
enable = mkDefault true;
|
|
rttablesExtraConfig = ''
|
|
|
|
# Extra tables defined in NixOS systemd.networkd.config.routeTables.
|
|
${concatStringsSep "\n" (mapAttrsToList (name: number: "${toString number} ${name}") cfg.config.routeTables)}
|
|
'';
|
|
};
|
|
|
|
services.resolved.enable = mkDefault true;
|
|
})
|
|
];
|
|
}
|