{ config, lib, pkgs, utils, ... }: # TODO: # # asserts # ensure that the nl80211 module is loaded/compiled in the kernel # wpa_supplicant and hostapd on the same wireless interface doesn't make any sense with lib; let cfg = config.services.hostapd; escapedInterface = utils.escapeSystemdPath cfg.interface; configFile = pkgs.writeText "hostapd.conf" '' interface=${cfg.interface} driver=${cfg.driver} ssid=${cfg.ssid} hw_mode=${cfg.hwMode} channel=${toString cfg.channel} ${optionalString (cfg.countryCode != null) ''country_code=${cfg.countryCode}''} # logging (debug level) logger_syslog=-1 logger_syslog_level=2 logger_stdout=-1 logger_stdout_level=2 ctrl_interface=/run/hostapd ctrl_interface_group=${cfg.group} ${optionalString cfg.wpa '' wpa=2 wpa_passphrase=${cfg.wpaPassphrase} ''} ${optionalString cfg.noScan "noscan=1"} ${cfg.extraConfig} '' ; in { ###### interface options = { services.hostapd = { enable = mkOption { default = false; description = '' Enable putting a wireless interface into infrastructure mode, allowing other wireless devices to associate with the wireless interface and do wireless networking. A simple access point will , , and , as well as DHCP on the wireless interface to provide IP addresses to the associated stations, and NAT (from the wireless interface to an upstream interface). ''; }; interface = mkOption { default = ""; example = "wlp2s0"; description = '' The interfaces hostapd will use. ''; }; noScan = mkOption { default = false; description = '' Do not scan for overlapping BSSs in HT40+/- mode. Caution: turning this on will violate regulatory requirements! ''; }; driver = mkOption { default = "nl80211"; example = "hostapd"; type = types.str; description = '' Which driver hostapd will use. Most applications will probably use the default. ''; }; ssid = mkOption { default = "nixos"; example = "mySpecialSSID"; type = types.str; description = "SSID to be used in IEEE 802.11 management frames."; }; hwMode = mkOption { default = "g"; type = types.enum [ "a" "b" "g" ]; description = '' Operation mode. (a = IEEE 802.11a, b = IEEE 802.11b, g = IEEE 802.11g). ''; }; channel = mkOption { default = 7; example = 11; type = types.int; description = '' Channel number (IEEE 802.11) Please note that some drivers do not use this value from hostapd and the channel will need to be configured separately with iwconfig. ''; }; group = mkOption { default = "wheel"; example = "network"; type = types.str; description = '' Members of this group can control hostapd. ''; }; wpa = mkOption { default = true; description = '' Enable WPA (IEEE 802.11i/D3.0) to authenticate with the access point. ''; }; wpaPassphrase = mkOption { default = "my_sekret"; example = "any_64_char_string"; type = types.str; description = '' WPA-PSK (pre-shared-key) passphrase. Clients will need this passphrase to associate with this access point. Warning: This passphrase will get put into a world-readable file in the Nix store! ''; }; countryCode = mkOption { default = null; example = "US"; type = with types; nullOr str; description = '' Country code (ISO/IEC 3166-1). Used to set regulatory domain. Set as needed to indicate country in which device is operating. This can limit available channels and transmit power. These two octets are used as the first two octets of the Country String (dot11CountryString) ''; }; extraConfig = mkOption { default = ""; example = '' auth_algo=0 ieee80211n=1 ht_capab=[HT40-][SHORT-GI-40][DSSS_CCK-40] ''; type = types.lines; description = "Extra configuration options to put in hostapd.conf."; }; }; }; ###### implementation config = mkIf cfg.enable { environment.systemPackages = [ pkgs.hostapd ]; services.udev.packages = optional (cfg.countryCode != null) [ pkgs.crda ]; systemd.services.hostapd = { description = "hostapd wireless AP"; path = [ pkgs.hostapd ]; after = [ "sys-subsystem-net-devices-${escapedInterface}.device" ]; bindsTo = [ "sys-subsystem-net-devices-${escapedInterface}.device" ]; requiredBy = [ "network-link-${cfg.interface}.service" ]; wantedBy = [ "multi-user.target" ]; serviceConfig = { ExecStart = "${pkgs.hostapd}/bin/hostapd ${configFile}"; Restart = "always"; }; }; }; }