mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-23 15:33:13 +00:00
722b99bc0e
rendering changes only slightly, most changes are in spacing.
81 lines
1.8 KiB
Nix
81 lines
1.8 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
with lib;
|
|
let
|
|
|
|
cfg = config.services.tor;
|
|
|
|
torify = pkgs.writeTextFile {
|
|
name = "tsocks";
|
|
text = ''
|
|
#!${pkgs.runtimeShell}
|
|
TSOCKS_CONF_FILE=${pkgs.writeText "tsocks.conf" cfg.tsocks.config} LD_PRELOAD="${pkgs.tsocks}/lib/libtsocks.so $LD_PRELOAD" "$@"
|
|
'';
|
|
executable = true;
|
|
destination = "/bin/tsocks";
|
|
};
|
|
|
|
in
|
|
|
|
{
|
|
|
|
###### interface
|
|
|
|
options = {
|
|
|
|
services.tor.tsocks = {
|
|
|
|
enable = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = lib.mdDoc ''
|
|
Whether to build tsocks wrapper script to relay application traffic via Tor.
|
|
|
|
::: {.important}
|
|
You shouldn't use this unless you know what you're
|
|
doing because your installation of Tor already comes with
|
|
its own superior (doesn't leak DNS queries)
|
|
`torsocks` wrapper which does pretty much
|
|
exactly the same thing as this.
|
|
:::
|
|
'';
|
|
};
|
|
|
|
server = mkOption {
|
|
type = types.str;
|
|
default = "localhost:9050";
|
|
example = "192.168.0.20";
|
|
description = lib.mdDoc ''
|
|
IP address of TOR client to use.
|
|
'';
|
|
};
|
|
|
|
config = mkOption {
|
|
type = types.lines;
|
|
default = "";
|
|
description = lib.mdDoc ''
|
|
Extra configuration. Contents will be added verbatim to TSocks
|
|
configuration file.
|
|
'';
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
###### implementation
|
|
|
|
config = mkIf cfg.tsocks.enable {
|
|
|
|
environment.systemPackages = [ torify ]; # expose it to the users
|
|
|
|
services.tor.tsocks.config = ''
|
|
server = ${toString(head (splitString ":" cfg.tsocks.server))}
|
|
server_port = ${toString(tail (splitString ":" cfg.tsocks.server))}
|
|
|
|
local = 127.0.0.0/255.128.0.0
|
|
local = 127.128.0.0/255.192.0.0
|
|
'';
|
|
};
|
|
|
|
}
|