mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-01-04 12:03:21 +00:00
6c5ab28fce
This was done by generating a truly hilarious configuration: rg 'services\.[^.]+\.enable\t' opts-tags | cut -f1 > allonconfig.nix The following were not tested due to other evaluation errors. They should probably be manually audited. services.amule services.castopod services.ceph services.chatgpt-retrieval-plugin services.clamsmtp services.clight services.dante services.dex services.discourse services.dwm-status services.engelsystem services.foundationdb services.frigate services.frp services.grocy services.guacamole-client services.hedgedoc services.home-assistant services.honk services.imaginary services.jitsi-meet services.kerberos_server services.limesurvey services.mastodon services.mediawiki services.mobilizon services.moodle services.mosquitto services.nextcloud services.nullmailer services.patroni services.pfix-srsd services.pgpkeyserver-lite services.postfixadmin services.roundcube services.schleuder services.self-deploy services.slskd services.spacecookie services.statsd services.step-ca services.sympa services.tsmBackup services.vdirsyncer services.vikunja services.yandex-disk services.zabbixWeb
52 lines
1.3 KiB
Nix
52 lines
1.3 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
let
|
|
cfg = config.services.ivpn;
|
|
in
|
|
with lib;
|
|
{
|
|
options.services.ivpn = {
|
|
enable = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = lib.mdDoc ''
|
|
This option enables iVPN daemon.
|
|
This sets {option}`networking.firewall.checkReversePath` to "loose", which might be undesirable for security.
|
|
'';
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
boot.kernelModules = [ "tun" ];
|
|
|
|
environment.systemPackages = with pkgs; [ ivpn ivpn-service ];
|
|
|
|
# iVPN writes to /etc/iproute2/rt_tables
|
|
networking.iproute2.enable = true;
|
|
networking.firewall.checkReversePath = "loose";
|
|
|
|
systemd.services.ivpn-service = {
|
|
description = "iVPN daemon";
|
|
wantedBy = [ "multi-user.target" ];
|
|
wants = [ "network.target" "network-online.target" ];
|
|
after = [
|
|
"network-online.target"
|
|
"NetworkManager.service"
|
|
"systemd-resolved.service"
|
|
];
|
|
path = [
|
|
# Needed for mount
|
|
"/run/wrappers"
|
|
];
|
|
startLimitBurst = 5;
|
|
startLimitIntervalSec = 20;
|
|
serviceConfig = {
|
|
ExecStart = "${pkgs.ivpn-service}/bin/ivpn-service --logging";
|
|
Restart = "always";
|
|
RestartSec = 1;
|
|
};
|
|
};
|
|
};
|
|
|
|
meta.maintainers = with maintainers; [ ataraxiasjel ];
|
|
}
|