mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-24 07:53:19 +00:00
248 lines
7.9 KiB
Nix
248 lines
7.9 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
let
|
|
cfg = config.services.inadyn;
|
|
|
|
# check if a value of an attrset is not null or an empty collection
|
|
nonEmptyValue = _: v: v != null && v != [ ] && v != { };
|
|
|
|
renderOption = k: v:
|
|
if builtins.elem k [ "provider" "custom" ] then
|
|
lib.concatStringsSep "\n"
|
|
(lib.mapAttrsToList
|
|
(name: config: ''
|
|
${k} ${name} {
|
|
${lib.concatStringsSep "\n " (lib.mapAttrsToList renderOption (lib.filterAttrs nonEmptyValue config))}
|
|
}'')
|
|
v)
|
|
else if k == "include" then
|
|
"${k}(\"${v}\")"
|
|
else if k == "hostname" && builtins.isList v then
|
|
"${k} = { ${builtins.concatStringsSep ", " (map (s: "\"${s}\"") v)} }"
|
|
else if builtins.isBool v then
|
|
"${k} = ${lib.boolToString v}"
|
|
else if builtins.isString v then
|
|
"${k} = \"${v}\""
|
|
else
|
|
"${k} = ${toString v}";
|
|
|
|
configFile' = pkgs.writeText "inadyn.conf"
|
|
''
|
|
# This file was generated by nix
|
|
# do not edit
|
|
|
|
${(lib.concatStringsSep "\n" (lib.mapAttrsToList renderOption (lib.filterAttrs nonEmptyValue cfg.settings)))}
|
|
'';
|
|
|
|
configFile = if (cfg.configFile != null) then cfg.configFile else configFile';
|
|
in
|
|
{
|
|
options.services.inadyn = with lib.types;
|
|
let
|
|
providerOptions =
|
|
{
|
|
include = lib.mkOption {
|
|
default = null;
|
|
description = "File to include additional settings for this provider from.";
|
|
type = nullOr path;
|
|
};
|
|
ssl = lib.mkOption {
|
|
default = true;
|
|
description = "Whether to use HTTPS for this DDNS provider.";
|
|
type = bool;
|
|
};
|
|
username = lib.mkOption {
|
|
default = null;
|
|
description = "Username for this DDNS provider.";
|
|
type = nullOr str;
|
|
};
|
|
password = lib.mkOption {
|
|
default = null;
|
|
description = ''
|
|
Password for this DDNS provider.
|
|
|
|
WARNING: This will be world-readable in the nix store.
|
|
To store credentials securely, use the `include` or `configFile` options.
|
|
'';
|
|
type = nullOr str;
|
|
};
|
|
hostname = lib.mkOption {
|
|
default = "*";
|
|
example = "your.cool-domain.com";
|
|
description = "Hostname alias(es).";
|
|
type = either str (listOf str);
|
|
};
|
|
};
|
|
in
|
|
{
|
|
enable = lib.mkEnableOption (''
|
|
synchronise your machine's IP address with a dynamic DNS provider using inadyn
|
|
'');
|
|
user = lib.mkOption {
|
|
default = "inadyn";
|
|
type = lib.types.str;
|
|
description = ''
|
|
User account under which inadyn runs.
|
|
|
|
::: {.note}
|
|
If left as the default value this user will automatically be created
|
|
on system activation, otherwise you are responsible for
|
|
ensuring the user exists before the inadyn service starts.
|
|
:::
|
|
'';
|
|
};
|
|
group = lib.mkOption {
|
|
default = "inadyn";
|
|
type = lib.types.str;
|
|
description = ''
|
|
Group account under which inadyn runs.
|
|
|
|
::: {.note}
|
|
If left as the default value this user will automatically be created
|
|
on system activation, otherwise you are responsible for
|
|
ensuring the user exists before the inadyn service starts.
|
|
:::
|
|
'';
|
|
};
|
|
interval = lib.mkOption {
|
|
default = "*-*-* *:*:00";
|
|
description = ''
|
|
How often to check the current IP.
|
|
Uses the format described in {manpage}`systemd.time(7)`";
|
|
'';
|
|
type = str;
|
|
};
|
|
logLevel = lib.mkOption {
|
|
type = lib.types.enum [ "none" "err" "warning" "info" "notice" "debug" ];
|
|
default = "notice";
|
|
description = "Set inadyn's log level.";
|
|
};
|
|
settings = lib.mkOption {
|
|
default = { };
|
|
description = "See `inadyn.conf (5)`";
|
|
type = submodule {
|
|
freeformType = attrs;
|
|
options = {
|
|
allow-ipv6 = lib.mkOption {
|
|
default = config.networking.enableIPv6;
|
|
defaultText = "`config.networking.enableIPv6`";
|
|
description = "Whether to get IPv6 addresses from interfaces.";
|
|
type = bool;
|
|
};
|
|
forced-update = lib.mkOption {
|
|
default = 2592000;
|
|
description = "Duration (in seconds) after which an update is forced.";
|
|
type = ints.positive;
|
|
};
|
|
provider = lib.mkOption {
|
|
default = { };
|
|
description = ''
|
|
Settings for DDNS providers built-in to inadyn.
|
|
|
|
For a list of built-in providers, see `inadyn.conf (5)`.
|
|
'';
|
|
type = attrsOf (submodule {
|
|
freeformType = attrs;
|
|
options = providerOptions;
|
|
});
|
|
};
|
|
custom = lib.mkOption {
|
|
default = { };
|
|
description = ''
|
|
Settings for custom DNS providers.
|
|
'';
|
|
type = attrsOf (submodule {
|
|
freeformType = attrs;
|
|
options = providerOptions // {
|
|
ddns-server = lib.mkOption {
|
|
description = "DDNS server name.";
|
|
type = str;
|
|
};
|
|
ddns-path = lib.mkOption {
|
|
description = ''
|
|
DDNS server path.
|
|
|
|
See `inadnyn.conf (5)` for a list for format specifiers that can be used.
|
|
'';
|
|
example = "/update?user=%u&password=%p&domain=%h&myip=%i";
|
|
type = str;
|
|
};
|
|
};
|
|
});
|
|
};
|
|
};
|
|
};
|
|
};
|
|
configFile = lib.mkOption {
|
|
default = null;
|
|
description = ''
|
|
Configuration file for inadyn.
|
|
|
|
Setting this will override all other configuration options.
|
|
|
|
Passed to the inadyn service using LoadCredential.
|
|
'';
|
|
type = nullOr path;
|
|
};
|
|
};
|
|
|
|
config = lib.mkIf cfg.enable {
|
|
systemd = {
|
|
services.inadyn = {
|
|
description = "Update nameservers using inadyn";
|
|
documentation = [
|
|
"man:inadyn"
|
|
"man:inadyn.conf"
|
|
"file:${pkgs.inadyn}/share/doc/inadyn/README.md"
|
|
];
|
|
requires = [ "network-online.target" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
startAt = cfg.interval;
|
|
serviceConfig = {
|
|
Type = "oneshot";
|
|
ExecStart = ''${lib.getExe pkgs.inadyn} -f ${configFile} --cache-dir ''${CACHE_DIRECTORY} -1 --foreground -l ${cfg.logLevel}'';
|
|
LoadCredential = "config:${configFile}";
|
|
CacheDirectory = "inadyn";
|
|
|
|
User = cfg.user;
|
|
Group = cfg.group;
|
|
UMask = "0177";
|
|
LockPersonality = true;
|
|
MemoryDenyWriteExecute = true;
|
|
RestrictAddressFamilies = "AF_INET AF_INET6 AF_NETLINK";
|
|
NoNewPrivileges = true;
|
|
PrivateDevices = true;
|
|
PrivateTmp = true;
|
|
PrivateUsers = true;
|
|
ProtectSystem = "strict";
|
|
ProtectProc = "invisible";
|
|
ProtectHome = true;
|
|
ProtectClock = true;
|
|
ProtectControlGroups = true;
|
|
ProtectHostname = true;
|
|
ProtectKernelLogs = true;
|
|
ProtectKernelModules = true;
|
|
ProtectKernelTunables = true;
|
|
RestrictNamespaces = true;
|
|
RestrictRealtime = true;
|
|
RestrictSUIDSGID = true;
|
|
SystemCallArchitectures = "native";
|
|
SystemCallErrorNumber = "EPERM";
|
|
SystemCallFilter = "@system-service";
|
|
CapabilityBoundingSet = "";
|
|
};
|
|
};
|
|
|
|
timers.inadyn.timerConfig.Persistent = true;
|
|
};
|
|
|
|
users.users.inadyn = lib.mkIf (cfg.user == "inadyn") {
|
|
group = cfg.group;
|
|
isSystemUser = true;
|
|
};
|
|
|
|
users.groups = lib.mkIf (cfg.group == "inadyn") {
|
|
inadyn = { };
|
|
};
|
|
};
|
|
}
|