nixpkgs/nixos/modules/services/networking/zerotierone.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

84 lines
2.3 KiB
Nix
Raw Normal View History

2015-06-07 04:10:52 +00:00
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.zerotierone;
in
{
options.services.zerotierone.enable = mkEnableOption (lib.mdDoc "ZeroTierOne");
options.services.zerotierone.joinNetworks = mkOption {
default = [];
example = [ "a8a2c3c10c1a68de" ];
type = types.listOf types.str;
description = lib.mdDoc ''
List of ZeroTier Network IDs to join on startup.
Note that networks are only ever joined, but not automatically left after removing them from the list.
To remove networks, use the ZeroTier CLI: `zerotier-cli leave <network-id>`
'';
};
options.services.zerotierone.port = mkOption {
default = 9993;
type = types.port;
description = lib.mdDoc ''
Network port used by ZeroTier.
'';
};
2016-08-31 10:39:55 +00:00
options.services.zerotierone.package = mkOption {
default = pkgs.zerotierone;
defaultText = literalExpression "pkgs.zerotierone";
2016-08-31 10:39:55 +00:00
type = types.package;
description = lib.mdDoc ''
ZeroTier One package to use.
'';
};
2015-06-07 04:10:52 +00:00
config = mkIf cfg.enable {
systemd.services.zerotierone = {
description = "ZeroTierOne";
2015-06-07 04:10:52 +00:00
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
wants = [ "network-online.target" ];
path = [ cfg.package ];
preStart = ''
mkdir -p /var/lib/zerotier-one/networks.d
2015-06-07 04:10:52 +00:00
chmod 700 /var/lib/zerotier-one
chown -R root:root /var/lib/zerotier-one
'' + (concatMapStrings (netId: ''
touch "/var/lib/zerotier-one/networks.d/${netId}.conf"
'') cfg.joinNetworks);
2015-06-07 04:10:52 +00:00
serviceConfig = {
ExecStart = "${cfg.package}/bin/zerotier-one -p${toString cfg.port}";
Restart = "always";
KillMode = "process";
TimeoutStopSec = 5;
2015-06-07 04:10:52 +00:00
};
};
# ZeroTier does not issue DHCP leases, but some strangers might...
networking.dhcpcd.denyInterfaces = [ "zt*" ];
# ZeroTier receives UDP transmissions
networking.firewall.allowedUDPPorts = [ cfg.port ];
2016-08-31 10:39:55 +00:00
environment.systemPackages = [ cfg.package ];
# Prevent systemd from potentially changing the MAC address
systemd.network.links."50-zerotier" = {
matchConfig = {
OriginalName = "zt*";
};
linkConfig = {
AutoNegotiation = false;
MACAddressPolicy = "none";
};
};
2015-06-07 04:10:52 +00:00
};
}