nixpkgs/nixos/modules/services/misc/siproxd.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

180 lines
4.5 KiB
Nix
Raw Normal View History

2014-07-10 18:08:38 +00:00
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.siproxd;
conf = ''
daemonize = 0
rtp_proxy_enable = 1
user = siproxd
if_inbound = ${cfg.ifInbound}
if_outbound = ${cfg.ifOutbound}
sip_listen_port = ${toString cfg.sipListenPort}
rtp_port_low = ${toString cfg.rtpPortLow}
rtp_port_high = ${toString cfg.rtpPortHigh}
rtp_dscp = ${toString cfg.rtpDscp}
sip_dscp = ${toString cfg.sipDscp}
${optionalString (cfg.hostsAllowReg != []) "hosts_allow_reg = ${concatStringsSep "," cfg.hostsAllowReg}"}
${optionalString (cfg.hostsAllowSip != []) "hosts_allow_sip = ${concatStringsSep "," cfg.hostsAllowSip}"}
${optionalString (cfg.hostsDenySip != []) "hosts_deny_sip = ${concatStringsSep "," cfg.hostsDenySip}"}
2023-03-19 20:44:31 +00:00
${optionalString (cfg.passwordFile != "") "proxy_auth_pwfile = ${cfg.passwordFile}"}
2014-07-10 18:08:38 +00:00
${cfg.extraConfig}
'';
confFile = builtins.toFile "siproxd.conf" conf;
in
{
##### interface
options = {
services.siproxd = {
enable = mkOption {
type = types.bool;
default = false;
description = ''
Whether to enable the Siproxd SIP
2020-11-22 07:23:53 +00:00
proxy/masquerading daemon.
2014-07-10 18:08:38 +00:00
'';
};
ifInbound = mkOption {
type = types.str;
example = "eth0";
description = "Local network interface";
2014-07-10 18:08:38 +00:00
};
ifOutbound = mkOption {
type = types.str;
example = "ppp0";
description = "Public network interface";
2014-07-10 18:08:38 +00:00
};
hostsAllowReg = mkOption {
type = types.listOf types.str;
2020-11-22 07:23:53 +00:00
default = [ ];
2014-07-10 18:08:38 +00:00
example = [ "192.168.1.0/24" "192.168.2.0/24" ];
description = ''
2023-05-20 02:11:38 +00:00
Access control list for incoming SIP registrations.
2014-07-10 18:08:38 +00:00
'';
};
hostsAllowSip = mkOption {
type = types.listOf types.str;
2020-11-22 07:23:53 +00:00
default = [ ];
2014-07-10 18:08:38 +00:00
example = [ "123.45.0.0/16" "123.46.0.0/16" ];
description = ''
2023-05-20 02:11:38 +00:00
Access control list for incoming SIP traffic.
2014-07-10 18:08:38 +00:00
'';
};
hostsDenySip = mkOption {
type = types.listOf types.str;
2020-11-22 07:23:53 +00:00
default = [ ];
2014-07-10 18:08:38 +00:00
example = [ "10.0.0.0/8" "11.0.0.0/8" ];
description = ''
2023-05-20 02:11:38 +00:00
Access control list for denying incoming
2020-11-22 07:23:53 +00:00
SIP registrations and traffic.
2014-07-10 18:08:38 +00:00
'';
};
sipListenPort = mkOption {
type = types.int;
default = 5060;
description = ''
2020-11-22 07:23:53 +00:00
Port to listen for incoming SIP messages.
2014-07-10 18:08:38 +00:00
'';
};
rtpPortLow = mkOption {
type = types.int;
default = 7070;
description = ''
2014-07-10 18:08:38 +00:00
Bottom of UDP port range for incoming and outgoing RTP traffic
'';
};
rtpPortHigh = mkOption {
type = types.int;
default = 7089;
description = ''
2014-07-10 18:08:38 +00:00
Top of UDP port range for incoming and outgoing RTP traffic
'';
};
rtpTimeout = mkOption {
type = types.int;
default = 300;
description = ''
Timeout for an RTP stream. If for the specified
2014-07-10 18:08:38 +00:00
number of seconds no data is relayed on an active
stream, it is considered dead and will be killed.
'';
};
rtpDscp = mkOption {
type = types.int;
default = 46;
description = ''
2014-07-10 18:08:38 +00:00
DSCP (differentiated services) value to be assigned
to RTP packets. Allows QOS aware routers to handle
2014-07-10 18:08:38 +00:00
different types traffic with different priorities.
'';
};
sipDscp = mkOption {
type = types.int;
default = 0;
description = ''
2014-07-10 18:08:38 +00:00
DSCP (differentiated services) value to be assigned
to SIP packets. Allows QOS aware routers to handle
2014-07-10 18:08:38 +00:00
different types traffic with different priorities.
'';
};
passwordFile = mkOption {
type = types.str;
default = "";
description = ''
2014-07-10 18:08:38 +00:00
Path to per-user password file.
'';
};
extraConfig = mkOption {
type = types.lines;
default = "";
description = ''
2014-07-10 18:08:38 +00:00
Extra configuration to add to siproxd configuration.
'';
};
};
};
##### implementation
config = mkIf cfg.enable {
users.users.siproxyd = {
2014-07-10 18:08:38 +00:00
uid = config.ids.uids.siproxd;
};
systemd.services.siproxd = {
description = "SIP proxy/masquerading daemon";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
ExecStart = "${pkgs.siproxd}/sbin/siproxd -c ${confFile}";
};
};
};
}