WIP third example
This commit is contained in:
parent
94e51db649
commit
1673a71831
3 changed files with 195 additions and 1 deletions
|
@ -60,7 +60,7 @@ Now you can try it:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
nix-shell --run "run-liminix-vm ./result/vmlinux ./result/rootfs"
|
./result/run.sh
|
||||||
|
|
||||||
This starts the Qemu emulator with a bunch of useful options, to run
|
This starts the Qemu emulator with a bunch of useful options, to run
|
||||||
the Liminix configuration you just built. It connects the emulated
|
the Liminix configuration you just built. It connects the emulated
|
||||||
|
|
194
examples/demo.nix
Normal file
194
examples/demo.nix
Normal file
|
@ -0,0 +1,194 @@
|
||||||
|
# This is an example configuration for a "typical" small office/home
|
||||||
|
# router and wifi access point.
|
||||||
|
|
||||||
|
# You need to copy it to another filename and change the configuration
|
||||||
|
# wherever the text "EDIT" appears - please consult the tutorial
|
||||||
|
# documentation for details.
|
||||||
|
|
||||||
|
{ config, pkgs, lib, ... } :
|
||||||
|
let
|
||||||
|
inherit (pkgs.liminix.services) oneshot longrun;
|
||||||
|
inherit (pkgs) serviceFns;
|
||||||
|
# EDIT: you can pick your preferred RFC1918 address space
|
||||||
|
# for NATted connections, if you don't like this one.
|
||||||
|
ipv4LocalNet = "10.8.0";
|
||||||
|
svc = config.system.service;
|
||||||
|
|
||||||
|
in rec {
|
||||||
|
boot = {
|
||||||
|
tftp = {
|
||||||
|
freeSpaceBytes = 3 * 1024 * 1024;
|
||||||
|
serverip = "10.0.0.1";
|
||||||
|
ipaddr = "10.0.0.8";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
imports = [
|
||||||
|
../modules/bridge
|
||||||
|
../modules/dnsmasq
|
||||||
|
../modules/firewall
|
||||||
|
../modules/hostapd
|
||||||
|
../modules/network
|
||||||
|
../modules/ntp
|
||||||
|
../modules/ppp
|
||||||
|
../modules/ssh
|
||||||
|
../modules/standard.nix
|
||||||
|
../modules/vlan
|
||||||
|
../modules/wlan.nix
|
||||||
|
];
|
||||||
|
rootfsType = "jffs2";
|
||||||
|
hostname = "the-internet"; # EDIT
|
||||||
|
|
||||||
|
services.hostap = svc.hostapd.build {
|
||||||
|
interface = config.hardware.networkInterfaces.wlan;
|
||||||
|
# EDIT: you will want to change the obvious things
|
||||||
|
# here to values of your choice
|
||||||
|
params = {
|
||||||
|
ssid = "the-internet";
|
||||||
|
channel = "1";
|
||||||
|
country_code = "GB";
|
||||||
|
wpa_passphrase = "not a real wifi password";
|
||||||
|
|
||||||
|
hw_mode="g";
|
||||||
|
ieee80211n = 1;
|
||||||
|
auth_algs = 1; # 1=wpa2, 2=wep, 3=both
|
||||||
|
wpa = 2; # 1=wpa, 2=wpa2, 3=both
|
||||||
|
wpa_key_mgmt = "WPA-PSK";
|
||||||
|
wpa_pairwise = "TKIP CCMP"; # auth for wpa (may not need this?)
|
||||||
|
rsn_pairwise = "CCMP"; # auth for wpa2
|
||||||
|
wmm_enabled = 1;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
services.int = svc.network.address.build {
|
||||||
|
interface = svc.bridge.primary.build { ifname = "int"; };
|
||||||
|
family = "inet"; address = "${ipv4LocalNet}.1"; prefixLength = 16;
|
||||||
|
};
|
||||||
|
|
||||||
|
services.bridge = svc.bridge.members.build {
|
||||||
|
primary = services.int;
|
||||||
|
members = with config.hardware.networkInterfaces;
|
||||||
|
[ wlan lan ];
|
||||||
|
};
|
||||||
|
|
||||||
|
services.ntp = svc.ntp.build {
|
||||||
|
pools = { "pool.ntp.org" = ["iburst"]; };
|
||||||
|
makestep = { threshold = 1.0; limit = 3; };
|
||||||
|
};
|
||||||
|
|
||||||
|
services.sshd = svc.ssh.build { };
|
||||||
|
|
||||||
|
users.root = {
|
||||||
|
# EDIT: choose a root password and then use
|
||||||
|
# "mkpasswd -m sha512crypt" to determine the hash.
|
||||||
|
# It should start wirh $6$.
|
||||||
|
passwd = "$6$6HG7WALLQQY1LQDE$428cnouMJ7wVmyK9.dF1uWs7t0z9ztgp3MHvN5bbeo0M4Kqg/u2ThjoSHIjCEJQlnVpDOaEKcOjXAlIClHWN21";
|
||||||
|
openssh.authorizedKeys.keys = [
|
||||||
|
# EDIT: you can add your ssh pubkey here
|
||||||
|
# "ssh-rsa AAAAB3NzaC1....H6hKd user@example.com";
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
services.dns =
|
||||||
|
let interface = services.int;
|
||||||
|
in svc.dnsmasq.build {
|
||||||
|
resolvconf = services.resolvconf;
|
||||||
|
inherit interface;
|
||||||
|
ranges = [
|
||||||
|
"${ipv4LocalNet}.10,${ipv4LocalNet}.240"
|
||||||
|
# ra-stateless: sends router advertisements with the O and A
|
||||||
|
# bits set, and provides a stateless DHCP service. The client
|
||||||
|
# will use a SLAAC address, and use DHCP for other
|
||||||
|
# configuration information.
|
||||||
|
"::,constructor:$(output ${interface} ifname),ra-stateless"
|
||||||
|
];
|
||||||
|
# EDIT: choose a domain name for the DNS names issued for your
|
||||||
|
# DHCP-issued hosts
|
||||||
|
domain = "lan.example.com";
|
||||||
|
};
|
||||||
|
|
||||||
|
services.wan = svc.pppoe.build {
|
||||||
|
interface = config.hardware.networkInterfaces.wan;
|
||||||
|
ppp-options = [
|
||||||
|
"debug" "+ipv6" "noauth"
|
||||||
|
# EDIT: change the strings "chap-username"
|
||||||
|
# and "chap-secret" to match the username/password
|
||||||
|
# provided by your ISP for PPP logins
|
||||||
|
"name" "chap-username"
|
||||||
|
"password" "chap-secret"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
services.resolvconf = oneshot rec {
|
||||||
|
dependencies = [ services.wan ];
|
||||||
|
name = "resolvconf";
|
||||||
|
up = ''
|
||||||
|
. ${serviceFns}
|
||||||
|
( in_outputs ${name}
|
||||||
|
echo "nameserver $(output ${services.wan} ns1)" > resolv.conf
|
||||||
|
echo "nameserver $(output ${services.wan} ns2)" >> resolv.conf
|
||||||
|
chmod 0444 resolv.conf
|
||||||
|
)
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
filesystem =
|
||||||
|
let inherit (pkgs.pseudofile) dir symlink;
|
||||||
|
in dir {
|
||||||
|
etc = dir {
|
||||||
|
"resolv.conf" = symlink "${services.resolvconf}/.outputs/resolv.conf";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
services.defaultroute4 = svc.network.route.build {
|
||||||
|
via = "$(output ${services.wan} address)";
|
||||||
|
target = "default";
|
||||||
|
dependencies = [ services.wan ];
|
||||||
|
};
|
||||||
|
|
||||||
|
services.defaultroute6 = svc.network.route.build {
|
||||||
|
via = "$(output ${services.wan} ipv6-peer-address)";
|
||||||
|
target = "default";
|
||||||
|
interface = services.wan;
|
||||||
|
};
|
||||||
|
|
||||||
|
services.firewall = svc.firewall.build {
|
||||||
|
ruleset = import ./demo-firewall.nix;
|
||||||
|
};
|
||||||
|
|
||||||
|
services.packet_forwarding = svc.network.forward.build { };
|
||||||
|
|
||||||
|
services.dhcp6 =
|
||||||
|
let
|
||||||
|
name = "dhcp6c.wan";
|
||||||
|
in longrun {
|
||||||
|
inherit name;
|
||||||
|
notification-fd = 10;
|
||||||
|
run = ''
|
||||||
|
export SERVICE_STATE=/run/service-state/${name}
|
||||||
|
${pkgs.odhcp6c}/bin/odhcp6c -s ${pkgs.odhcp-script} -e -v -p /run/${name}.pid -P 48 $(output ${services.wan} ifname)
|
||||||
|
)
|
||||||
|
'';
|
||||||
|
dependencies = [ services.wan ];
|
||||||
|
};
|
||||||
|
|
||||||
|
services.acquire-lan-prefix =
|
||||||
|
let script = pkgs.callPackage ./acquire-delegated-prefix.nix { };
|
||||||
|
in longrun {
|
||||||
|
name = "acquire-lan-prefix";
|
||||||
|
run = "${script} /run/service-state/dhcp6c.wan $(output ${services.int} ifname)";
|
||||||
|
dependencies = [ services.dhcp6 ];
|
||||||
|
};
|
||||||
|
|
||||||
|
services.acquire-wan-address =
|
||||||
|
let script = pkgs.callPackage ./acquire-wan-address.nix { };
|
||||||
|
in longrun {
|
||||||
|
name = "acquire-wan-address";
|
||||||
|
run = "${script} /run/service-state/dhcp6c.wan $(output ${services.wan} ifname)";
|
||||||
|
dependencies = [ services.dhcp6 ];
|
||||||
|
};
|
||||||
|
|
||||||
|
defaultProfile.packages = with pkgs; [
|
||||||
|
min-collect-garbage
|
||||||
|
];
|
||||||
|
}
|
Loading…
Reference in a new issue