2023-02-26 00:12:55 +01:00
|
|
|
# This is not part of Liminix per se. This is my "scratchpad"
|
|
|
|
# configuration for the device I'm testing with.
|
|
|
|
#
|
|
|
|
# Parts of it do do things that Liminix eventually needs to do, but
|
|
|
|
# don't look in here for solutions - just for identifying the
|
|
|
|
# problems.
|
|
|
|
|
|
|
|
|
|
|
|
{ config, pkgs, lib, ... } :
|
|
|
|
let
|
|
|
|
secrets = import ./rotuer-secrets.nix;
|
|
|
|
inherit (pkgs.liminix.networking)
|
|
|
|
address
|
|
|
|
dnsmasq
|
|
|
|
hostapd
|
|
|
|
interface
|
|
|
|
pppoe
|
|
|
|
route;
|
|
|
|
inherit (pkgs.liminix.services) oneshot longrun bundle target;
|
|
|
|
inherit (pkgs)
|
2023-03-04 01:39:54 +01:00
|
|
|
dropbear
|
2023-03-01 18:55:52 +01:00
|
|
|
ifwait
|
2023-04-23 19:22:39 +02:00
|
|
|
writeText
|
2023-05-30 19:20:14 +02:00
|
|
|
writeFennelScript
|
2023-03-03 21:07:39 +01:00
|
|
|
serviceFns;
|
2023-02-26 00:12:55 +01:00
|
|
|
in rec {
|
|
|
|
boot = {
|
|
|
|
tftp = {
|
2023-04-24 00:29:53 +02:00
|
|
|
freeSpaceBytes = 3 * 1024 * 1024;
|
2023-02-26 00:12:55 +01:00
|
|
|
serverip = "10.0.0.1";
|
|
|
|
ipaddr = "10.0.0.8";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
imports = [
|
2023-04-23 13:58:51 +02:00
|
|
|
../modules/wlan.nix
|
2023-05-16 21:13:46 +02:00
|
|
|
../modules/standard.nix
|
2023-02-26 00:12:55 +01:00
|
|
|
];
|
2023-04-23 13:58:51 +02:00
|
|
|
rootfsType = "jffs2";
|
2023-05-20 23:34:57 +02:00
|
|
|
hostname = "rotuer";
|
2023-02-26 00:12:55 +01:00
|
|
|
kernel = {
|
|
|
|
config = {
|
|
|
|
PPP = "y";
|
|
|
|
PPP_BSDCOMP = "y";
|
|
|
|
PPP_DEFLATE = "y";
|
|
|
|
PPP_ASYNC = "y";
|
|
|
|
PPP_SYNC_TTY = "y";
|
|
|
|
BRIDGE = "y";
|
|
|
|
|
|
|
|
NETFILTER_XT_MATCH_CONNTRACK = "y";
|
|
|
|
|
2023-03-03 21:08:12 +01:00
|
|
|
IP6_NF_IPTABLES= "y"; # do we still need these
|
|
|
|
IP_NF_IPTABLES= "y"; # if using nftables directly
|
|
|
|
|
2023-02-26 00:12:55 +01:00
|
|
|
IP_NF_NAT = "y";
|
|
|
|
IP_NF_TARGET_MASQUERADE = "y";
|
|
|
|
NETFILTER = "y";
|
|
|
|
NETFILTER_ADVANCED = "y";
|
|
|
|
NETFILTER_XTABLES = "y";
|
|
|
|
|
|
|
|
NFT_COMPAT = "y";
|
|
|
|
NFT_CT = "y";
|
|
|
|
NFT_LOG = "y";
|
|
|
|
NFT_MASQ = "y";
|
|
|
|
NFT_NAT = "y";
|
|
|
|
NFT_REJECT = "y";
|
|
|
|
NFT_REJECT_INET = "y";
|
|
|
|
|
|
|
|
NF_CONNTRACK = "y";
|
|
|
|
NF_NAT = "y";
|
|
|
|
NF_NAT_MASQUERADE = "y";
|
|
|
|
NF_TABLES= "y";
|
|
|
|
NF_TABLES_INET = "y";
|
|
|
|
NF_TABLES_IPV4 = "y";
|
|
|
|
NF_TABLES_IPV6 = "y";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2023-03-03 23:52:33 +01:00
|
|
|
services.hostap = hostapd (config.hardware.networkInterfaces.wlan_24) {
|
2023-02-26 00:12:55 +01:00
|
|
|
params = {
|
|
|
|
ssid = "liminix";
|
|
|
|
country_code = "GB";
|
|
|
|
hw_mode="g";
|
|
|
|
channel = "2";
|
|
|
|
wmm_enabled = 1;
|
|
|
|
ieee80211n = 1;
|
|
|
|
inherit (secrets) wpa_passphrase;
|
|
|
|
auth_algs = 1; # 1=wpa2, 2=wep, 3=both
|
|
|
|
wpa = 2; # 1=wpa, 2=wpa2, 3=both
|
|
|
|
wpa_key_mgmt = "WPA-PSK";
|
|
|
|
wpa_pairwise = "TKIP CCMP"; # auth for wpa (may not need this?)
|
|
|
|
rsn_pairwise = "CCMP"; # auth for wpa2
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2023-03-03 23:52:33 +01:00
|
|
|
services.hostap5 = hostapd (config.hardware.networkInterfaces.wlan_5) {
|
2023-03-01 23:24:58 +01:00
|
|
|
params = rec {
|
|
|
|
ssid = "liminix_5";
|
|
|
|
country_code = "GB";
|
|
|
|
hw_mode="a";
|
|
|
|
channel = 36;
|
|
|
|
ht_capab = "[HT40+]";
|
|
|
|
vht_oper_chwidth = 1;
|
|
|
|
vht_oper_centr_freq_seg0_idx = channel + 6;
|
|
|
|
ieee80211ac = 1;
|
|
|
|
|
|
|
|
wmm_enabled = 1;
|
|
|
|
inherit (secrets) wpa_passphrase;
|
|
|
|
auth_algs = 1; # 1=wpa2, 2=wep, 3=both
|
|
|
|
wpa = 2; # 1=wpa, 2=wpa2, 3=both
|
|
|
|
wpa_key_mgmt = "WPA-PSK";
|
|
|
|
wpa_pairwise = "TKIP CCMP"; # auth for wpa (may not need this?)
|
|
|
|
rsn_pairwise = "CCMP"; # auth for wpa2
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
services.int =
|
|
|
|
let iface = interface {
|
|
|
|
type = "bridge";
|
|
|
|
device = "int";
|
|
|
|
};
|
|
|
|
in address iface {
|
|
|
|
family = "inet4"; address ="10.8.0.1"; prefixLength = 16;
|
2023-03-01 18:55:52 +01:00
|
|
|
};
|
2023-03-01 23:24:58 +01:00
|
|
|
|
|
|
|
services.bridge =
|
|
|
|
let
|
|
|
|
primary = services.int;
|
|
|
|
addif = dev: oneshot {
|
|
|
|
name = "add-${dev.device}-to-bridge";
|
|
|
|
up = "${ifwait}/bin/ifwait -v ${dev.device} running && ip link set dev ${dev.device} master ${primary.device}";
|
|
|
|
down = "ip link set dev ${dev} nomaster";
|
|
|
|
dependencies = [ primary dev ];
|
|
|
|
};
|
|
|
|
in bundle {
|
|
|
|
name = "bridge-members";
|
2023-03-04 00:06:18 +01:00
|
|
|
contents = with config.hardware.networkInterfaces; map addif [
|
|
|
|
wlan_24 lan wlan_5
|
2023-03-01 23:24:58 +01:00
|
|
|
];
|
2023-02-26 00:12:55 +01:00
|
|
|
};
|
|
|
|
|
2023-04-23 19:22:39 +02:00
|
|
|
services.ntp =
|
|
|
|
let config = writeText "chrony.conf" ''
|
|
|
|
pool pool.ntp.org iburst
|
|
|
|
dumpdir /run/chrony
|
|
|
|
makestep 1.0 3
|
|
|
|
'';
|
|
|
|
in longrun {
|
|
|
|
name = "ntp";
|
|
|
|
run = "${pkgs.chrony}/bin/chronyd -f ${config} -d";
|
|
|
|
};
|
|
|
|
|
2023-03-04 01:39:54 +01:00
|
|
|
services.sshd = longrun {
|
|
|
|
name = "sshd";
|
2023-05-21 18:07:19 +02:00
|
|
|
# env -i clears the environment so we don't pass anything weird to
|
|
|
|
# ssh sessions. Dropbear params are
|
|
|
|
# -e pass environment to child
|
|
|
|
# -E log to stderr
|
|
|
|
# -R create hostkeys if needed
|
|
|
|
# -P pid-file
|
|
|
|
# -F don't fork into background
|
|
|
|
|
2023-03-04 01:39:54 +01:00
|
|
|
run = ''
|
2023-05-21 13:01:42 +02:00
|
|
|
if test -d /persist; then
|
|
|
|
mkdir -p /persist/secrets/dropbear
|
|
|
|
ln -s /persist/secrets/dropbear /run
|
|
|
|
fi
|
2023-05-21 18:07:19 +02:00
|
|
|
PATH=${lib.makeBinPath config.defaultProfile.packages}:/bin
|
|
|
|
exec env -i ENV=/etc/ashrc PATH=$PATH ${dropbear}/bin/dropbear -e -E -R -P /run/dropbear.pid -F
|
2023-03-04 01:39:54 +01:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2023-02-26 00:12:55 +01:00
|
|
|
users.dnsmasq = {
|
|
|
|
uid = 51; gid= 51; gecos = "DNS/DHCP service user";
|
|
|
|
dir = "/run/dnsmasq";
|
|
|
|
shell = "/bin/false";
|
|
|
|
};
|
2023-05-20 23:48:30 +02:00
|
|
|
users.root = secrets.root;
|
2023-03-04 01:39:54 +01:00
|
|
|
|
2023-02-26 00:12:55 +01:00
|
|
|
groups.dnsmasq = {
|
|
|
|
gid = 51; usernames = ["dnsmasq"];
|
|
|
|
};
|
|
|
|
groups.system.usernames = ["dnsmasq"];
|
|
|
|
|
|
|
|
services.dns =
|
|
|
|
dnsmasq {
|
|
|
|
resolvconf = services.resolvconf;
|
2023-03-01 23:24:58 +01:00
|
|
|
interface = services.int;
|
2023-02-26 00:12:55 +01:00
|
|
|
ranges = ["10.8.0.10,10.8.0.240"];
|
|
|
|
domain = "fake.liminix.org";
|
|
|
|
};
|
|
|
|
|
|
|
|
services.wan =
|
2023-03-03 23:52:33 +01:00
|
|
|
let iface = config.hardware.networkInterfaces.wan;
|
2023-02-26 00:12:55 +01:00
|
|
|
in pppoe iface {
|
|
|
|
ppp-options = [
|
|
|
|
"debug" "+ipv6" "noauth"
|
|
|
|
"name" secrets.l2tp.name
|
|
|
|
"password" secrets.l2tp.password
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
services.resolvconf = oneshot rec {
|
|
|
|
dependencies = [ services.wan ];
|
|
|
|
name = "resolvconf";
|
|
|
|
up = ''
|
|
|
|
. ${serviceFns}
|
2023-03-04 00:06:18 +01:00
|
|
|
( in_outputs ${name}
|
2023-02-26 00:12:55 +01:00
|
|
|
echo "nameserver $(output ${services.wan} ns1)" > resolv.conf
|
|
|
|
echo "nameserver $(output ${services.wan} ns2)" >> resolv.conf
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
down = ''
|
|
|
|
rm -rf /run/service-state/${name}/
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
services.defaultroute4 = route {
|
|
|
|
name = "defaultroute";
|
|
|
|
via = "$(output ${services.wan} address)";
|
|
|
|
target = "default";
|
|
|
|
dependencies = [ services.wan ];
|
|
|
|
};
|
|
|
|
|
|
|
|
services.packet_forwarding =
|
|
|
|
let filename = "/proc/sys/net/ipv4/conf/all/forwarding";
|
|
|
|
in oneshot {
|
|
|
|
name = "let-the-ip-flow";
|
|
|
|
up = ''
|
2023-04-23 13:58:51 +02:00
|
|
|
${pkgs.nftables}/bin/nft -f ${../nat.nft}
|
2023-02-26 00:12:55 +01:00
|
|
|
echo 1 > ${filename}
|
|
|
|
'';
|
|
|
|
down = "echo 0 > ${filename}";
|
|
|
|
};
|
|
|
|
|
2023-05-25 00:01:50 +02:00
|
|
|
services.dhcp6 =
|
|
|
|
let
|
|
|
|
name = "dhcp6c.wan";
|
2023-05-30 19:20:14 +02:00
|
|
|
luafile = writeFennelScript "odhcpc-script" [] ./odhcp6-script.fnl;
|
2023-05-25 00:01:50 +02:00
|
|
|
in longrun {
|
|
|
|
inherit name;
|
2023-05-26 19:36:44 +02:00
|
|
|
notification-fd = 10;
|
2023-05-25 00:01:50 +02:00
|
|
|
run = ''
|
2023-05-30 19:20:14 +02:00
|
|
|
export SERVICE_STATE=/run/service-state/${name}
|
|
|
|
${pkgs.odhcp6c}/bin/odhcp6c -s ${luafile} -e -v -p /run/${name}.pid -P 48 $(output ${services.wan} ifname)
|
2023-05-25 00:01:50 +02:00
|
|
|
)
|
|
|
|
'';
|
|
|
|
dependencies = [ services.wan ];
|
|
|
|
};
|
|
|
|
|
2023-02-26 00:12:55 +01:00
|
|
|
services.default = target {
|
|
|
|
name = "default";
|
2023-05-20 23:34:57 +02:00
|
|
|
contents = with config.services; [
|
2023-03-07 23:02:24 +01:00
|
|
|
config.hardware.networkInterfaces.lo
|
2023-03-03 23:52:33 +01:00
|
|
|
config.hardware.networkInterfaces.lan
|
2023-03-01 23:24:58 +01:00
|
|
|
int
|
|
|
|
bridge
|
2023-02-26 00:12:55 +01:00
|
|
|
hostap
|
2023-03-01 23:24:58 +01:00
|
|
|
hostap5
|
2023-04-23 19:22:39 +02:00
|
|
|
ntp
|
2023-02-26 00:12:55 +01:00
|
|
|
defaultroute4
|
|
|
|
packet_forwarding
|
|
|
|
dns
|
|
|
|
resolvconf
|
2023-03-04 01:39:54 +01:00
|
|
|
sshd
|
2023-05-20 23:34:57 +02:00
|
|
|
config.services.hostname
|
2023-05-25 00:01:50 +02:00
|
|
|
dhcp6
|
2023-02-26 00:12:55 +01:00
|
|
|
];
|
|
|
|
};
|
2023-05-20 23:34:57 +02:00
|
|
|
defaultProfile.packages = with pkgs; [min-collect-garbage nftables tcpdump] ;
|
2023-02-26 00:12:55 +01:00
|
|
|
}
|