123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206 |
- ;;; GNU Guix --- Functional package management for GNU
- ;;; Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Ludovic Courtès <ludo@gnu.org>
- ;;; Copyright © 2015 Mark H Weaver <mhw@netris.org>
- ;;; Copyright © 2016, 2018 Efraim Flashner <efraim@flashner.co.il>
- ;;; Copyright © 2016 John Darrington <jmd@gnu.org>
- ;;; Copyright © 2017 Clément Lassieur <clement@lassieur.org>
- ;;; Copyright © 2017 Thomas Danckaert <post@thomasdanckaert.be>
- ;;; Copyright © 2017, 2018 Marius Bakke <mbakke@fastmail.com>
- ;;; Copyright © 2018 Tobias Geerinckx-Rice <me@tobias.gr>
- ;;; Copyright © 2018 Chris Marusich <cmmarusich@gmail.com>
- ;;; Copyright © 2018 Arun Isaac <arunisaac@systemreboot.net>
- ;;;
- ;;; This file is part of GNU Guix.
- ;;;
- ;;; GNU Guix is free software; you can redistribute it and/or modify it
- ;;; under the terms of the GNU General Public License as published by
- ;;; the Free Software Foundation; either version 3 of the License, or (at
- ;;; your option) any later version.
- ;;;
- ;;; GNU Guix is distributed in the hope that it will be useful, but
- ;;; WITHOUT ANY WARRANTY; without even the implied warranty of
- ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- ;;; GNU General Public License for more details.
- ;;;
- ;;; You should have received a copy of the GNU General Public License
- ;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
- (define-module (gnu services networking)
- #:use-module (gnu services)
- #:use-module (gnu services base)
- #:use-module (gnu services shepherd)
- #:use-module (gnu services dbus)
- #:use-module (gnu system shadow)
- #:use-module (gnu system pam)
- #:use-module (gnu packages admin)
- #:use-module (gnu packages connman)
- #:use-module (gnu packages freedesktop)
- #:use-module (gnu packages linux)
- #:use-module (gnu packages tor)
- #:use-module (gnu packages messaging)
- #:use-module (gnu packages networking)
- #:use-module (gnu packages ntp)
- #:use-module (gnu packages wicd)
- #:use-module (gnu packages gnome)
- #:use-module (guix gexp)
- #:use-module (guix records)
- #:use-module (guix modules)
- #:use-module (guix deprecation)
- #:use-module (srfi srfi-1)
- #:use-module (srfi srfi-9)
- #:use-module (srfi srfi-26)
- #:use-module (ice-9 match)
- #:re-export (static-networking-service
- static-networking-service-type)
- #:export (%facebook-host-aliases
- dhcp-client-service
- dhcp-client-service-type
- dhcpd-service-type
- dhcpd-configuration
- dhcpd-configuration?
- dhcpd-configuration-package
- dhcpd-configuration-config-file
- dhcpd-configuration-version
- dhcpd-configuration-run-directory
- dhcpd-configuration-lease-file
- dhcpd-configuration-pid-file
- dhcpd-configuration-interfaces
- %ntp-servers
- ntp-configuration
- ntp-configuration?
- ntp-service
- ntp-service-type
- openntpd-configuration
- openntpd-configuration?
- openntpd-service-type
- inetd-configuration
- inetd-entry
- inetd-service-type
- tor-configuration
- tor-configuration?
- tor-hidden-service
- tor-service
- tor-service-type
- wicd-service-type
- wicd-service
- network-manager-configuration
- network-manager-configuration?
- network-manager-configuration-dns
- network-manager-service-type
- connman-configuration
- connman-configuration?
- connman-service-type
- modem-manager-configuration
- modem-manager-configuration?
- modem-manager-service-type
- <wpa-supplicant-configuration>
- wpa-supplicant-configuration
- wpa-supplicant-configuration?
- wpa-supplicant-configuration-wpa-supplicant
- wpa-supplicant-configuration-pid-file
- wpa-supplicant-configuration-dbus?
- wpa-supplicant-configuration-interface
- wpa-supplicant-configuration-config-file
- wpa-supplicant-configuration-extra-options
- wpa-supplicant-service-type
- openvswitch-service-type
- openvswitch-configuration
- iptables-configuration
- iptables-configuration?
- iptables-configuration-iptables
- iptables-configuration-ipv4-rules
- iptables-configuration-ipv6-rules
- iptables-service-type))
- ;;; Commentary:
- ;;;
- ;;; Networking services.
- ;;;
- ;;; Code:
- (define %facebook-host-aliases
- ;; This is the list of known Facebook hosts to be added to /etc/hosts if you
- ;; are to block it.
- "\
- # Block Facebook IPv4.
- 127.0.0.1 www.facebook.com
- 127.0.0.1 facebook.com
- 127.0.0.1 login.facebook.com
- 127.0.0.1 www.login.facebook.com
- 127.0.0.1 fbcdn.net
- 127.0.0.1 www.fbcdn.net
- 127.0.0.1 fbcdn.com
- 127.0.0.1 www.fbcdn.com
- 127.0.0.1 static.ak.fbcdn.net
- 127.0.0.1 static.ak.connect.facebook.com
- 127.0.0.1 connect.facebook.net
- 127.0.0.1 www.connect.facebook.net
- 127.0.0.1 apps.facebook.com
- # Block Facebook IPv6.
- fe80::1%lo0 facebook.com
- fe80::1%lo0 login.facebook.com
- fe80::1%lo0 www.login.facebook.com
- fe80::1%lo0 fbcdn.net
- fe80::1%lo0 www.fbcdn.net
- fe80::1%lo0 fbcdn.com
- fe80::1%lo0 www.fbcdn.com
- fe80::1%lo0 static.ak.fbcdn.net
- fe80::1%lo0 static.ak.connect.facebook.com
- fe80::1%lo0 connect.facebook.net
- fe80::1%lo0 www.connect.facebook.net
- fe80::1%lo0 apps.facebook.com\n")
- (define dhcp-client-service-type
- (shepherd-service-type
- 'dhcp-client
- (lambda (dhcp)
- (define dhclient
- (file-append dhcp "/sbin/dhclient"))
- (define pid-file
- "/var/run/dhclient.pid")
- (shepherd-service
- (documentation "Set up networking via DHCP.")
- (requirement '(user-processes udev))
- ;; XXX: Running with '-nw' ("no wait") avoids blocking for a minute when
- ;; networking is unavailable, but also means that the interface is not up
- ;; yet when 'start' completes. To wait for the interface to be ready, one
- ;; should instead monitor udev events.
- (provision '(networking))
- (start #~(lambda _
- ;; When invoked without any arguments, 'dhclient' discovers all
- ;; non-loopback interfaces *that are up*. However, the relevant
- ;; interfaces are typically down at this point. Thus we perform
- ;; our own interface discovery here.
- (define valid?
- (negate loopback-network-interface?))
- (define ifaces
- (filter valid? (all-network-interface-names)))
- ;; XXX: Make sure the interfaces are up so that 'dhclient' can
- ;; actually send/receive over them.
- (for-each set-network-interface-up ifaces)
- (false-if-exception (delete-file #$pid-file))
- (let ((pid (fork+exec-command
- (cons* #$dhclient "-nw"
- "-pf" #$pid-file ifaces))))
- (and (zero? (cdr (waitpid pid)))
- (read-pid-file #$pid-file)))))
- (stop #~(make-kill-destructor))))
- isc-dhcp))
- (define-deprecated (dhcp-client-service #:key (dhcp isc-dhcp))
- dhcp-client-service-type
- "Return a service that runs @var{dhcp}, a Dynamic Host Configuration
- Protocol (DHCP) client, on all the non-loopback network interfaces."
- (service dhcp-client-service-type dhcp))
- (define-record-type* <dhcpd-configuration>
- dhcpd-configuration make-dhcpd-configuration
- dhcpd-configuration?
- (package dhcpd-configuration-package ;<package>
- (default isc-dhcp))
- (config-file dhcpd-configuration-config-file ;file-like
- (default #f))
- (version dhcpd-configuration-version ;"4", "6", or "4o6"
- (default "4"))
- (run-directory dhcpd-configuration-run-directory
- (default "/run/dhcpd"))
- (lease-file dhcpd-configuration-lease-file
- (default "/var/db/dhcpd.leases"))
- (pid-file dhcpd-configuration-pid-file
- (default "/run/dhcpd/dhcpd.pid"))
- ;; list of strings, e.g. (list "enp0s25")
- (interfaces dhcpd-configuration-interfaces
- (default '())))
- (define dhcpd-shepherd-service
- (match-lambda
- (($ <dhcpd-configuration> package config-file version run-directory
- lease-file pid-file interfaces)
- (unless config-file
- (error "Must supply a config-file"))
- (list (shepherd-service
- ;; Allow users to easily run multiple versions simultaneously.
- (provision (list (string->symbol
- (string-append "dhcpv" version "-daemon"))))
- (documentation (string-append "Run the DHCPv" version " daemon"))
- (requirement '(networking))
- (start #~(make-forkexec-constructor
- '(#$(file-append package "/sbin/dhcpd")
- #$(string-append "-" version)
- "-lf" #$lease-file
- "-pf" #$pid-file
- "-cf" #$config-file
- #$@interfaces)
- #:pid-file #$pid-file))
- (stop #~(make-kill-destructor)))))))
- (define dhcpd-activation
- (match-lambda
- (($ <dhcpd-configuration> package config-file version run-directory
- lease-file pid-file interfaces)
- (with-imported-modules '((guix build utils))
- #~(begin
- (unless (file-exists? #$run-directory)
- (mkdir #$run-directory))
- ;; According to the DHCP manual (man dhcpd.leases), the lease
- ;; database must be present for dhcpd to start successfully.
- (unless (file-exists? #$lease-file)
- (with-output-to-file #$lease-file
- (lambda _ (display ""))))
- ;; Validate the config.
- (invoke
- #$(file-append package "/sbin/dhcpd") "-t" "-cf"
- #$config-file))))))
- (define dhcpd-service-type
- (service-type
- (name 'dhcpd)
- (extensions
- (list (service-extension shepherd-root-service-type dhcpd-shepherd-service)
- (service-extension activation-service-type dhcpd-activation)))))
- (define %ntp-servers
- ;; Default set of NTP servers. These URLs are managed by the NTP Pool project.
- ;; Within Guix, Leo Famulari <leo@famulari.name> is the administrative contact
- ;; for this NTP pool "zone".
- '("0.guix.pool.ntp.org"
- "1.guix.pool.ntp.org"
- "2.guix.pool.ntp.org"
- "3.guix.pool.ntp.org"))
- ;;;
- ;;; NTP.
- ;;;
- ;; TODO: Export.
- (define-record-type* <ntp-configuration>
- ntp-configuration make-ntp-configuration
- ntp-configuration?
- (ntp ntp-configuration-ntp
- (default ntp))
- (servers ntp-configuration-servers
- (default %ntp-servers))
- (allow-large-adjustment? ntp-allow-large-adjustment?
- (default #f)))
- (define ntp-shepherd-service
- (match-lambda
- (($ <ntp-configuration> ntp servers allow-large-adjustment?)
- (let ()
- ;; TODO: Add authentication support.
- (define config
- (string-append "driftfile /var/run/ntpd/ntp.drift\n"
- (string-join (map (cut string-append "server " <>)
- servers)
- "\n")
- "
- # Disable status queries as a workaround for CVE-2013-5211:
- # <http://support.ntp.org/bin/view/Main/SecurityNotice#DRDoS_Amplification_Attack_using>.
- restrict default kod nomodify notrap nopeer noquery
- restrict -6 default kod nomodify notrap nopeer noquery
- # Yet, allow use of the local 'ntpq'.
- restrict 127.0.0.1
- restrict -6 ::1\n"))
- (define ntpd.conf
- (plain-file "ntpd.conf" config))
- (list (shepherd-service
- (provision '(ntpd))
- (documentation "Run the Network Time Protocol (NTP) daemon.")
- (requirement '(user-processes networking))
- (start #~(make-forkexec-constructor
- (list (string-append #$ntp "/bin/ntpd") "-n"
- "-c" #$ntpd.conf "-u" "ntpd"
- #$@(if allow-large-adjustment?
- '("-g")
- '()))))
- (stop #~(make-kill-destructor))))))))
- (define %ntp-accounts
- (list (user-account
- (name "ntpd")
- (group "nogroup")
- (system? #t)
- (comment "NTP daemon user")
- (home-directory "/var/empty")
- (shell (file-append shadow "/sbin/nologin")))))
- (define (ntp-service-activation config)
- "Return the activation gexp for CONFIG."
- (with-imported-modules '((guix build utils))
- #~(begin
- (use-modules (guix build utils))
- (define %user
- (getpw "ntpd"))
- (let ((directory "/var/run/ntpd"))
- (mkdir-p directory)
- (chown directory (passwd:uid %user) (passwd:gid %user))))))
- (define ntp-service-type
- (service-type (name 'ntp)
- (extensions
- (list (service-extension shepherd-root-service-type
- ntp-shepherd-service)
- (service-extension account-service-type
- (const %ntp-accounts))
- (service-extension activation-service-type
- ntp-service-activation)))
- (description
- "Run the @command{ntpd}, the Network Time Protocol (NTP)
- daemon of the @uref{http://www.ntp.org, Network Time Foundation}. The daemon
- will keep the system clock synchronized with that of the given servers.")
- (default-value (ntp-configuration))))
- (define-deprecated (ntp-service #:key (ntp ntp)
- (servers %ntp-servers)
- allow-large-adjustment?)
- ntp-service-type
- "Return a service that runs the daemon from @var{ntp}, the
- @uref{http://www.ntp.org, Network Time Protocol package}. The daemon will
- keep the system clock synchronized with that of @var{servers}.
- @var{allow-large-adjustment?} determines whether @command{ntpd} is allowed to
- make an initial adjustment of more than 1,000 seconds."
- (service ntp-service-type
- (ntp-configuration (ntp ntp)
- (servers servers)
- (allow-large-adjustment?
- allow-large-adjustment?))))
- ;;;
- ;;; OpenNTPD.
- ;;;
- (define-record-type* <openntpd-configuration>
- openntpd-configuration make-openntpd-configuration
- openntpd-configuration?
- (openntpd openntpd-configuration-openntpd
- (default openntpd))
- (listen-on openntpd-listen-on
- (default '("127.0.0.1"
- "::1")))
- (query-from openntpd-query-from
- (default '()))
- (sensor openntpd-sensor
- (default '()))
- (server openntpd-server
- (default %ntp-servers))
- (servers openntpd-servers
- (default '()))
- (constraint-from openntpd-constraint-from
- (default '()))
- (constraints-from openntpd-constraints-from
- (default '()))
- (allow-large-adjustment? openntpd-allow-large-adjustment?
- (default #f))) ; upstream default
- (define (openntpd-shepherd-service config)
- (match-record config <openntpd-configuration>
- (openntpd listen-on query-from sensor server servers constraint-from
- constraints-from allow-large-adjustment?)
- (let ()
- (define config
- (string-join
- (filter-map
- (lambda (field value)
- (string-join
- (map (cut string-append field <> "\n")
- value)))
- '("listen on " "query from " "sensor " "server " "servers "
- "constraint from ")
- (list listen-on query-from sensor server servers constraint-from))
- ;; The 'constraints from' field needs to be enclosed in double quotes.
- (string-join
- (map (cut string-append "constraints from \"" <> "\"\n")
- constraints-from))))
- (define ntpd.conf
- (plain-file "ntpd.conf" config))
- (list (shepherd-service
- (provision '(ntpd))
- (documentation "Run the Network Time Protocol (NTP) daemon.")
- (requirement '(user-processes networking))
- (start #~(make-forkexec-constructor
- (list (string-append #$openntpd "/sbin/ntpd")
- "-f" #$ntpd.conf
- "-d" ;; don't daemonize
- #$@(if allow-large-adjustment?
- '("-s")
- '()))
- ;; When ntpd is daemonized it repeatedly tries to respawn
- ;; while running, leading shepherd to disable it. To
- ;; prevent spamming stderr, redirect output to logfile.
- #:log-file "/var/log/ntpd"))
- (stop #~(make-kill-destructor)))))))
- (define (openntpd-service-activation config)
- "Return the activation gexp for CONFIG."
- (with-imported-modules '((guix build utils))
- #~(begin
- (use-modules (guix build utils))
- (mkdir-p "/var/db")
- (mkdir-p "/var/run")
- (unless (file-exists? "/var/db/ntpd.drift")
- (with-output-to-file "/var/db/ntpd.drift"
- (lambda _
- (format #t "0.0")))))))
- (define openntpd-service-type
- (service-type (name 'openntpd)
- (extensions
- (list (service-extension shepherd-root-service-type
- openntpd-shepherd-service)
- (service-extension account-service-type
- (const %ntp-accounts))
- (service-extension profile-service-type
- (compose list openntpd-configuration-openntpd))
- (service-extension activation-service-type
- openntpd-service-activation)))
- (default-value (openntpd-configuration))
- (description
- "Run the @command{ntpd}, the Network Time Protocol (NTP)
- daemon, as implemented by @uref{http://www.openntpd.org, OpenNTPD}. The
- daemon will keep the system clock synchronized with that of the given servers.")))
- ;;;
- ;;; Inetd.
- ;;;
- (define-record-type* <inetd-configuration> inetd-configuration
- make-inetd-configuration
- inetd-configuration?
- (program inetd-configuration-program ;file-like
- (default (file-append inetutils "/libexec/inetd")))
- (entries inetd-configuration-entries ;list of <inetd-entry>
- (default '())))
- (define-record-type* <inetd-entry> inetd-entry make-inetd-entry
- inetd-entry?
- (node inetd-entry-node ;string or #f
- (default #f))
- (name inetd-entry-name) ;string, from /etc/services
- (socket-type inetd-entry-socket-type) ;stream | dgram | raw |
- ;rdm | seqpacket
- (protocol inetd-entry-protocol) ;string, from /etc/protocols
- (wait? inetd-entry-wait? ;Boolean
- (default #t))
- (user inetd-entry-user) ;string
- (program inetd-entry-program ;string or file-like object
- (default "internal"))
- (arguments inetd-entry-arguments ;list of strings or file-like objects
- (default '())))
- (define (inetd-config-file entries)
- (apply mixed-text-file "inetd.conf"
- (map
- (lambda (entry)
- (let* ((node (inetd-entry-node entry))
- (name (inetd-entry-name entry))
- (socket
- (if node (string-append node ":" name) name))
- (type
- (match (inetd-entry-socket-type entry)
- ((or 'stream 'dgram 'raw 'rdm 'seqpacket)
- (symbol->string (inetd-entry-socket-type entry)))))
- (protocol (inetd-entry-protocol entry))
- (wait (if (inetd-entry-wait? entry) "wait" "nowait"))
- (user (inetd-entry-user entry))
- (program (inetd-entry-program entry))
- (args (inetd-entry-arguments entry)))
- #~(string-append
- (string-join
- (list #$@(list socket type protocol wait user program) #$@args)
- " ") "\n")))
- entries)))
- (define inetd-shepherd-service
- (match-lambda
- (($ <inetd-configuration> program ()) '()) ; empty list of entries -> do nothing
- (($ <inetd-configuration> program entries)
- (list
- (shepherd-service
- (documentation "Run inetd.")
- (provision '(inetd))
- (requirement '(user-processes networking syslogd))
- (start #~(make-forkexec-constructor
- (list #$program #$(inetd-config-file entries))
- #:pid-file "/var/run/inetd.pid"))
- (stop #~(make-kill-destructor)))))))
- (define-public inetd-service-type
- (service-type
- (name 'inetd)
- (extensions
- (list (service-extension shepherd-root-service-type
- inetd-shepherd-service)))
- ;; The service can be extended with additional lists of entries.
- (compose concatenate)
- (extend (lambda (config entries)
- (inetd-configuration
- (inherit config)
- (entries (append (inetd-configuration-entries config)
- entries)))))
- (description
- "Start @command{inetd}, the @dfn{Internet superserver}. It is responsible
- for listening on Internet sockets and spawning the corresponding services on
- demand.")))
- ;;;
- ;;; Tor.
- ;;;
- (define-record-type* <tor-configuration>
- tor-configuration make-tor-configuration
- tor-configuration?
- (tor tor-configuration-tor
- (default tor))
- (config-file tor-configuration-config-file
- (default (plain-file "empty" "")))
- (hidden-services tor-configuration-hidden-services
- (default '()))
- (socks-socket-type tor-configuration-socks-socket-type ; 'tcp or 'unix
- (default 'tcp)))
- (define %tor-accounts
- ;; User account and groups for Tor.
- (list (user-group (name "tor") (system? #t))
- (user-account
- (name "tor")
- (group "tor")
- (system? #t)
- (comment "Tor daemon user")
- (home-directory "/var/empty")
- (shell (file-append shadow "/sbin/nologin")))))
- (define-record-type <hidden-service>
- (hidden-service name mapping)
- hidden-service?
- (name hidden-service-name) ;string
- (mapping hidden-service-mapping)) ;list of port/address tuples
- (define (tor-configuration->torrc config)
- "Return a 'torrc' file for CONFIG."
- (match config
- (($ <tor-configuration> tor config-file services socks-socket-type)
- (computed-file
- "torrc"
- (with-imported-modules '((guix build utils))
- #~(begin
- (use-modules (guix build utils)
- (ice-9 match))
- (call-with-output-file #$output
- (lambda (port)
- (display "\
- ### These lines were generated from your system configuration:
- User tor
- DataDirectory /var/lib/tor
- PidFile /var/run/tor/tor.pid
- Log notice syslog\n" port)
- (when (eq? 'unix '#$socks-socket-type)
- (display "\
- SocksPort unix:/var/run/tor/socks-sock
- UnixSocksGroupWritable 1\n" port))
- (for-each (match-lambda
- ((service (ports hosts) ...)
- (format port "\
- HiddenServiceDir /var/lib/tor/hidden-services/~a~%"
- service)
- (for-each (lambda (tcp-port host)
- (format port "\
- HiddenServicePort ~a ~a~%"
- tcp-port host))
- ports hosts)))
- '#$(map (match-lambda
- (($ <hidden-service> name mapping)
- (cons name mapping)))
- services))
- (display "\
- ### End of automatically generated lines.\n\n" port)
- ;; Append the user's config file.
- (call-with-input-file #$config-file
- (lambda (input)
- (dump-port input port)))
- #t))))))))
- (define (tor-shepherd-service config)
- "Return a <shepherd-service> running Tor."
- (match config
- (($ <tor-configuration> tor)
- (let ((torrc (tor-configuration->torrc config)))
- (with-imported-modules (source-module-closure
- '((gnu build shepherd)
- (gnu system file-systems)))
- (list (shepherd-service
- (provision '(tor))
- ;; Tor needs at least one network interface to be up, hence the
- ;; dependency on 'loopback'.
- (requirement '(user-processes loopback syslogd))
- (modules '((gnu build shepherd)
- (gnu system file-systems)))
- (start #~(make-forkexec-constructor/container
- (list #$(file-append tor "/bin/tor") "-f" #$torrc)
- #:mappings (list (file-system-mapping
- (source "/var/lib/tor")
- (target source)
- (writable? #t))
- (file-system-mapping
- (source "/dev/log") ;for syslog
- (target source))
- (file-system-mapping
- (source "/var/run/tor")
- (target source)
- (writable? #t)))
- #:pid-file "/var/run/tor/tor.pid"))
- (stop #~(make-kill-destructor))
- (documentation "Run the Tor anonymous network overlay."))))))))
- (define (tor-activation config)
- "Set up directories for Tor and its hidden services, if any."
- #~(begin
- (use-modules (guix build utils))
- (define %user
- (getpw "tor"))
- (define (initialize service)
- (let ((directory (string-append "/var/lib/tor/hidden-services/"
- service)))
- (mkdir-p directory)
- (chown directory (passwd:uid %user) (passwd:gid %user))
- ;; The daemon bails out if we give wider permissions.
- (chmod directory #o700)))
- ;; Allow Tor to write its PID file.
- (mkdir-p "/var/run/tor")
- (chown "/var/run/tor" (passwd:uid %user) (passwd:gid %user))
- ;; Set the group permissions to rw so that if the system administrator
- ;; has specified UnixSocksGroupWritable=1 in their torrc file, members
- ;; of the "tor" group will be able to use the SOCKS socket.
- (chmod "/var/run/tor" #o750)
- ;; Allow Tor to access the hidden services' directories.
- (mkdir-p "/var/lib/tor")
- (chown "/var/lib/tor" (passwd:uid %user) (passwd:gid %user))
- (chmod "/var/lib/tor" #o700)
- ;; Make sure /var/lib is accessible to the 'tor' user.
- (chmod "/var/lib" #o755)
- (for-each initialize
- '#$(map hidden-service-name
- (tor-configuration-hidden-services config)))))
- (define tor-service-type
- (service-type (name 'tor)
- (extensions
- (list (service-extension shepherd-root-service-type
- tor-shepherd-service)
- (service-extension account-service-type
- (const %tor-accounts))
- (service-extension activation-service-type
- tor-activation)))
- ;; This can be extended with hidden services.
- (compose concatenate)
- (extend (lambda (config services)
- (tor-configuration
- (inherit config)
- (hidden-services
- (append (tor-configuration-hidden-services config)
- services)))))
- (default-value (tor-configuration))
- (description
- "Run the @uref{https://torproject.org, Tor} anonymous
- networking daemon.")))
- (define-deprecated (tor-service #:optional
- (config-file (plain-file "empty" ""))
- #:key (tor tor))
- tor-service-type
- "Return a service to run the @uref{https://torproject.org, Tor} anonymous
- networking daemon.
- The daemon runs as the @code{tor} unprivileged user. It is passed
- @var{config-file}, a file-like object, with an additional @code{User tor} line
- and lines for hidden services added via @code{tor-hidden-service}. Run
- @command{man tor} for information about the configuration file."
- (service tor-service-type
- (tor-configuration (tor tor)
- (config-file config-file))))
- (define tor-hidden-service-type
- ;; A type that extends Tor with hidden services.
- (service-type (name 'tor-hidden-service)
- (extensions
- (list (service-extension tor-service-type list)))
- (description
- "Define a new Tor @dfn{hidden service}.")))
- (define (tor-hidden-service name mapping)
- "Define a new Tor @dfn{hidden service} called @var{name} and implementing
- @var{mapping}. @var{mapping} is a list of port/host tuples, such as:
- @example
- '((22 \"127.0.0.1:22\")
- (80 \"127.0.0.1:8080\"))
- @end example
- In this example, port 22 of the hidden service is mapped to local port 22, and
- port 80 is mapped to local port 8080.
- This creates a @file{/var/lib/tor/hidden-services/@var{name}} directory, where
- the @file{hostname} file contains the @code{.onion} host name for the hidden
- service.
- See @uref{https://www.torproject.org/docs/tor-hidden-service.html.en, the Tor
- project's documentation} for more information."
- (service tor-hidden-service-type
- (hidden-service name mapping)))
- ;;;
- ;;; Wicd.
- ;;;
- (define %wicd-activation
- ;; Activation gexp for Wicd.
- #~(begin
- (use-modules (guix build utils))
- (mkdir-p "/etc/wicd")
- (let ((file-name "/etc/wicd/dhclient.conf.template.default"))
- (unless (file-exists? file-name)
- (copy-file (string-append #$wicd file-name)
- file-name)))
- ;; Wicd invokes 'wpa_supplicant', which needs this directory for its
- ;; named socket files.
- (mkdir-p "/var/run/wpa_supplicant")
- (chmod "/var/run/wpa_supplicant" #o750)))
- (define (wicd-shepherd-service wicd)
- "Return a shepherd service for WICD."
- (list (shepherd-service
- (documentation "Run the Wicd network manager.")
- (provision '(networking))
- (requirement '(user-processes dbus-system loopback))
- (start #~(make-forkexec-constructor
- (list (string-append #$wicd "/sbin/wicd")
- "--no-daemon")))
- (stop #~(make-kill-destructor)))))
- (define wicd-service-type
- (service-type (name 'wicd)
- (extensions
- (list (service-extension shepherd-root-service-type
- wicd-shepherd-service)
- (service-extension dbus-root-service-type
- list)
- (service-extension activation-service-type
- (const %wicd-activation))
- ;; Add Wicd to the global profile.
- (service-extension profile-service-type list)))
- (description
- "Run @url{https://launchpad.net/wicd,Wicd}, a network
- management daemon that aims to simplify wired and wireless networking.")))
- (define* (wicd-service #:key (wicd wicd))
- "Return a service that runs @url{https://launchpad.net/wicd,Wicd}, a network
- management daemon that aims to simplify wired and wireless networking.
- This service adds the @var{wicd} package to the global profile, providing
- several commands to interact with the daemon and configure networking:
- @command{wicd-client}, a graphical user interface, and the @command{wicd-cli}
- and @command{wicd-curses} user interfaces."
- (service wicd-service-type wicd))
- ;;;
- ;;; ModemManager
- ;;;
- (define-record-type* <modem-manager-configuration>
- modem-manager-configuration make-modem-manager-configuration
- modem-manager-configuration?
- (modem-manager modem-manager-configuration-modem-manager
- (default modem-manager)))
- ;;;
- ;;; NetworkManager
- ;;;
- (define-record-type* <network-manager-configuration>
- network-manager-configuration make-network-manager-configuration
- network-manager-configuration?
- (network-manager network-manager-configuration-network-manager
- (default network-manager))
- (dns network-manager-configuration-dns
- (default "default"))
- (vpn-plugins network-manager-vpn-plugins ;list of <package>
- (default '())))
- (define %network-manager-activation
- ;; Activation gexp for NetworkManager.
- #~(begin
- (use-modules (guix build utils))
- (mkdir-p "/etc/NetworkManager/system-connections")))
- (define (vpn-plugin-directory plugins)
- "Return a directory containing PLUGINS, the NM VPN plugins."
- (directory-union "network-manager-vpn-plugins" plugins))
- (define network-manager-environment
- (match-lambda
- (($ <network-manager-configuration> network-manager dns vpn-plugins)
- ;; Define this variable in the global environment such that
- ;; "nmcli connection import type openvpn file foo.ovpn" works.
- `(("NM_VPN_PLUGIN_DIR"
- . ,(file-append (vpn-plugin-directory vpn-plugins)
- "/lib/NetworkManager/VPN"))))))
- (define network-manager-shepherd-service
- (match-lambda
- (($ <network-manager-configuration> network-manager dns vpn-plugins)
- (let ((conf (plain-file "NetworkManager.conf"
- (string-append "[main]\ndns=" dns "\n")))
- (vpn (vpn-plugin-directory vpn-plugins)))
- (list (shepherd-service
- (documentation "Run the NetworkManager.")
- (provision '(networking))
- (requirement '(user-processes dbus-system wpa-supplicant loopback))
- (start #~(make-forkexec-constructor
- (list (string-append #$network-manager
- "/sbin/NetworkManager")
- (string-append "--config=" #$conf)
- "--no-daemon")
- #:environment-variables
- (list (string-append "NM_VPN_PLUGIN_DIR=" #$vpn
- "/lib/NetworkManager/VPN"))))
- (stop #~(make-kill-destructor))))))))
- (define network-manager-service-type
- (let
- ((config->package
- (match-lambda
- (($ <network-manager-configuration> network-manager)
- (list network-manager)))))
- (service-type
- (name 'network-manager)
- (extensions
- (list (service-extension shepherd-root-service-type
- network-manager-shepherd-service)
- (service-extension dbus-root-service-type config->package)
- (service-extension polkit-service-type config->package)
- (service-extension activation-service-type
- (const %network-manager-activation))
- (service-extension session-environment-service-type
- network-manager-environment)
- ;; Add network-manager to the system profile.
- (service-extension profile-service-type config->package)))
- (default-value (network-manager-configuration))
- (description
- "Run @uref{https://wiki.gnome.org/Projects/NetworkManager,
- NetworkManager}, a network management daemon that aims to simplify wired and
- wireless networking."))))
- ;;;
- ;;; Connman
- ;;;
- (define-record-type* <connman-configuration>
- connman-configuration make-connman-configuration
- connman-configuration?
- (connman connman-configuration-connman
- (default connman))
- (disable-vpn? connman-configuration-disable-vpn?
- (default #f)))
- (define (connman-activation config)
- (let ((disable-vpn? (connman-configuration-disable-vpn? config)))
- (with-imported-modules '((guix build utils))
- #~(begin
- (use-modules (guix build utils))
- (mkdir-p "/var/lib/connman/")
- (unless #$disable-vpn?
- (mkdir-p "/var/lib/connman-vpn/"))))))
- (define (connman-shepherd-service config)
- "Return a shepherd service for Connman"
- (and
- (connman-configuration? config)
- (let ((connman (connman-configuration-connman config))
- (disable-vpn? (connman-configuration-disable-vpn? config)))
- (list (shepherd-service
- (documentation "Run Connman")
- (provision '(networking))
- (requirement
- '(user-processes dbus-system loopback wpa-supplicant))
- (start #~(make-forkexec-constructor
- (list (string-append #$connman
- "/sbin/connmand")
- "-n" "-r"
- #$@(if disable-vpn? '("--noplugin=vpn") '()))))
- (stop #~(make-kill-destructor)))))))
- (define connman-service-type
- (let ((connman-package (compose list connman-configuration-connman)))
- (service-type (name 'connman)
- (extensions
- (list (service-extension shepherd-root-service-type
- connman-shepherd-service)
- (service-extension polkit-service-type
- connman-package)
- (service-extension dbus-root-service-type
- connman-package)
- (service-extension activation-service-type
- connman-activation)
- ;; Add connman to the system profile.
- (service-extension profile-service-type
- connman-package)))
- (default-value (connman-configuration))
- (description
- "Run @url{https://01.org/connman,Connman},
- a network connection manager."))))
- ;;;
- ;;; Modem manager
- ;;;
- (define modem-manager-service-type
- (let ((config->package
- (match-lambda
- (($ <modem-manager-configuration> modem-manager)
- (list modem-manager)))))
- (service-type (name 'modem-manager)
- (extensions
- (list (service-extension dbus-root-service-type
- config->package)
- (service-extension udev-service-type
- config->package)
- (service-extension polkit-service-type
- config->package)))
- (default-value (modem-manager-configuration))
- (description
- "Run @uref{https://wiki.gnome.org/Projects/ModemManager,
- ModemManager}, a modem management daemon that aims to simplify dialup
- networking."))))
- ;;;
- ;;; WPA supplicant
- ;;;
- (define-record-type* <wpa-supplicant-configuration>
- wpa-supplicant-configuration make-wpa-supplicant-configuration
- wpa-supplicant-configuration?
- (wpa-supplicant wpa-supplicant-configuration-wpa-supplicant ;<package>
- (default wpa-supplicant))
- (pid-file wpa-supplicant-configuration-pid-file ;string
- (default "/var/run/wpa_supplicant.pid"))
- (dbus? wpa-supplicant-configuration-dbus? ;Boolean
- (default #t))
- (interface wpa-supplicant-configuration-interface ;#f | string
- (default #f))
- (config-file wpa-supplicant-configuration-config-file ;#f | <file-like>
- (default #f))
- (extra-options wpa-supplicant-configuration-extra-options ;list of strings
- (default '())))
- (define wpa-supplicant-shepherd-service
- (match-lambda
- (($ <wpa-supplicant-configuration> wpa-supplicant pid-file dbus? interface
- config-file extra-options)
- (list (shepherd-service
- (documentation "Run the WPA supplicant daemon")
- (provision '(wpa-supplicant))
- (requirement '(user-processes dbus-system loopback))
- (start #~(make-forkexec-constructor
- (list (string-append #$wpa-supplicant
- "/sbin/wpa_supplicant")
- (string-append "-P" #$pid-file)
- "-B" ;run in background
- #$@(if dbus?
- #~("-u")
- #~())
- #$@(if interface
- #~((string-append "-i" #$interface))
- #~())
- #$@(if config-file
- #~((string-append "-c" #$config-file))
- #~())
- #$@extra-options)
- #:pid-file #$pid-file))
- (stop #~(make-kill-destructor)))))))
- (define wpa-supplicant-service-type
- (let ((config->package
- (match-lambda
- (($ <wpa-supplicant-configuration> wpa-supplicant)
- (list wpa-supplicant)))))
- (service-type (name 'wpa-supplicant)
- (extensions
- (list (service-extension shepherd-root-service-type
- wpa-supplicant-shepherd-service)
- (service-extension dbus-root-service-type config->package)
- (service-extension profile-service-type config->package)))
- (description "Run the WPA Supplicant daemon, a service that
- implements authentication, key negotiation and more for wireless networks.")
- (default-value (wpa-supplicant-configuration)))))
- ;;;
- ;;; Open vSwitch
- ;;;
- (define-record-type* <openvswitch-configuration>
- openvswitch-configuration make-openvswitch-configuration
- openvswitch-configuration?
- (package openvswitch-configuration-package
- (default openvswitch)))
- (define openvswitch-activation
- (match-lambda
- (($ <openvswitch-configuration> package)
- (let ((ovsdb-tool (file-append package "/bin/ovsdb-tool")))
- (with-imported-modules '((guix build utils))
- #~(begin
- (use-modules (guix build utils))
- (mkdir-p "/var/run/openvswitch")
- (mkdir-p "/var/lib/openvswitch")
- (let ((conf.db "/var/lib/openvswitch/conf.db"))
- (unless (file-exists? conf.db)
- (system* #$ovsdb-tool "create" conf.db)))))))))
- (define openvswitch-shepherd-service
- (match-lambda
- (($ <openvswitch-configuration> package)
- (let ((ovsdb-server (file-append package "/sbin/ovsdb-server"))
- (ovs-vswitchd (file-append package "/sbin/ovs-vswitchd")))
- (list
- (shepherd-service
- (provision '(ovsdb))
- (documentation "Run the Open vSwitch database server.")
- (start #~(make-forkexec-constructor
- (list #$ovsdb-server "--pidfile"
- "--remote=punix:/var/run/openvswitch/db.sock")
- #:pid-file "/var/run/openvswitch/ovsdb-server.pid"))
- (stop #~(make-kill-destructor)))
- (shepherd-service
- (provision '(vswitchd))
- (requirement '(ovsdb))
- (documentation "Run the Open vSwitch daemon.")
- (start #~(make-forkexec-constructor
- (list #$ovs-vswitchd "--pidfile")
- #:pid-file "/var/run/openvswitch/ovs-vswitchd.pid"))
- (stop #~(make-kill-destructor))))))))
- (define openvswitch-service-type
- (service-type
- (name 'openvswitch)
- (extensions
- (list (service-extension activation-service-type
- openvswitch-activation)
- (service-extension profile-service-type
- (compose list openvswitch-configuration-package))
- (service-extension shepherd-root-service-type
- openvswitch-shepherd-service)))
- (description
- "Run @uref{http://www.openvswitch.org, Open vSwitch}, a multilayer virtual
- switch designed to enable massive network automation through programmatic
- extension.")))
- ;;;
- ;;; iptables
- ;;;
- (define %iptables-accept-all-rules
- (plain-file "iptables-accept-all.rules"
- "*filter
- :INPUT ACCEPT
- :FORWARD ACCEPT
- :OUTPUT ACCEPT
- COMMIT
- "))
- (define-record-type* <iptables-configuration>
- iptables-configuration make-iptables-configuration iptables-configuration?
- (iptables iptables-configuration-iptables
- (default iptables))
- (ipv4-rules iptables-configuration-ipv4-rules
- (default %iptables-accept-all-rules))
- (ipv6-rules iptables-configuration-ipv6-rules
- (default %iptables-accept-all-rules)))
- (define iptables-shepherd-service
- (match-lambda
- (($ <iptables-configuration> iptables ipv4-rules ipv6-rules)
- (let ((iptables-restore (file-append iptables "/sbin/iptables-restore"))
- (ip6tables-restore (file-append iptables "/sbin/ip6tables-restore")))
- (shepherd-service
- (documentation "Packet filtering framework")
- (provision '(iptables))
- (start #~(lambda _
- (invoke #$iptables-restore #$ipv4-rules)
- (invoke #$ip6tables-restore #$ipv6-rules)))
- (stop #~(lambda _
- (invoke #$iptables-restore #$%iptables-accept-all-rules)
- (invoke #$ip6tables-restore #$%iptables-accept-all-rules))))))))
- (define iptables-service-type
- (service-type
- (name 'iptables)
- (description
- "Run @command{iptables-restore}, setting up the specified rules.")
- (extensions
- (list (service-extension shepherd-root-service-type
- (compose list iptables-shepherd-service))))))
- ;;; networking.scm ends here
|