123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256 |
- ;;; GNU Guix --- Functional package management for GNU
- ;;; Copyright © 2013-2023 Ludovic Courtès <ludo@gnu.org>
- ;;; Copyright © 2015 Mark H Weaver <mhw@netris.org>
- ;;; Copyright © 2016, 2018, 2020 Efraim Flashner <efraim@flashner.co.il>
- ;;; Copyright © 2016 John Darrington <jmd@gnu.org>
- ;;; Copyright © 2017 Clément Lassieur <clement@lassieur.org>
- ;;; Copyright © 2017 Thomas Danckaert <post@thomasdanckaert.be>
- ;;; Copyright © 2017, 2018 Marius Bakke <mbakke@fastmail.com>
- ;;; Copyright © 2018 Tobias Geerinckx-Rice <me@tobias.gr>
- ;;; Copyright © 2018 Chris Marusich <cmmarusich@gmail.com>
- ;;; Copyright © 2018 Arun Isaac <arunisaac@systemreboot.net>
- ;;; Copyright © 2019 Florian Pelz <pelzflorian@pelzflorian.de>
- ;;; Copyright © 2019, 2021 Maxim Cournoyer <maxim.cournoyer@gmail.com>
- ;;; Copyright © 2019 Sou Bunnbu <iyzsong@member.fsf.org>
- ;;; Copyright © 2019 Alex Griffin <a@ajgrf.com>
- ;;; Copyright © 2020 Brice Waegeneire <brice@waegenei.re>
- ;;; Copyright © 2021 Oleg Pykhalov <go.wigust@gmail.com>
- ;;; Copyright © 2021 Christine Lemmer-Webber <cwebber@dustycloud.org>
- ;;; Copyright © 2021 Maxime Devos <maximedevos@telenet.be>
- ;;; Copyright © 2021 Guillaume Le Vaillant <glv@posteo.net>
- ;;; Copyright © 2022, 2023 Andrew Tropin <andrew@trop.in>
- ;;; Copyright © 2023 Declan Tsien <declantsien@riseup.net>
- ;;; Copyright © 2023 Bruno Victal <mirai@makinata.eu>
- ;;;
- ;;; This file is part of GNU Guix.
- ;;;
- ;;; GNU Guix is free software; you can redistribute it and/or modify it
- ;;; under the terms of the GNU General Public License as published by
- ;;; the Free Software Foundation; either version 3 of the License, or (at
- ;;; your option) any later version.
- ;;;
- ;;; GNU Guix is distributed in the hope that it will be useful, but
- ;;; WITHOUT ANY WARRANTY; without even the implied warranty of
- ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- ;;; GNU General Public License for more details.
- ;;;
- ;;; You should have received a copy of the GNU General Public License
- ;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
- (define-module (gnu services networking)
- #:use-module (gnu services)
- #:use-module (gnu services base)
- #:use-module (gnu services configuration)
- #:use-module (gnu services linux)
- #:use-module (gnu services shepherd)
- #:use-module (gnu services dbus)
- #:use-module (gnu services admin)
- #:use-module (gnu system shadow)
- #:use-module (gnu system pam)
- #:use-module ((gnu system file-systems) #:select (file-system-mapping))
- #:use-module (gnu packages admin)
- #:use-module (gnu packages base)
- #:use-module (gnu packages bash)
- #:use-module (gnu packages cluster)
- #:use-module (gnu packages connman)
- #:use-module (gnu packages freedesktop)
- #:use-module (gnu packages linux)
- #:use-module (gnu packages tor)
- #:use-module (gnu packages usb-modeswitch)
- #:use-module (gnu packages messaging)
- #:use-module (gnu packages networking)
- #:use-module (gnu packages ntp)
- #:use-module (gnu packages gnome)
- #:use-module (gnu packages ipfs)
- #:use-module (gnu build linux-container)
- #:autoload (guix least-authority) (least-authority-wrapper)
- #:use-module (guix gexp)
- #:use-module (guix records)
- #:use-module (guix modules)
- #:use-module (guix packages)
- #:use-module (guix deprecation)
- #:use-module (guix diagnostics)
- #:autoload (guix ui) (display-hint)
- #:use-module (guix i18n)
- #:use-module (rnrs enums)
- #:use-module (srfi srfi-1)
- #:use-module (srfi srfi-9)
- #:use-module (srfi srfi-26)
- #:use-module (srfi srfi-43)
- #:use-module (ice-9 match)
- #:use-module (json)
- #:re-export (static-networking-service
- static-networking-service-type)
- #:export (%facebook-host-aliases ;deprecated
- block-facebook-hosts-service-type
- dhcp-client-service-type
- dhcp-client-configuration
- dhcp-client-configuration?
- dhcp-client-configuration-package
- dhcp-client-configuration-interfaces
- dhcp-client-configuration-shepherd-provision
- dhcp-client-configuration-shepherd-requirement
- dhcpd-service-type
- dhcpd-configuration
- dhcpd-configuration?
- dhcpd-configuration-package
- dhcpd-configuration-config-file
- dhcpd-configuration-version
- dhcpd-configuration-run-directory
- dhcpd-configuration-lease-file
- dhcpd-configuration-pid-file
- dhcpd-configuration-interfaces
- ntp-configuration
- ntp-configuration?
- ntp-configuration-ntp
- ntp-configuration-servers
- ntp-allow-large-adjustment?
- %ntp-servers
- ntp-server
- ntp-server-type
- ntp-server-address
- ntp-server-options
- ntp-service-type
- %openntpd-servers
- openntpd-configuration
- openntpd-configuration?
- openntpd-service-type
- inetd-configuration
- inetd-configuration?
- inetd-configuration-program
- inetd-configuration-entries
- inetd-entry
- inetd-entry?
- inetd-entry-node
- inetd-entry-name
- inetd-entry-socket-type
- inetd-entry-protocol
- inetd-entry-wait?
- inetd-entry-user
- inetd-entry-program
- inetd-entry-arguments
- inetd-service-type
- opendht-configuration
- opendht-configuration-peer-discovery?
- opendht-configuration-verbose?
- opendht-configuration-bootstrap-host
- opendht-configuration-port
- opendht-configuration-proxy-server-port
- opendht-configuration-proxy-server-port-tls
- opendht-configuration->command-line-arguments
- opendht-shepherd-service
- opendht-service-type
- tor-configuration
- tor-configuration?
- tor-configuration-tor
- tor-configuration-config-file
- tor-configuration-hidden-services
- tor-configuration-socks-socket-type
- tor-configuration-control-socket-path
- tor-onion-service-configuration
- tor-onion-service-configuration?
- tor-onion-service-configuration-name
- tor-onion-service-configuration-mapping
- tor-hidden-service ; deprecated
- tor-service-type
- network-manager-configuration
- network-manager-configuration?
- network-manager-configuration-shepherd-requirement
- network-manager-configuration-dns
- network-manager-configuration-vpn-plugins
- network-manager-service-type
- connman-configuration
- connman-configuration?
- connman-configuration-connman
- connman-configuration-shepherd-requirement
- connman-configuration-disable-vpn?
- connman-configuration-iwd?
- connman-service-type
- modem-manager-configuration
- modem-manager-configuration?
- modem-manager-service-type
- usb-modeswitch-configuration
- usb-modeswitch-configuration?
- usb-modeswitch-configuration-usb-modeswitch
- usb-modeswitch-configuration-usb-modeswitch-data
- usb-modeswitch-service-type
- wpa-supplicant-configuration
- wpa-supplicant-configuration?
- wpa-supplicant-configuration-wpa-supplicant
- wpa-supplicant-configuration-requirement
- wpa-supplicant-configuration-pid-file
- wpa-supplicant-configuration-dbus?
- wpa-supplicant-configuration-interface
- wpa-supplicant-configuration-config-file
- wpa-supplicant-configuration-extra-options
- wpa-supplicant-service-type
- hostapd-configuration
- hostapd-configuration?
- hostapd-configuration-package
- hostapd-configuration-interface
- hostapd-configuration-ssid
- hostapd-configuration-broadcast-ssid?
- hostapd-configuration-channel
- hostapd-configuration-driver
- hostapd-service-type
- simulated-wifi-service-type
- openvswitch-service-type
- openvswitch-configuration
- iptables-configuration
- iptables-configuration?
- iptables-configuration-iptables
- iptables-configuration-ipv4-rules
- iptables-configuration-ipv6-rules
- iptables-service-type
- nftables-service-type
- nftables-configuration
- nftables-configuration?
- nftables-configuration-package
- nftables-configuration-ruleset
- %default-nftables-ruleset
- pagekite-service-type
- pagekite-configuration
- pagekite-configuration?
- pagekite-configuration-package
- pagekite-configuration-kitename
- pagekite-configuration-kitesecret
- pagekite-configuration-frontend
- pagekite-configuration-kites
- pagekite-configuration-extra-file
- yggdrasil-service-type
- yggdrasil-configuration
- yggdrasil-configuration?
- yggdrasil-configuration-autoconf?
- yggdrasil-configuration-config-file
- yggdrasil-configuration-log-level
- yggdrasil-configuration-log-to
- yggdrasil-configuration-json-config
- yggdrasil-configuration-package
- ipfs-service-type
- ipfs-configuration
- ipfs-configuration?
- ipfs-configuration-package
- ipfs-configuration-gateway
- ipfs-configuration-api
- keepalived-configuration
- keepalived-configuration?
- keepalived-service-type))
- ;;; Commentary:
- ;;;
- ;;; Networking services.
- ;;;
- ;;; Code:
- (define facebook-host-aliases
- ;; This is the list of known Facebook hosts to be added to /etc/hosts if you
- ;; are to block it.
- (let ((domains '("facebook.com" "www.facebook.com"
- "login.facebook.com" "www.login.facebook.com"
- "fbcdn.net" "www.fbcdn.net" "fbcdn.com" "www.fbcdn.com"
- "static.ak.fbcdn.net" "static.ak.connect.facebook.com"
- "connect.facebook.net" "www.connect.facebook.net"
- "apps.facebook.com")))
- (append-map (lambda (name)
- (map (lambda (addr)
- (host addr name))
- (list "127.0.0.1" "::1"))) domains)))
- (define-deprecated %facebook-host-aliases
- block-facebook-hosts-service-type
- (string-join
- (map (lambda (x)
- (string-append (host-address x) "\t"
- (host-canonical-name x) "\n"))
- facebook-host-aliases)))
- (define block-facebook-hosts-service-type
- (service-type
- (name 'block-facebook-hosts)
- (extensions
- (list (service-extension hosts-service-type
- (const facebook-host-aliases))))
- (default-value #f)
- (description "Add a list of known Facebook hosts to @file{/etc/hosts}")))
- (define-record-type* <dhcp-client-configuration>
- dhcp-client-configuration make-dhcp-client-configuration
- dhcp-client-configuration?
- (package dhcp-client-configuration-package ;file-like
- (default isc-dhcp))
- (shepherd-requirement dhcp-client-configuration-shepherd-requirement
- (default '()))
- (shepherd-provision dhcp-client-configuration-shepherd-provision
- (default '(networking)))
- (interfaces dhcp-client-configuration-interfaces
- (default 'all))) ;'all | list of strings
- (define dhcp-client-shepherd-service
- (match-lambda
- ((? dhcp-client-configuration? config)
- (let ((package (dhcp-client-configuration-package config))
- (requirement (dhcp-client-configuration-shepherd-requirement config))
- (provision (dhcp-client-configuration-shepherd-provision config))
- (interfaces (dhcp-client-configuration-interfaces config))
- (pid-file "/var/run/dhclient.pid"))
- (list (shepherd-service
- (documentation "Set up networking via DHCP.")
- (requirement `(user-processes udev ,@requirement))
- (provision provision)
- ;; XXX: Running with '-nw' ("no wait") avoids blocking for a minute when
- ;; networking is unavailable, but also means that the interface is not up
- ;; yet when 'start' completes. To wait for the interface to be ready, one
- ;; should instead monitor udev events.
- (start #~(lambda _
- (define dhclient
- (string-append #$package "/sbin/dhclient"))
- ;; When invoked without any arguments, 'dhclient' discovers all
- ;; non-loopback interfaces *that are up*. However, the relevant
- ;; interfaces are typically down at this point. Thus we perform
- ;; our own interface discovery here.
- (define valid?
- (lambda (interface)
- (and (arp-network-interface? interface)
- (not (loopback-network-interface? interface))
- ;; XXX: Make sure the interfaces are up so that
- ;; 'dhclient' can actually send/receive over them.
- ;; Ignore those that cannot be activated.
- (false-if-exception
- (set-network-interface-up interface)))))
- (define ifaces
- (filter valid?
- #$(match interfaces
- ('all
- #~(all-network-interface-names))
- (_
- #~'#$interfaces))))
- (false-if-exception (delete-file #$pid-file))
- (let ((pid (fork+exec-command
- (cons* dhclient "-nw"
- "-pf" #$pid-file ifaces))))
- (and (zero? (cdr (waitpid pid)))
- (read-pid-file #$pid-file)))))
- (stop #~(make-kill-destructor))))))
- (package
- (warning (G_ "'dhcp-client' service now expects a \
- 'dhcp-client-configuration' record~%"))
- (display-hint (G_ "The value associated with instances of
- @code{dhcp-client-service-type} must now be a @code{dhcp-client-configuration}
- record instead of a package. Please adjust your configuration accordingly."))
- (dhcp-client-shepherd-service
- (dhcp-client-configuration
- (package package))))))
- (define dhcp-client-service-type
- (service-type (name 'dhcp-client)
- (extensions
- (list (service-extension shepherd-root-service-type
- dhcp-client-shepherd-service)))
- (default-value (dhcp-client-configuration))
- (description "Run @command{dhcp}, a Dynamic Host Configuration
- Protocol (DHCP) client, on all the non-loopback network interfaces.")))
- (define-record-type* <dhcpd-configuration>
- dhcpd-configuration make-dhcpd-configuration
- dhcpd-configuration?
- (package dhcpd-configuration-package ;file-like
- (default isc-dhcp))
- (config-file dhcpd-configuration-config-file ;file-like
- (default #f))
- (version dhcpd-configuration-version ;"4", "6", or "4o6"
- (default "4"))
- (run-directory dhcpd-configuration-run-directory
- (default "/run/dhcpd"))
- (lease-file dhcpd-configuration-lease-file
- (default "/var/db/dhcpd.leases"))
- (pid-file dhcpd-configuration-pid-file
- (default "/run/dhcpd/dhcpd.pid"))
- ;; list of strings, e.g. (list "enp0s25")
- (interfaces dhcpd-configuration-interfaces
- (default '())))
- (define (dhcpd-shepherd-service config)
- (match-record config <dhcpd-configuration>
- (package config-file version run-directory
- lease-file pid-file interfaces)
- (unless config-file
- (error "Must supply a config-file"))
- (list (shepherd-service
- ;; Allow users to easily run multiple versions simultaneously.
- (provision (list (string->symbol
- (string-append "dhcpv" version "-daemon"))))
- (documentation (string-append "Run the DHCPv" version " daemon"))
- (requirement '(networking))
- (start #~(make-forkexec-constructor
- '(#$(file-append package "/sbin/dhcpd")
- #$(string-append "-" version)
- "-lf" #$lease-file
- "-pf" #$pid-file
- "-cf" #$config-file
- #$@interfaces)
- #:pid-file #$pid-file))
- (stop #~(make-kill-destructor))))))
- (define (dhcpd-activation config)
- (match-record config <dhcpd-configuration>
- (package config-file version run-directory
- lease-file pid-file interfaces)
- (with-imported-modules '((guix build utils))
- #~(begin
- (unless (file-exists? #$run-directory)
- (mkdir #$run-directory))
- ;; According to the DHCP manual (man dhcpd.leases), the lease
- ;; database must be present for dhcpd to start successfully.
- (unless (file-exists? #$lease-file)
- (with-output-to-file #$lease-file
- (lambda _ (display ""))))
- ;; Validate the config.
- (invoke/quiet
- #$(file-append package "/sbin/dhcpd")
- #$(string-append "-" version)
- "-t" "-cf" #$config-file)))))
- (define dhcpd-service-type
- (service-type
- (name 'dhcpd)
- (extensions
- (list (service-extension shepherd-root-service-type dhcpd-shepherd-service)
- (service-extension activation-service-type dhcpd-activation)))
- (description "Run a DHCP (Dynamic Host Configuration Protocol) daemon. The
- daemon is responsible for allocating IP addresses to its client.")))
- ;;;
- ;;; NTP.
- ;;;
- (define %ntp-log-rotation
- (list (log-rotation
- (files '("/var/log/ntpd.log")))))
- (define ntp-server-types (make-enumeration
- '(pool
- server
- peer
- broadcast
- manycastclient)))
- (define-record-type* <ntp-server>
- ntp-server make-ntp-server
- ntp-server?
- ;; The type can be one of the symbols of the NTP-SERVER-TYPE? enumeration.
- (type ntp-server-type
- (default 'server))
- (address ntp-server-address) ; a string
- ;; The list of options can contain single option names or tuples in the form
- ;; '(name value).
- (options ntp-server-options
- (default '())))
- (define (ntp-server->string ntp-server)
- ;; Serialize the NTP server object as a string, ready to use in the NTP
- ;; configuration file.
- (define (flatten lst)
- (reverse
- (let loop ((x lst)
- (res '()))
- (if (list? x)
- (fold loop res x)
- (cons (format #f "~a" x) res)))))
- (match-record ntp-server <ntp-server>
- (type address options)
- ;; XXX: It'd be neater if fields were validated at the syntax level (for
- ;; static ones at least). Perhaps the Guix record type could support a
- ;; predicate property on a field?
- (unless (enum-set-member? type ntp-server-types)
- (error "Invalid NTP server type" type))
- (string-join (cons* (symbol->string type)
- address
- (flatten options)))))
- (define %ntp-servers
- ;; Default set of NTP servers. These URLs are managed by the NTP Pool project.
- ;; Within Guix, Leo Famulari <leo@famulari.name> is the administrative contact
- ;; for this NTP pool "zone".
- ;; The full list of available URLs are 0.guix.pool.ntp.org,
- ;; 1.guix.pool.ntp.org, 2.guix.pool.ntp.org, and 3.guix.pool.ntp.org.
- (list
- (ntp-server
- (type 'pool)
- (address "0.guix.pool.ntp.org")
- (options '("iburst"))))) ;as recommended in the ntpd manual
- (define-record-type* <ntp-configuration>
- ntp-configuration make-ntp-configuration
- ntp-configuration?
- (ntp ntp-configuration-ntp
- (default ntp))
- (servers ntp-configuration-servers ;list of <ntp-server> objects
- (default %ntp-servers))
- (allow-large-adjustment? ntp-allow-large-adjustment?
- (default #t))) ;as recommended in the ntpd manual
- (define (ntp-shepherd-service config)
- (match-record config <ntp-configuration>
- (ntp servers allow-large-adjustment?)
- ;; TODO: Add authentication support.
- (define config
- (string-append "driftfile /var/run/ntpd/ntp.drift\n"
- (string-join (map ntp-server->string servers) "\n")
- "
- # Disable status queries as a workaround for CVE-2013-5211:
- # <http://support.ntp.org/bin/view/Main/SecurityNotice#DRDoS_Amplification_Attack_using>.
- restrict default kod nomodify notrap nopeer noquery limited
- restrict -6 default kod nomodify notrap nopeer noquery limited
- # Yet, allow use of the local 'ntpq'.
- restrict 127.0.0.1
- restrict -6 ::1
- # This is required to use servers from a pool directive when using the 'nopeer'
- # option by default, as documented in the 'ntp.conf' manual.
- restrict source notrap nomodify noquery\n"))
- (define ntpd.conf
- (plain-file "ntpd.conf" config))
- (list (shepherd-service
- (provision '(ntpd))
- (documentation "Run the Network Time Protocol (NTP) daemon.")
- (requirement '(user-processes networking))
- (actions (list (shepherd-configuration-action ntpd.conf)))
- (start #~(make-forkexec-constructor
- (list (string-append #$ntp "/bin/ntpd") "-n"
- "-c" #$ntpd.conf "-u" "ntpd"
- #$@(if allow-large-adjustment?
- '("-g")
- '()))
- #:log-file "/var/log/ntpd.log"))
- (stop #~(make-kill-destructor))))))
- (define %ntp-accounts
- (list (user-account
- (name "ntpd")
- (group "nogroup")
- (system? #t)
- (comment "NTP daemon user")
- (home-directory "/var/empty")
- (shell (file-append shadow "/sbin/nologin")))))
- (define (ntp-service-activation config)
- "Return the activation gexp for CONFIG."
- (with-imported-modules '((guix build utils))
- #~(begin
- (use-modules (guix build utils))
- (define %user
- (getpw "ntpd"))
- (let ((directory "/var/run/ntpd"))
- (mkdir-p directory)
- (chown directory (passwd:uid %user) (passwd:gid %user))))))
- (define ntp-service-type
- (service-type (name 'ntp)
- (extensions
- (list (service-extension shepherd-root-service-type
- ntp-shepherd-service)
- (service-extension account-service-type
- (const %ntp-accounts))
- (service-extension activation-service-type
- ntp-service-activation)
- (service-extension rottlog-service-type
- (const %ntp-log-rotation))))
- (description
- "Run the @command{ntpd}, the Network Time Protocol (NTP)
- daemon of the @uref{http://www.ntp.org, Network Time Foundation}. The daemon
- will keep the system clock synchronized with that of the given servers.")
- (default-value (ntp-configuration))))
- ;;;
- ;;; OpenNTPD.
- ;;;
- (define %openntpd-servers
- (map ntp-server-address %ntp-servers))
- (define-record-type* <openntpd-configuration>
- openntpd-configuration make-openntpd-configuration
- openntpd-configuration?
- (openntpd openntpd-configuration-openntpd
- (default openntpd))
- (listen-on openntpd-listen-on
- (default '("127.0.0.1"
- "::1")))
- (query-from openntpd-query-from
- (default '()))
- (sensor openntpd-sensor
- (default '()))
- (server openntpd-server
- (default '()))
- (servers openntpd-servers
- (default %openntpd-servers))
- (constraint-from openntpd-constraint-from
- (default '()))
- (constraints-from openntpd-constraints-from
- (default '())))
- (define (openntpd-configuration->string config)
- (define (quote-field? name)
- (member name '("constraints from")))
- (match-record config <openntpd-configuration>
- (listen-on query-from sensor server servers constraint-from
- constraints-from)
- (string-append
- (string-join
- (concatenate
- (filter-map (lambda (field values)
- (match values
- (() #f) ;discard entry with filter-map
- ((val ...) ;validate value type
- (map (lambda (value)
- (if (quote-field? field)
- (format #f "~a \"~a\"" field value)
- (format #f "~a ~a" field value)))
- values))))
- ;; The entry names.
- '("listen on" "query from" "sensor" "server" "servers"
- "constraint from" "constraints from")
- ;; The corresponding entry values.
- (list listen-on query-from sensor server servers
- constraint-from constraints-from)))
- "\n")
- "\n"))) ;add a trailing newline
- (define (openntpd-shepherd-service config)
- (let ((openntpd (openntpd-configuration-openntpd config)))
- (define ntpd.conf
- (plain-file "ntpd.conf" (openntpd-configuration->string config)))
- (list (shepherd-service
- (provision '(ntpd))
- (documentation "Run the Network Time Protocol (NTP) daemon.")
- (requirement '(user-processes networking))
- (start #~(make-forkexec-constructor
- (list (string-append #$openntpd "/sbin/ntpd")
- "-f" #$ntpd.conf
- "-d") ;; don't daemonize
- ;; When ntpd is daemonized it repeatedly tries to respawn
- ;; while running, leading shepherd to disable it. To
- ;; prevent spamming stderr, redirect output to logfile.
- #:log-file "/var/log/ntpd.log"))
- (stop #~(make-kill-destructor))
- (actions (list (shepherd-configuration-action ntpd.conf)))))))
- (define (openntpd-service-activation config)
- "Return the activation gexp for CONFIG."
- (with-imported-modules '((guix build utils))
- #~(begin
- (use-modules (guix build utils))
- (mkdir-p "/var/db")
- (mkdir-p "/var/run")
- (unless (file-exists? "/var/db/ntpd.drift")
- (with-output-to-file "/var/db/ntpd.drift"
- (lambda _
- (format #t "0.0")))))))
- (define openntpd-service-type
- (service-type (name 'openntpd)
- (extensions
- (list (service-extension shepherd-root-service-type
- openntpd-shepherd-service)
- (service-extension account-service-type
- (const %ntp-accounts))
- (service-extension profile-service-type
- (compose list openntpd-configuration-openntpd))
- (service-extension activation-service-type
- openntpd-service-activation)
- (service-extension rottlog-service-type
- (const %ntp-log-rotation))))
- (default-value (openntpd-configuration))
- (description
- "Run the @command{ntpd}, the Network Time Protocol (NTP)
- daemon, as implemented by @uref{http://www.openntpd.org, OpenNTPD}. The
- daemon will keep the system clock synchronized with that of the given servers.")))
- ;;;
- ;;; Inetd.
- ;;;
- (define-record-type* <inetd-configuration> inetd-configuration
- make-inetd-configuration
- inetd-configuration?
- (program inetd-configuration-program ;file-like
- (default (file-append inetutils "/libexec/inetd")))
- (entries inetd-configuration-entries ;list of <inetd-entry>
- (default '())))
- (define-record-type* <inetd-entry> inetd-entry make-inetd-entry
- inetd-entry?
- (node inetd-entry-node ;string or #f
- (default #f))
- (name inetd-entry-name) ;string, from /etc/services
- (socket-type inetd-entry-socket-type) ;stream | dgram | raw |
- ;rdm | seqpacket
- (protocol inetd-entry-protocol) ;string, from /etc/protocols
- (wait? inetd-entry-wait? ;Boolean
- (default #t))
- (user inetd-entry-user) ;string
- (program inetd-entry-program ;string or file-like object
- (default "internal"))
- (arguments inetd-entry-arguments ;list of strings or file-like objects
- (default '())))
- (define (inetd-config-file entries)
- (apply mixed-text-file "inetd.conf"
- (map
- (lambda (entry)
- (let* ((node (inetd-entry-node entry))
- (name (inetd-entry-name entry))
- (socket
- (if node (string-append node ":" name) name))
- (type
- (match (inetd-entry-socket-type entry)
- ((or 'stream 'dgram 'raw 'rdm 'seqpacket)
- (symbol->string (inetd-entry-socket-type entry)))))
- (protocol (inetd-entry-protocol entry))
- (wait (if (inetd-entry-wait? entry) "wait" "nowait"))
- (user (inetd-entry-user entry))
- (program (inetd-entry-program entry))
- (args (inetd-entry-arguments entry)))
- #~(string-append
- (string-join
- (list #$@(list socket type protocol wait user program) #$@args)
- " ") "\n")))
- entries)))
- (define (inetd-shepherd-service config)
- (let ((entries (inetd-configuration-entries config)))
- (if (null? entries)
- '() ;do nothing
- (let ((program (inetd-configuration-program config)))
- (list (shepherd-service
- (documentation "Run inetd.")
- (provision '(inetd))
- (requirement '(user-processes networking syslogd))
- (start #~(make-forkexec-constructor
- (list #$program #$(inetd-config-file entries))
- #:pid-file "/var/run/inetd.pid"))
- (stop #~(make-kill-destructor))))))))
- (define-public inetd-service-type
- (service-type
- (name 'inetd)
- (extensions
- (list (service-extension shepherd-root-service-type
- inetd-shepherd-service)))
- ;; The service can be extended with additional lists of entries.
- (compose concatenate)
- (extend (lambda (config entries)
- (inetd-configuration
- (inherit config)
- (entries (append (inetd-configuration-entries config)
- entries)))))
- (description
- "Start @command{inetd}, the @dfn{Internet superserver}. It is responsible
- for listening on Internet sockets and spawning the corresponding services on
- demand.")))
- ;;;
- ;;; OpenDHT, the distributed hash table network used by Jami
- ;;;
- (define-maybe/no-serialization number)
- (define-maybe/no-serialization string)
- ;;; To generate the documentation of the following configuration record, you
- ;;; can evaluate: (configuration->documentation 'opendht-configuration)
- (define-configuration/no-serialization opendht-configuration
- (opendht
- (file-like opendht)
- "The @code{opendht} package to use.")
- (peer-discovery?
- (boolean #false)
- "Whether to enable the multicast local peer discovery mechanism.")
- (enable-logging?
- (boolean #false)
- "Whether to enable logging messages to syslog. It is disabled by default
- as it is rather verbose.")
- (debug?
- (boolean #false)
- "Whether to enable debug-level logging messages. This has no effect if
- logging is disabled.")
- (bootstrap-host
- (maybe-string "bootstrap.jami.net:4222")
- "The node host name that is used to make the first connection to the
- network. A specific port value can be provided by appending the @code{:PORT}
- suffix. By default, it uses the Jami bootstrap nodes, but any host can be
- specified here. It's also possible to disable bootstrapping by explicitly
- setting this field to @code{%unset-value}.")
- (port
- (maybe-number 4222)
- "The UDP port to bind to. When left unspecified, an available port is
- automatically selected.")
- (proxy-server-port
- maybe-number
- "Spawn a proxy server listening on the specified port.")
- (proxy-server-port-tls
- maybe-number
- "Spawn a proxy server listening to TLS connections on the specified
- port."))
- (define %opendht-accounts
- ;; User account and groups for Tor.
- (list (user-group (name "opendht") (system? #t))
- (user-account
- (name "opendht")
- (group "opendht")
- (system? #t)
- (comment "OpenDHT daemon user")
- (home-directory "/var/empty")
- (shell (file-append shadow "/sbin/nologin")))))
- (define (opendht-configuration->command-line-arguments config)
- "Derive the command line arguments used to launch the OpenDHT daemon from
- CONFIG, an <opendht-configuration> object."
- (match-record config <opendht-configuration>
- (opendht bootstrap-host enable-logging? port debug? peer-discovery?
- proxy-server-port proxy-server-port-tls)
- (let ((dhtnode (least-authority-wrapper
- ;; XXX: Work around lack of support for multiple outputs
- ;; in 'file-append'.
- (computed-file "dhtnode"
- #~(symlink
- (string-append #$opendht:tools
- "/bin/dhtnode")
- #$output))
- #:name "dhtnode"
- #:mappings (list (file-system-mapping
- (source "/dev/log") ;for syslog
- (target source)))
- #:namespaces (delq 'net %namespaces))))
- `(,dhtnode
- "--service" ;non-forking mode
- ,@(if (string? bootstrap-host)
- (list "--bootstrap" bootstrap-host))
- ,@(if enable-logging?
- (list "--syslog")
- '())
- ,@(if (number? port)
- (list "--port" (number->string port))
- '())
- ,@(if debug?
- (list "--verbose")
- '())
- ,@(if peer-discovery?
- (list "--peer-discovery")
- '())
- ,@(if (number? proxy-server-port)
- (list "--proxyserver" (number->string proxy-server-port))
- '())
- ,@(if (number? proxy-server-port-tls)
- (list "--proxyserverssl" (number->string proxy-server-port-tls))
- '())))))
- (define (opendht-shepherd-service config)
- "Return a <shepherd-service> running OpenDHT."
- (shepherd-service
- (documentation "Run an OpenDHT node.")
- (provision '(opendht dhtnode dhtproxy))
- (requirement '(networking syslogd))
- (start #~(make-forkexec-constructor
- (list #$@(opendht-configuration->command-line-arguments config))
- #:user "opendht"
- #:group "opendht"))
- (stop #~(make-kill-destructor))))
- (define opendht-service-type
- (service-type
- (name 'opendht)
- (default-value (opendht-configuration))
- (extensions
- (list (service-extension shepherd-root-service-type
- (compose list opendht-shepherd-service))
- (service-extension account-service-type
- (const %opendht-accounts))))
- (description "Run the OpenDHT @command{dhtnode} command that allows
- participating in the distributed hash table based OpenDHT network. The
- service can be configured to act as a proxy to the distributed network, which
- can be useful for portable devices where minimizing energy consumption is
- paramount. OpenDHT was originally based on Kademlia and adapted for
- applications in communication. It is used by Jami, for example.")))
- ;;;
- ;;; Tor.
- ;;;
- (define-record-type* <tor-configuration>
- tor-configuration make-tor-configuration
- tor-configuration?
- (tor tor-configuration-tor
- (default tor))
- (config-file tor-configuration-config-file
- (default (plain-file "empty" "")))
- (hidden-services tor-configuration-hidden-services
- (default '()))
- (socks-socket-type tor-configuration-socks-socket-type ; 'tcp or 'unix
- (default 'tcp))
- (control-socket? tor-configuration-control-socket-path
- (default #f)))
- (define %tor-accounts
- ;; User account and groups for Tor.
- (list (user-group (name "tor") (system? #t))
- (user-account
- (name "tor")
- (group "tor")
- (system? #t)
- (comment "Tor daemon user")
- (home-directory "/var/empty")
- (shell (file-append shadow "/sbin/nologin")))))
- (define-configuration/no-serialization tor-onion-service-configuration
- (name
- string
- "Name for this Onion Service. This creates a
- @file{/var/lib/tor/hidden-services/@var{name}} directory, where the
- @file{hostname} file contains the @indicateurl{.onion} host name for this
- Onion Service.")
- (mapping
- alist
- "Association list of port to address mappings. The following example:
- @lisp
- '((22 . \"127.0.0.1:22\")
- (80 . \"127.0.0.1:8080\"))
- @end lisp
- maps ports 22 and 80 of the Onion Service to the local ports 22 and 8080."))
- (define (tor-configuration->torrc config)
- "Return a 'torrc' file for CONFIG."
- (match-record config <tor-configuration>
- (tor config-file hidden-services socks-socket-type control-socket?)
- (computed-file
- "torrc"
- (with-imported-modules '((guix build utils))
- #~(begin
- (use-modules (guix build utils)
- (ice-9 match))
- (call-with-output-file #$output
- (lambda (port)
- (display "\
- ### These lines were generated from your system configuration:
- DataDirectory /var/lib/tor
- Log notice syslog\n" port)
- (when (eq? 'unix '#$socks-socket-type)
- (display "\
- SocksPort unix:/var/run/tor/socks-sock
- UnixSocksGroupWritable 1\n" port))
- (when #$control-socket?
- (display "\
- ControlSocket unix:/var/run/tor/control-sock GroupWritable RelaxDirModeCheck
- ControlSocketsGroupWritable 1\n"
- port))
- (for-each (match-lambda
- ((service (ports hosts) ...)
- (format port "\
- HiddenServiceDir /var/lib/tor/hidden-services/~a~%"
- service)
- (for-each (lambda (tcp-port host)
- (format port "\
- HiddenServicePort ~a ~a~%"
- tcp-port host))
- ports hosts)))
- '#$(map (match-lambda
- (($ <tor-onion-service-configuration> name mapping)
- (cons name mapping)))
- hidden-services))
- (display "\
- ### End of automatically generated lines.\n\n" port)
- ;; Append the user's config file.
- (call-with-input-file #$config-file
- (lambda (input)
- (dump-port input port)))
- #t)))))))
- (define (tor-shepherd-service config)
- "Return a <shepherd-service> running Tor."
- (let* ((torrc (tor-configuration->torrc config))
- (tor (least-authority-wrapper
- (file-append (tor-configuration-tor config) "/bin/tor")
- #:name "tor"
- #:mappings (list (file-system-mapping
- (source "/var/lib/tor")
- (target source)
- (writable? #t))
- (file-system-mapping
- (source "/dev/log") ;for syslog
- (target source))
- (file-system-mapping
- (source "/var/run/tor")
- (target source)
- (writable? #t))
- (file-system-mapping
- (source torrc)
- (target source)))
- #:namespaces (delq 'net %namespaces))))
- (list (shepherd-service
- (provision '(tor))
- ;; Tor needs at least one network interface to be up, hence the
- ;; dependency on 'loopback'.
- (requirement '(user-processes loopback syslogd))
- ;; XXX: #:pid-file won't work because the wrapped 'tor'
- ;; program would print its PID within the user namespace
- ;; instead of its actual PID outside. There's no inetd or
- ;; systemd socket activation support either (there's
- ;; 'sd_notify' though), so we're stuck with that.
- (start #~(make-forkexec-constructor
- (list #$tor "-f" #$torrc)
- #:user "tor" #:group "tor"))
- (stop #~(make-kill-destructor))
- (actions (list (shepherd-configuration-action torrc)))
- (documentation "Run the Tor anonymous network overlay.")))))
- (define (tor-activation config)
- "Set up directories for Tor and its hidden services, if any."
- #~(begin
- (use-modules (guix build utils))
- (define %user
- (getpw "tor"))
- (define (initialize service)
- (let ((directory (string-append "/var/lib/tor/hidden-services/"
- service)))
- (mkdir-p directory)
- (chown directory (passwd:uid %user) (passwd:gid %user))
- ;; The daemon bails out if we give wider permissions.
- (chmod directory #o700)))
- ;; Allow Tor to write its PID file.
- (mkdir-p "/var/run/tor")
- (chown "/var/run/tor" (passwd:uid %user) (passwd:gid %user))
- ;; Set the group permissions to rw so that if the system administrator
- ;; has specified UnixSocksGroupWritable=1 in their torrc file, members
- ;; of the "tor" group will be able to use the SOCKS socket.
- (chmod "/var/run/tor" #o750)
- ;; Allow Tor to access the hidden services' directories.
- (mkdir-p "/var/lib/tor")
- (chown "/var/lib/tor" (passwd:uid %user) (passwd:gid %user))
- (chmod "/var/lib/tor" #o700)
- ;; Make sure /var/lib is accessible to the 'tor' user.
- (chmod "/var/lib" #o755)
- (for-each initialize
- '#$(map tor-onion-service-configuration-name
- (tor-configuration-hidden-services config)))))
- (define tor-service-type
- (service-type (name 'tor)
- (extensions
- (list (service-extension shepherd-root-service-type
- tor-shepherd-service)
- (service-extension account-service-type
- (const %tor-accounts))
- (service-extension activation-service-type
- tor-activation)))
- ;; This can be extended with Tor Onion Services.
- (compose concatenate)
- (extend (lambda (config services)
- (tor-configuration
- (inherit config)
- (hidden-services
- (append (tor-configuration-hidden-services config)
- services)))))
- (default-value (tor-configuration))
- (description
- "Run the @uref{https://torproject.org, Tor} anonymous
- networking daemon.")))
- (define-deprecated (tor-hidden-service name mapping)
- #f
- "Define a new Tor @dfn{hidden service} called @var{name} and implementing
- @var{mapping}. @var{mapping} is a list of port/host tuples, such as:
- @example
- '((22 . \"127.0.0.1:22\")
- (80 . \"127.0.0.1:8080\"))
- @end example
- In this example, port 22 of the hidden service is mapped to local port 22, and
- port 80 is mapped to local port 8080.
- This creates a @file{/var/lib/tor/hidden-services/@var{name}} directory, where
- the @file{hostname} file contains the @code{.onion} host name for the hidden
- service.
- See @uref{https://www.torproject.org/docs/tor-hidden-service.html.en, the Tor
- project's documentation} for more information."
- (simple-service 'tor-hidden-service
- tor-service-type
- (list (tor-onion-service-configuration
- (name name)
- (mapping mapping)))))
- ;;;
- ;;; ModemManager
- ;;;
- (define-record-type* <modem-manager-configuration>
- modem-manager-configuration make-modem-manager-configuration
- modem-manager-configuration?
- (modem-manager modem-manager-configuration-modem-manager
- (default modem-manager)))
- ;;;
- ;;; NetworkManager
- ;;;
- ;; TODO: deprecated field, remove later.
- (define-with-syntax-properties (warn-iwd?-field-deprecation
- (value properties))
- (when value
- (warning (source-properties->location properties)
- (G_ "the 'iwd?' field is deprecated, please use \
- 'shepherd-requirement' field instead~%")))
- value)
- (define-record-type* <network-manager-configuration>
- network-manager-configuration make-network-manager-configuration
- network-manager-configuration?
- (network-manager network-manager-configuration-network-manager
- (default network-manager))
- (shepherd-requirement network-manager-configuration-shepherd-requirement
- (default '(wpa-supplicant)))
- (dns network-manager-configuration-dns
- (default "default"))
- (vpn-plugins network-manager-configuration-vpn-plugins ;list of file-like
- (default '()))
- (iwd? network-manager-configuration-iwd? ; TODO: deprecated field, remove.
- (default #f)
- (sanitize warn-iwd?-field-deprecation)))
- (define (network-manager-activation config)
- ;; Activation gexp for NetworkManager
- (match-record config <network-manager-configuration>
- (network-manager dns vpn-plugins)
- #~(begin
- (use-modules (guix build utils))
- (mkdir-p "/etc/NetworkManager/system-connections")
- #$@(if (equal? dns "dnsmasq")
- ;; create directory to store dnsmasq lease file
- '((mkdir-p "/var/lib/misc"))
- '()))))
- (define (vpn-plugin-directory plugins)
- "Return a directory containing PLUGINS, the NM VPN plugins."
- (directory-union "network-manager-vpn-plugins" plugins))
- (define (network-manager-accounts config)
- "Return the list of <user-account> and <user-group> for CONFIG."
- (define nologin
- (file-append shadow "/sbin/nologin"))
- (define accounts
- (append-map (lambda (package)
- (map (lambda (name)
- (user-account (system? #t)
- (name name)
- (group "network-manager")
- (comment "NetworkManager helper")
- (home-directory "/var/empty")
- (create-home-directory? #f)
- (shell nologin)))
- (or (assoc-ref (package-properties package)
- 'user-accounts)
- '())))
- (network-manager-configuration-vpn-plugins config)))
- (match accounts
- (()
- '())
- (_
- (cons (user-group (name "network-manager") (system? #t))
- accounts))))
- (define (network-manager-environment config)
- (match-record config <network-manager-configuration>
- (network-manager dns vpn-plugins)
- ;; Define this variable in the global environment such that
- ;; "nmcli connection import type openvpn file foo.ovpn" works.
- `(("NM_VPN_PLUGIN_DIR"
- . ,(file-append (vpn-plugin-directory vpn-plugins)
- "/lib/NetworkManager/VPN")))))
- (define (network-manager-shepherd-service config)
- (match-record config <network-manager-configuration>
- (network-manager shepherd-requirement dns vpn-plugins iwd?)
- (let* ((iwd? (or iwd? ; TODO: deprecated field, remove later.
- (and shepherd-requirement
- (memq 'iwd shepherd-requirement))))
- (conf (plain-file "NetworkManager.conf"
- (string-append
- "[main]\ndns=" dns "\n"
- (if iwd? "[device]\nwifi.backend=iwd\n" ""))))
- (vpn (vpn-plugin-directory vpn-plugins)))
- (list (shepherd-service
- (documentation "Run the NetworkManager.")
- (provision '(NetworkManager networking))
- (requirement `(user-processes dbus-system loopback
- ,@shepherd-requirement
- ;; TODO: iwd? is deprecated and should be passed
- ;; with shepherd-requirement, remove later.
- ,@(if iwd? '(iwd) '())))
- (actions (list (shepherd-configuration-action conf)))
- (start
- #~(lambda _
- (let ((pid
- (fork+exec-command
- (list #$(file-append network-manager
- "/sbin/NetworkManager")
- (string-append "--config=" #$conf)
- "--no-daemon")
- #:environment-variables
- (list (string-append "NM_VPN_PLUGIN_DIR=" #$vpn
- "/lib/NetworkManager/VPN")
- ;; Override non-existent default users
- "NM_OPENVPN_USER="
- "NM_OPENVPN_GROUP="
- ;; Allow NetworkManager to find the modules.
- (string-append
- "LINUX_MODULE_DIRECTORY="
- "/run/booted-system/kernel/lib/modules")))))
- ;; XXX: Despite the "online" name, this doesn't guarantee
- ;; WAN connectivity, it merely waits for NetworkManager
- ;; to finish starting-up. This is required otherwise
- ;; services will fail since the network interfaces be
- ;; absent until NetworkManager finishes setting them up.
- (system* #$(file-append network-manager "/bin/nm-online")
- "--wait-for-startup" "--quiet")
- ;; XXX: Finally, return the pid from running
- ;; fork+exec-command to shepherd.
- pid)))
- (stop #~(make-kill-destructor)))))))
- (define network-manager-service-type
- (let ((config->packages
- (lambda (config)
- (match-record config <network-manager-configuration>
- (network-manager vpn-plugins)
- `(,network-manager ,@vpn-plugins)))))
- (service-type
- (name 'network-manager)
- (extensions
- (list (service-extension shepherd-root-service-type
- network-manager-shepherd-service)
- (service-extension dbus-root-service-type config->packages)
- (service-extension polkit-service-type
- (compose
- list
- network-manager-configuration-network-manager))
- (service-extension account-service-type
- network-manager-accounts)
- (service-extension activation-service-type
- network-manager-activation)
- (service-extension session-environment-service-type
- network-manager-environment)
- ;; Add network-manager to the system profile.
- (service-extension profile-service-type config->packages)))
- (default-value (network-manager-configuration))
- (description
- "Run @uref{https://wiki.gnome.org/Projects/NetworkManager,
- NetworkManager}, a network management daemon that aims to simplify wired and
- wireless networking."))))
- ;;;
- ;;; Connman
- ;;;
- (define-record-type* <connman-configuration>
- connman-configuration make-connman-configuration
- connman-configuration?
- (connman connman-configuration-connman
- (default connman))
- (shepherd-requirement connman-configuration-shepherd-requirement
- (default '()))
- (disable-vpn? connman-configuration-disable-vpn?
- (default #f))
- (iwd? connman-configuration-iwd?
- (default #f)
- (sanitize warn-iwd?-field-deprecation)))
- (define (connman-activation config)
- (let ((disable-vpn? (connman-configuration-disable-vpn? config)))
- (with-imported-modules '((guix build utils))
- #~(begin
- (use-modules (guix build utils))
- (mkdir-p "/var/lib/connman/")
- (unless #$disable-vpn?
- (mkdir-p "/var/lib/connman-vpn/"))))))
- (define (connman-shepherd-service config)
- (match-record config <connman-configuration> (connman shepherd-requirement
- disable-vpn? iwd?)
- (let ((iwd? (or iwd? ; TODO: deprecated field, remove later.
- (and shepherd-requirement
- (memq 'iwd shepherd-requirement)))))
- (list (shepherd-service
- (documentation "Run Connman")
- (provision '(connman networking))
- (requirement `(user-processes dbus-system loopback
- ,@shepherd-requirement
- ;; TODO: iwd? is deprecated and should be passed
- ;; with shepherd-requirement, remove later.
- ,@(if iwd? '(iwd) '())))
- (start #~(make-forkexec-constructor
- (list (string-append #$connman
- "/sbin/connmand")
- "--nodaemon"
- "--nodnsproxy"
- #$@(if disable-vpn? '("--noplugin=vpn") '())
- #$@(if iwd? '("--wifi=iwd_agent") '()))
- ;; As connman(8) notes, when passing '-n', connman
- ;; "directs log output to the controlling terminal in
- ;; addition to syslog." Redirect stdout and stderr
- ;; to avoid spamming the console (XXX: for some reason
- ;; redirecting to /dev/null doesn't work.)
- #:log-file "/var/log/connman.log"))
- (stop #~(make-kill-destructor)))))))
- (define %connman-log-rotation
- (list (log-rotation
- (files '("/var/log/connman.log")))))
- (define connman-service-type
- (let ((connman-package (compose list connman-configuration-connman)))
- (service-type (name 'connman)
- (extensions
- (list (service-extension shepherd-root-service-type
- connman-shepherd-service)
- (service-extension polkit-service-type
- connman-package)
- (service-extension dbus-root-service-type
- connman-package)
- (service-extension activation-service-type
- connman-activation)
- ;; Add connman to the system profile.
- (service-extension profile-service-type
- connman-package)
- (service-extension rottlog-service-type
- (const %connman-log-rotation))))
- (default-value (connman-configuration))
- (description
- "Run @url{https://01.org/connman,Connman},
- a network connection manager."))))
- ;;;
- ;;; Modem manager
- ;;;
- (define modem-manager-service-type
- (let ((config->package
- (lambda (config)
- (list (modem-manager-configuration-modem-manager config)))))
- (service-type (name 'modem-manager)
- (extensions
- (list (service-extension dbus-root-service-type
- config->package)
- (service-extension udev-service-type
- config->package)
- (service-extension polkit-service-type
- config->package)))
- (default-value (modem-manager-configuration))
- (description
- "Run @uref{https://wiki.gnome.org/Projects/ModemManager,
- ModemManager}, a modem management daemon that aims to simplify dialup
- networking."))))
- ;;;
- ;;; USB_ModeSwitch
- ;;;
- (define-record-type* <usb-modeswitch-configuration>
- usb-modeswitch-configuration make-usb-modeswitch-configuration
- usb-modeswitch-configuration?
- (usb-modeswitch usb-modeswitch-configuration-usb-modeswitch
- (default usb-modeswitch))
- (usb-modeswitch-data usb-modeswitch-configuration-usb-modeswitch-data
- (default usb-modeswitch-data))
- (config-file usb-modeswitch-configuration-config-file
- (default #~(string-append #$usb-modeswitch:dispatcher
- "/etc/usb_modeswitch.conf"))))
- (define (usb-modeswitch-sh usb-modeswitch config-file)
- "Build a copy of usb_modeswitch.sh located in package USB-MODESWITCH,
- modified to pass the CONFIG-FILE in its calls to usb_modeswitch_dispatcher,
- and wrap it to actually find the dispatcher in USB-MODESWITCH. The script
- will be run by USB_ModeSwitch’s udev rules file when a modeswitchable USB
- device is detected."
- (computed-file
- "usb_modeswitch-sh"
- (with-imported-modules '((guix build utils))
- #~(begin
- (use-modules (guix build utils))
- (let ((cfg-param
- #$(if config-file
- #~(string-append " --config-file=" #$config-file)
- "")))
- (mkdir #$output)
- (install-file (string-append #$usb-modeswitch:dispatcher
- "/lib/udev/usb_modeswitch")
- #$output)
- ;; insert CFG-PARAM into usb_modeswitch_dispatcher command-lines
- (substitute* (string-append #$output "/usb_modeswitch")
- (("(exec usb_modeswitch_dispatcher .*)( 2>>)" _ left right)
- (string-append left cfg-param right))
- (("(exec usb_modeswitch_dispatcher .*)( &)" _ left right)
- (string-append left cfg-param right)))
- ;; wrap-program needs bash in PATH:
- (putenv (string-append "PATH=" #$bash "/bin"))
- (wrap-program (string-append #$output "/usb_modeswitch")
- `("PATH" ":" = (,(string-append #$coreutils "/bin")
- ,(string-append
- #$usb-modeswitch:dispatcher
- "/bin")))))))))
- (define (usb-modeswitch-configuration->udev-rules config)
- "Build a rules file for extending udev-service-type from the rules in the
- usb-modeswitch package specified in CONFIG. The rules file will invoke
- usb_modeswitch.sh from the usb-modeswitch package, modified to pass the right
- config file."
- (match-record config <usb-modeswitch-configuration>
- (usb-modeswitch usb-modeswitch-data config-file)
- (computed-file
- "usb_modeswitch.rules"
- (with-imported-modules '((guix build utils))
- #~(begin
- (use-modules (guix build utils))
- (let ((in (string-append #$usb-modeswitch-data
- "/udev/40-usb_modeswitch.rules"))
- (out (string-append #$output "/lib/udev/rules.d"))
- (script #$(usb-modeswitch-sh usb-modeswitch config-file)))
- (mkdir-p out)
- (chdir out)
- (install-file in out)
- (substitute* "40-usb_modeswitch.rules"
- (("PROGRAM=\"usb_modeswitch")
- (string-append "PROGRAM=\"" script "/usb_modeswitch"))
- (("RUN\\+=\"usb_modeswitch")
- (string-append "RUN+=\"" script "/usb_modeswitch")))))))))
- (define usb-modeswitch-service-type
- (service-type
- (name 'usb-modeswitch)
- (extensions
- (list
- (service-extension
- udev-service-type
- (lambda (config)
- (let ((rules (usb-modeswitch-configuration->udev-rules config)))
- (list rules))))))
- (default-value (usb-modeswitch-configuration))
- (description "Run @uref{http://www.draisberghof.de/usb_modeswitch/,
- USB_ModeSwitch}, a mode switching tool for controlling USB devices with
- multiple @dfn{modes}. When plugged in for the first time many USB
- devices (primarily high-speed WAN modems) act like a flash storage containing
- installers for Windows drivers. USB_ModeSwitch replays the sequence the
- Windows drivers would send to switch their mode from storage to modem (or
- whatever the thing is supposed to do).")))
- ;;;
- ;;; WPA supplicant
- ;;;
- (define-record-type* <wpa-supplicant-configuration>
- wpa-supplicant-configuration make-wpa-supplicant-configuration
- wpa-supplicant-configuration?
- (wpa-supplicant wpa-supplicant-configuration-wpa-supplicant ;file-like
- (default wpa-supplicant))
- (requirement wpa-supplicant-configuration-requirement ;list of symbols
- (default '(user-processes loopback syslogd)))
- (pid-file wpa-supplicant-configuration-pid-file ;string
- (default "/var/run/wpa_supplicant.pid"))
- (dbus? wpa-supplicant-configuration-dbus? ;Boolean
- (default #t))
- (interface wpa-supplicant-configuration-interface ;#f | string
- (default #f))
- (config-file wpa-supplicant-configuration-config-file ;#f | <file-like>
- (default #f))
- (extra-options wpa-supplicant-configuration-extra-options ;list of strings
- (default '())))
- (define (wpa-supplicant-shepherd-service config)
- (match-record config <wpa-supplicant-configuration>
- (wpa-supplicant requirement pid-file dbus?
- interface config-file extra-options)
- (list (shepherd-service
- (documentation "Run the WPA supplicant daemon")
- (provision '(wpa-supplicant))
- (requirement (if dbus?
- (cons 'dbus-system requirement)
- requirement))
- (start #~(make-forkexec-constructor
- (list (string-append #$wpa-supplicant
- "/sbin/wpa_supplicant")
- (string-append "-P" #$pid-file)
- "-B" ;run in background
- "-s" ;log to syslogd
- #$@(if dbus?
- #~("-u")
- #~())
- #$@(if interface
- #~((string-append "-i" #$interface))
- #~())
- #$@(if config-file
- #~((string-append "-c" #$config-file))
- #~())
- #$@extra-options)
- #:pid-file #$pid-file))
- (stop #~(make-kill-destructor))))))
- (define wpa-supplicant-service-type
- (let ((config->package
- (lambda (config)
- (list (wpa-supplicant-configuration-wpa-supplicant config)))))
- (service-type (name 'wpa-supplicant)
- (extensions
- (list (service-extension shepherd-root-service-type
- wpa-supplicant-shepherd-service)
- (service-extension dbus-root-service-type config->package)
- (service-extension profile-service-type config->package)))
- (description "Run the WPA Supplicant daemon, a service that
- implements authentication, key negotiation and more for wireless networks.")
- (default-value (wpa-supplicant-configuration)))))
- ;;;
- ;;; Hostapd.
- ;;;
- (define-record-type* <hostapd-configuration>
- hostapd-configuration make-hostapd-configuration
- hostapd-configuration?
- (package hostapd-configuration-package
- (default hostapd))
- (interface hostapd-configuration-interface ;string
- (default "wlan0"))
- (ssid hostapd-configuration-ssid) ;string
- (broadcast-ssid? hostapd-configuration-broadcast-ssid? ;Boolean
- (default #t))
- (channel hostapd-configuration-channel ;integer
- (default 1))
- (driver hostapd-configuration-driver ;string
- (default "nl80211"))
- ;; See <https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf> for a list of
- ;; additional options we could add.
- (extra-settings hostapd-configuration-extra-settings ;string
- (default "")))
- (define (hostapd-configuration-file config)
- "Return the configuration file for CONFIG, a <hostapd-configuration>."
- (match-record config <hostapd-configuration>
- (interface ssid broadcast-ssid? channel driver extra-settings)
- (plain-file "hostapd.conf"
- (string-append "\
- # Generated from your Guix configuration.
- interface=" interface "
- ssid=" ssid "
- ignore_broadcast_ssid=" (if broadcast-ssid? "0" "1") "
- channel=" (number->string channel) "\n"
- extra-settings "\n"))))
- (define* (hostapd-shepherd-services config #:key (requirement '()))
- "Return Shepherd services for hostapd."
- (list (shepherd-service
- (provision '(hostapd))
- (requirement `(user-processes ,@requirement))
- (documentation "Run the hostapd WiFi access point daemon.")
- (start #~(make-forkexec-constructor
- (list #$(file-append (hostapd-configuration-package config)
- "/sbin/hostapd")
- #$(hostapd-configuration-file config))
- #:log-file "/var/log/hostapd.log"))
- (stop #~(make-kill-destructor)))))
- (define %hostapd-log-rotation
- (list (log-rotation
- (files '("/var/log/hostapd.log")))))
- (define hostapd-service-type
- (service-type
- (name 'hostapd)
- (extensions
- (list (service-extension shepherd-root-service-type
- hostapd-shepherd-services)
- (service-extension rottlog-service-type
- (const %hostapd-log-rotation))))
- (description
- "Run the @uref{https://w1.fi/hostapd/, hostapd} daemon for Wi-Fi access
- points and authentication servers.")))
- (define (simulated-wifi-shepherd-services config)
- "Return Shepherd services to run hostapd with CONFIG, a
- <hostapd-configuration>, as well as services to set up WiFi hardware
- simulation."
- (append (hostapd-shepherd-services config
- #:requirement
- '(unblocked-wifi
- kernel-module-loader))
- (list (shepherd-service
- (provision '(unblocked-wifi))
- (requirement '(file-systems kernel-module-loader))
- (documentation
- "Unblock WiFi devices for use by mac80211_hwsim.")
- (start #~(lambda _
- (invoke #$(file-append util-linux "/sbin/rfkill")
- "unblock" "0")
- (invoke #$(file-append util-linux "/sbin/rfkill")
- "unblock" "1")))
- (one-shot? #t)))))
- (define simulated-wifi-service-type
- (service-type
- (name 'simulated-wifi)
- (extensions
- (list (service-extension shepherd-root-service-type
- simulated-wifi-shepherd-services)
- (service-extension kernel-module-loader-service-type
- (const '("mac80211_hwsim")))))
- (default-value (hostapd-configuration
- (interface "wlan1")
- (ssid "Test Network")))
- (description "Run hostapd to simulate WiFi connectivity.")))
- ;;;
- ;;; Open vSwitch
- ;;;
- (define-record-type* <openvswitch-configuration>
- openvswitch-configuration make-openvswitch-configuration
- openvswitch-configuration?
- (package openvswitch-configuration-package
- (default openvswitch)))
- (define (openvswitch-activation config)
- (let ((ovsdb-tool (file-append (openvswitch-configuration-package config)
- "/bin/ovsdb-tool")))
- (with-imported-modules '((guix build utils))
- #~(begin
- (use-modules (guix build utils))
- (mkdir-p "/var/run/openvswitch")
- (mkdir-p "/var/lib/openvswitch")
- (let ((conf.db "/var/lib/openvswitch/conf.db"))
- (unless (file-exists? conf.db)
- (system* #$ovsdb-tool "create" conf.db)))))))
- (define (openvswitch-shepherd-service config)
- (let* ((package (openvswitch-configuration-package config))
- (ovsdb-server (file-append package "/sbin/ovsdb-server"))
- (ovs-vswitchd (file-append package "/sbin/ovs-vswitchd")))
- (list (shepherd-service
- (provision '(ovsdb))
- (requirement '(user-processes))
- (documentation "Run the Open vSwitch database server.")
- (start #~(make-forkexec-constructor
- (list #$ovsdb-server "--pidfile"
- "--remote=punix:/var/run/openvswitch/db.sock")
- #:pid-file "/var/run/openvswitch/ovsdb-server.pid"))
- (stop #~(make-kill-destructor)))
- (shepherd-service
- (provision '(vswitchd))
- (requirement '(ovsdb))
- (documentation "Run the Open vSwitch daemon.")
- (start #~(make-forkexec-constructor
- (list #$ovs-vswitchd "--pidfile")
- #:pid-file "/var/run/openvswitch/ovs-vswitchd.pid"))
- (stop #~(make-kill-destructor))))))
- (define openvswitch-service-type
- (service-type
- (name 'openvswitch)
- (extensions
- (list (service-extension activation-service-type
- openvswitch-activation)
- (service-extension profile-service-type
- (compose list openvswitch-configuration-package))
- (service-extension shepherd-root-service-type
- openvswitch-shepherd-service)))
- (description
- "Run @uref{http://www.openvswitch.org, Open vSwitch}, a multilayer virtual
- switch designed to enable massive network automation through programmatic
- extension.")
- (default-value (openvswitch-configuration))))
- ;;;
- ;;; iptables
- ;;;
- (define %iptables-accept-all-rules
- (plain-file "iptables-accept-all.rules"
- "*filter
- :INPUT ACCEPT
- :FORWARD ACCEPT
- :OUTPUT ACCEPT
- COMMIT
- "))
- (define-record-type* <iptables-configuration>
- iptables-configuration make-iptables-configuration iptables-configuration?
- (iptables iptables-configuration-iptables
- (default iptables))
- (ipv4-rules iptables-configuration-ipv4-rules
- (default %iptables-accept-all-rules))
- (ipv6-rules iptables-configuration-ipv6-rules
- (default %iptables-accept-all-rules)))
- (define (iptables-shepherd-service config)
- (match-record config <iptables-configuration>
- (iptables ipv4-rules ipv6-rules)
- (let ((iptables-restore (file-append iptables "/sbin/iptables-restore"))
- (ip6tables-restore (file-append iptables "/sbin/ip6tables-restore")))
- (shepherd-service
- (documentation "Packet filtering framework")
- (provision '(iptables))
- (start #~(lambda _
- (invoke #$iptables-restore #$ipv4-rules)
- (invoke #$ip6tables-restore #$ipv6-rules)))
- (stop #~(lambda _
- (invoke #$iptables-restore #$%iptables-accept-all-rules)
- (invoke #$ip6tables-restore #$%iptables-accept-all-rules)))))))
- (define iptables-service-type
- (service-type
- (name 'iptables)
- (description
- "Run @command{iptables-restore}, setting up the specified rules.")
- (extensions
- (list (service-extension shepherd-root-service-type
- (compose list iptables-shepherd-service))))))
- ;;;
- ;;; nftables
- ;;;
- (define %default-nftables-ruleset
- (plain-file "nftables.conf"
- "# A simple and safe firewall
- table inet filter {
- chain input {
- type filter hook input priority 0; policy drop;
- # early drop of invalid connections
- ct state invalid drop
- # allow established/related connections
- ct state { established, related } accept
- # allow from loopback
- iifname lo accept
- # allow icmp
- ip protocol icmp accept
- ip6 nexthdr icmpv6 accept
- # allow ssh
- tcp dport ssh accept
- # reject everything else
- reject with icmpx type port-unreachable
- }
- chain forward {
- type filter hook forward priority 0; policy drop;
- }
- chain output {
- type filter hook output priority 0; policy accept;
- }
- }
- "))
- (define-record-type* <nftables-configuration>
- nftables-configuration
- make-nftables-configuration
- nftables-configuration?
- (package nftables-configuration-package
- (default nftables))
- (ruleset nftables-configuration-ruleset ; file-like object
- (default %default-nftables-ruleset)))
- (define (nftables-shepherd-service config)
- (match-record config <nftables-configuration>
- (package ruleset)
- (let ((nft (file-append package "/sbin/nft")))
- (shepherd-service
- (documentation "Packet filtering and classification")
- (provision '(nftables))
- (start #~(lambda _
- (invoke #$nft "--file" #$ruleset)))
- (stop #~(lambda _
- (invoke #$nft "flush" "ruleset")))))))
- (define nftables-service-type
- (service-type
- (name 'nftables)
- (description
- "Run @command{nft}, setting up the specified ruleset.")
- (extensions
- (list (service-extension shepherd-root-service-type
- (compose list nftables-shepherd-service))
- (service-extension profile-service-type
- (compose list nftables-configuration-package))))
- (default-value (nftables-configuration))))
- ;;;
- ;;; PageKite
- ;;;
- (define-record-type* <pagekite-configuration>
- pagekite-configuration
- make-pagekite-configuration
- pagekite-configuration?
- (package pagekite-configuration-package
- (default pagekite))
- (kitename pagekite-configuration-kitename
- (default #f))
- (kitesecret pagekite-configuration-kitesecret
- (default #f))
- (frontend pagekite-configuration-frontend
- (default #f))
- (kites pagekite-configuration-kites
- (default '("http:@kitename:localhost:80:@kitesecret")))
- (extra-file pagekite-configuration-extra-file
- (default #f)))
- (define (pagekite-configuration-file config)
- (match-record config <pagekite-configuration>
- (package kitename kitesecret frontend kites extra-file)
- (mixed-text-file "pagekite.rc"
- (if extra-file
- (string-append "optfile = " extra-file "\n")
- "")
- (if kitename
- (string-append "kitename = " kitename "\n")
- "")
- (if kitesecret
- (string-append "kitesecret = " kitesecret "\n")
- "")
- (if frontend
- (string-append "frontend = " frontend "\n")
- "defaults\n")
- (string-join (map (lambda (kite)
- (string-append "service_on = " kite))
- kites)
- "\n"
- 'suffix))))
- (define (pagekite-shepherd-service config)
- (match-record config <pagekite-configuration>
- (package kitename kitesecret frontend kites extra-file)
- (with-imported-modules (source-module-closure
- '((gnu build shepherd)
- (gnu system file-systems)))
- (shepherd-service
- (documentation "Run the PageKite service.")
- (provision '(pagekite))
- (requirement '(networking))
- (modules '((gnu build shepherd)
- (gnu system file-systems)))
- (start #~(make-forkexec-constructor/container
- (list #$(file-append package "/bin/pagekite")
- "--clean"
- "--nullui"
- "--nocrashreport"
- "--runas=pagekite:pagekite"
- (string-append "--optfile="
- #$(pagekite-configuration-file config)))
- #:log-file "/var/log/pagekite.log"
- #:mappings #$(if extra-file
- #~(list (file-system-mapping
- (source #$extra-file)
- (target source)))
- #~'())))
- ;; SIGTERM doesn't always work for some reason.
- (stop #~(make-kill-destructor SIGINT))))))
- (define %pagekite-log-rotation
- (list (log-rotation
- (files '("/var/log/pagekite.log")))))
- (define %pagekite-accounts
- (list (user-group (name "pagekite") (system? #t))
- (user-account
- (name "pagekite")
- (group "pagekite")
- (system? #t)
- (comment "PageKite user")
- (home-directory "/var/empty")
- (shell (file-append shadow "/sbin/nologin")))))
- (define pagekite-service-type
- (service-type
- (name 'pagekite)
- (default-value (pagekite-configuration))
- (extensions
- (list (service-extension shepherd-root-service-type
- (compose list pagekite-shepherd-service))
- (service-extension account-service-type
- (const %pagekite-accounts))
- (service-extension rottlog-service-type
- (const %pagekite-log-rotation))))
- (description
- "Run @url{https://pagekite.net/,PageKite}, a tunneling solution to make
- local servers publicly accessible on the web, even behind NATs and firewalls.")))
- ;;;
- ;;; Yggdrasil
- ;;;
- (define-record-type* <yggdrasil-configuration>
- yggdrasil-configuration
- make-yggdrasil-configuration
- yggdrasil-configuration?
- (package yggdrasil-configuration-package
- (default yggdrasil))
- (json-config yggdrasil-configuration-json-config
- (default '()))
- (config-file yggdrasil-config-file
- (default "/etc/yggdrasil-private.conf"))
- (autoconf? yggdrasil-configuration-autoconf?
- (default #f))
- (log-level yggdrasil-configuration-log-level
- (default 'info))
- (log-to yggdrasil-configuration-log-to
- (default 'stdout)))
- (define (yggdrasil-configuration-file config)
- (define (scm->yggdrasil-json x)
- (define key-value?
- dotted-list?)
- (define (param->camel str)
- (string-concatenate
- (map
- string-capitalize
- (string-split str (cut eqv? <> #\-)))))
- (cond
- ((key-value? x)
- (let ((k (car x))
- (v (cdr x)))
- (cons
- (if (symbol? k)
- (param->camel (symbol->string k))
- k)
- v)))
- ((list? x) (map scm->yggdrasil-json x))
- ((vector? x) (vector-map scm->yggdrasil-json x))
- (else x)))
- (computed-file
- "yggdrasil.conf"
- #~(call-with-output-file #$output
- (lambda (port)
- ;; it's HJSON, so comments are a-okay
- (display "# Generated by yggdrasil-service\n" port)
- (display #$(scm->json-string
- (scm->yggdrasil-json
- (yggdrasil-configuration-json-config config)))
- port)))))
- (define (yggdrasil-shepherd-service config)
- "Return a <shepherd-service> for yggdrasil with CONFIG."
- (define yggdrasil-command
- #~(append
- (list (string-append
- #$(yggdrasil-configuration-package config)
- "/bin/yggdrasil")
- "-useconffile"
- #$(yggdrasil-configuration-file config))
- (if #$(yggdrasil-configuration-autoconf? config)
- '("-autoconf")
- '())
- (let ((extraconf #$(yggdrasil-config-file config)))
- (if extraconf
- (list "-extraconffile" extraconf)
- '()))
- (list "-loglevel"
- #$(symbol->string
- (yggdrasil-configuration-log-level config))
- "-logto"
- #$(symbol->string
- (yggdrasil-configuration-log-to config)))))
- (list (shepherd-service
- (documentation "Connect to the Yggdrasil mesh network")
- (provision '(yggdrasil))
- (requirement '(networking))
- (start #~(make-forkexec-constructor
- #$yggdrasil-command
- #:log-file "/var/log/yggdrasil.log"
- #:group "yggdrasil"))
- (stop #~(make-kill-destructor)))))
- (define %yggdrasil-log-rotation
- (list (log-rotation
- (files '("/var/log/yggdrasil.log")))))
- (define %yggdrasil-accounts
- (list (user-group (name "yggdrasil") (system? #t))))
- (define yggdrasil-service-type
- (service-type
- (name 'yggdrasil)
- (description
- "Connect to the Yggdrasil mesh network.
- See @command{yggdrasil -genconf} for config options.")
- (extensions
- (list (service-extension shepherd-root-service-type
- yggdrasil-shepherd-service)
- (service-extension account-service-type
- (const %yggdrasil-accounts))
- (service-extension profile-service-type
- (compose list yggdrasil-configuration-package))
- (service-extension rottlog-service-type
- (const %yggdrasil-log-rotation))))))
- ;;;
- ;;; IPFS
- ;;;
- (define-record-type* <ipfs-configuration>
- ipfs-configuration
- make-ipfs-configuration
- ipfs-configuration?
- (package ipfs-configuration-package
- (default go-ipfs))
- (gateway ipfs-configuration-gateway
- (default "/ip4/127.0.0.1/tcp/8082"))
- (api ipfs-configuration-api
- (default "/ip4/127.0.0.1/tcp/5001")))
- (define %ipfs-home "/var/lib/ipfs")
- (define %ipfs-accounts
- (list (user-account
- (name "ipfs")
- (group "ipfs")
- (system? #t)
- (comment "IPFS daemon user")
- (home-directory "/var/lib/ipfs")
- (shell (file-append shadow "/sbin/nologin")))
- (user-group
- (name "ipfs")
- (system? #t))))
- (define (ipfs-binary config)
- (define command
- (file-append (ipfs-configuration-package config) "/bin/ipfs"))
- (least-authority-wrapper
- command
- #:name "ipfs"
- #:mappings (list %ipfs-home-mapping)
- #:namespaces (delq 'net %namespaces)))
- (define %ipfs-home-mapping
- (file-system-mapping
- (source %ipfs-home)
- (target %ipfs-home)
- (writable? #t)))
- (define %ipfs-environment
- #~(list #$(string-append "HOME=" %ipfs-home)))
- (define (ipfs-shepherd-service config)
- "Return a <shepherd-service> for IPFS with CONFIG."
- (define ipfs-daemon-command
- #~(list #$(ipfs-binary config) "daemon"))
- (list (shepherd-service
- (provision '(ipfs))
- ;; While IPFS is most useful when the machine is connected
- ;; to the network, only loopback is required for starting
- ;; the service.
- (requirement '(loopback))
- (documentation "Connect to the IPFS network")
- (start #~(make-forkexec-constructor
- #$ipfs-daemon-command
- #:log-file "/var/log/ipfs.log"
- #:user "ipfs" #:group "ipfs"
- #:environment-variables #$%ipfs-environment))
- (stop #~(make-kill-destructor)))))
- (define %ipfs-log-rotation
- (list (log-rotation
- (files '("/var/log/ipfs.log")))))
- (define (%ipfs-activation config)
- "Return an activation gexp for IPFS with CONFIG"
- (define (exec-command . args)
- ;; Exec the given ifps command with the right authority.
- #~(let ((pid (primitive-fork)))
- (if (zero? pid)
- (dynamic-wind
- (const #t)
- (lambda ()
- ;; Run ipfs init and ipfs config from a container,
- ;; in case the IPFS daemon was compromised at some point
- ;; and ~/.ipfs is now a symlink to somewhere outside
- ;; %ipfs-home.
- (let ((pw (getpwnam "ipfs")))
- (setgroups '#())
- (setgid (passwd:gid pw))
- (setuid (passwd:uid pw))
- (environ #$%ipfs-environment)
- (execl #$(ipfs-binary config) #$@args)))
- (lambda ()
- (primitive-exit 127)))
- (waitpid pid))))
- (define settings
- `(("Addresses.API" ,(ipfs-configuration-api config))
- ("Addresses.Gateway" ,(ipfs-configuration-gateway config))))
- (define inner-gexp
- #~(begin
- (umask #o077)
- ;; Create $HOME/.ipfs structure
- #$(exec-command "ipfs" "init")
- ;; Apply settings
- #$@(map (match-lambda
- ((setting value)
- (exec-command "ipfs" "config" setting value)))
- settings)))
- (define inner-script
- (program-file "ipfs-activation-inner" inner-gexp))
- ;; The activation may happen from the initrd, which uses
- ;; a statically-linked guile, while the guix container
- ;; procedures require a working dynamic-link.
- #~(system* #$inner-script))
- (define ipfs-service-type
- (service-type
- (name 'ipfs)
- (extensions
- (list (service-extension account-service-type
- (const %ipfs-accounts))
- (service-extension activation-service-type
- %ipfs-activation)
- (service-extension shepherd-root-service-type
- ipfs-shepherd-service)
- (service-extension rottlog-service-type
- (const %ipfs-log-rotation))))
- (default-value (ipfs-configuration))
- (description
- "Run @command{ipfs daemon}, the reference implementation
- of the IPFS peer-to-peer storage network.")))
- ;;;
- ;;; Keepalived
- ;;;
- (define-record-type* <keepalived-configuration>
- keepalived-configuration make-keepalived-configuration
- keepalived-configuration?
- (keepalived keepalived-configuration-keepalived ;file-like
- (default keepalived))
- (config-file keepalived-configuration-config-file ;file-like
- (default #f)))
- (define (keepalived-shepherd-service config)
- (match-record config <keepalived-configuration>
- (keepalived config-file)
- (list (shepherd-service
- (provision '(keepalived))
- (documentation "Run keepalived.")
- (requirement '(loopback))
- (start #~(make-forkexec-constructor
- (list (string-append #$keepalived "/sbin/keepalived")
- "--dont-fork" "--log-console" "--log-detail"
- "--pid=/var/run/keepalived.pid"
- (string-append "--use-file=" #$config-file))
- #:pid-file "/var/run/keepalived.pid"
- #:log-file "/var/log/keepalived.log"))
- (respawn? #f)
- (stop #~(make-kill-destructor))))))
- (define %keepalived-log-rotation
- (list (log-rotation
- (files '("/var/log/keepalived.log")))))
- (define keepalived-service-type
- (service-type (name 'keepalived)
- (extensions (list (service-extension shepherd-root-service-type
- keepalived-shepherd-service)
- (service-extension rottlog-service-type
- (const %keepalived-log-rotation))))
- (description
- "Run @uref{https://www.keepalived.org/, Keepalived}
- routing software.")))
- ;;; networking.scm ends here
|