blob: ca95464f5d67329292cf369ac2f069c23ccbf53f (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
|
{ config, pkgs, lib, ... }:
let
inherit (lib) mkIf mkOption types filterAttrs hasPrefix
mapAttrsToList concatStringsSep concatMapStringsSep;
inherit (types) listOf submodule path attrsOf;
inherit (builtins) toString toFile isList isBool;
cfg = config.nixsap.apps.strongswan;
explicit = filterAttrs (n: v: n != "_module" && v != null);
ipsecSecrets = toFile "ipsec.secrets" ''
${concatMapStringsSep "\n" (f: "include ${f}") cfg.secrets}
'';
ipsecConf =
let
show = k: v:
if k == "charondebug" then concatStringsSep ","
(mapAttrsToList (t: l: "${t} ${toString l}") (explicit v))
else if isList v then concatStringsSep "," v
else if isBool v then (if v then "yes" else "no")
else toString v;
makeSections = type: sections: concatStringsSep "\n\n" (
mapAttrsToList (sec: attrs:
"${type} ${sec}\n" +
(concatStringsSep "\n" (
mapAttrsToList (k: v: " ${k}=${show k v}") (explicit attrs)
))
) (explicit sections)
);
setupSec = makeSections "config" { inherit (cfg) setup; };
caSec = makeSections "ca" cfg.ca;
connSec = makeSections "conn" cfg.conn;
in toFile "ipsec.conf" ''
${setupSec}
${caSec}
${connSec}
'';
strongswanConf = toFile "strongswan.conf" ''
charon { plugins { stroke { secrets_file = ${ipsecSecrets} } } }
starter { config_file = ${ipsecConf } }
'';
in {
options.nixsap.apps.strongswan = {
secrets = mkOption {
description = ''
A list of paths to IPSec secret files. These files will be included into
the main ipsec.secrets file by the "include" directive
'';
type = listOf path;
default = [];
};
setup = mkOption {
description = ''
A set of options for the ‘config setup’ section of the
ipsec.conf file. Defines general configuration parameters
'';
type = submodule (import ./options/setup.nix);
default = {};
};
ca = mkOption {
description = ''
A set of CAs (certification authorities) and their options for
the ‘ca xxx’ sections of the ipsec.conf file
'';
type = attrsOf (submodule (import ./options/ca.nix));
default = {};
};
conn = mkOption {
description = ''
A set of connections and their options for the ‘conn xxx’
sections of the ipsec.conf file
'';
type = attrsOf (submodule (import ./options/conn.nix));
default = {};
};
};
config = mkIf ({} != explicit cfg.conn) {
nixsap.deployment.keyrings.root = cfg.secrets;
environment.systemPackages = [ pkgs.strongswan ];
systemd.services.strongswan = {
description = "strongSwan IPSec Service";
wantedBy = [ "multi-user.target" ];
path = with pkgs; [ config.system.sbin.modprobe iproute iptables utillinux ];
wants = [ "keys.target" ];
after = [ "network.target" "keys.target" "local-fs.target" ];
environment = {
STRONGSWAN_CONF = strongswanConf;
};
serviceConfig = {
ExecStart = "${pkgs.strongswan}/sbin/ipsec start --nofork";
Restart = "always";
};
};
};
}
|