2023-02-25 23:12:55 +00:00
|
|
|
# This is not part of Liminix per se. This is my "scratchpad"
|
|
|
|
# configuration for the device I'm testing with.
|
|
|
|
#
|
|
|
|
# Parts of it do do things that Liminix eventually needs to do, but
|
|
|
|
# don't look in here for solutions - just for identifying the
|
|
|
|
# problems.
|
|
|
|
|
|
|
|
|
|
|
|
{ config, pkgs, lib, ... } :
|
|
|
|
let
|
|
|
|
secrets = import ./rotuer-secrets.nix;
|
2023-09-24 22:29:30 +00:00
|
|
|
inherit (pkgs.liminix.services) oneshot longrun bundle;
|
2023-09-04 21:05:42 +00:00
|
|
|
inherit (pkgs) serviceFns;
|
2023-07-20 10:28:45 +00:00
|
|
|
svc = config.system.service;
|
2023-07-22 22:37:01 +00:00
|
|
|
wirelessConfig = {
|
|
|
|
country_code = "GB";
|
|
|
|
inherit (secrets) wpa_passphrase;
|
|
|
|
auth_algs = 1; # 1=wpa2, 2=wep, 3=both
|
|
|
|
wpa = 2; # 1=wpa, 2=wpa2, 3=both
|
|
|
|
wpa_key_mgmt = "WPA-PSK";
|
|
|
|
wpa_pairwise = "TKIP CCMP"; # auth for wpa (may not need this?)
|
|
|
|
rsn_pairwise = "CCMP"; # auth for wpa2
|
|
|
|
wmm_enabled = 1;
|
|
|
|
};
|
|
|
|
|
2023-02-25 23:12:55 +00:00
|
|
|
in rec {
|
|
|
|
boot = {
|
|
|
|
tftp = {
|
2023-04-23 22:29:53 +00:00
|
|
|
freeSpaceBytes = 3 * 1024 * 1024;
|
2023-02-25 23:12:55 +00:00
|
|
|
serverip = "10.0.0.1";
|
|
|
|
ipaddr = "10.0.0.8";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
imports = [
|
2023-04-23 11:58:51 +00:00
|
|
|
../modules/wlan.nix
|
2023-08-27 22:45:27 +00:00
|
|
|
../modules/network
|
2023-07-14 20:08:33 +00:00
|
|
|
../modules/ppp
|
2023-07-14 21:53:25 +00:00
|
|
|
../modules/dnsmasq
|
2023-09-24 22:29:30 +00:00
|
|
|
../modules/dhcp6c
|
2023-07-16 15:55:50 +00:00
|
|
|
../modules/firewall
|
2023-07-16 16:50:06 +00:00
|
|
|
../modules/hostapd
|
2023-07-20 10:46:19 +00:00
|
|
|
../modules/bridge
|
2023-07-22 22:22:45 +00:00
|
|
|
../modules/ntp
|
2023-08-10 21:53:21 +00:00
|
|
|
../modules/ssh
|
2024-01-07 16:43:43 +00:00
|
|
|
../modules/outputs/btrfs.nix
|
2024-01-08 18:58:07 +00:00
|
|
|
../modules/outputs/extlinux.nix
|
2023-02-25 23:12:55 +00:00
|
|
|
];
|
2023-05-20 21:34:57 +00:00
|
|
|
hostname = "rotuer";
|
2024-01-07 16:43:43 +00:00
|
|
|
rootfsType = "btrfs";
|
2024-01-08 18:54:49 +00:00
|
|
|
rootOptions = "subvol=@";
|
2024-01-08 18:58:07 +00:00
|
|
|
boot.loader.extlinux.enable = true;
|
2023-02-25 23:12:55 +00:00
|
|
|
|
2023-08-05 11:21:18 +00:00
|
|
|
services.hostap = svc.hostapd.build {
|
2023-10-07 21:23:44 +00:00
|
|
|
interface = config.hardware.networkInterfaces.wlan;
|
2023-02-25 23:12:55 +00:00
|
|
|
params = {
|
|
|
|
ssid = "liminix";
|
|
|
|
hw_mode="g";
|
|
|
|
channel = "2";
|
|
|
|
ieee80211n = 1;
|
2023-07-22 22:37:01 +00:00
|
|
|
} // wirelessConfig;
|
2023-02-25 23:12:55 +00:00
|
|
|
};
|
|
|
|
|
2023-08-05 11:21:18 +00:00
|
|
|
services.hostap5 = svc.hostapd.build {
|
2023-10-07 21:23:44 +00:00
|
|
|
interface = config.hardware.networkInterfaces.wlan5;
|
2023-03-01 22:24:58 +00:00
|
|
|
params = rec {
|
|
|
|
ssid = "liminix_5";
|
|
|
|
hw_mode="a";
|
|
|
|
channel = 36;
|
|
|
|
ht_capab = "[HT40+]";
|
|
|
|
vht_oper_chwidth = 1;
|
|
|
|
vht_oper_centr_freq_seg0_idx = channel + 6;
|
|
|
|
ieee80211ac = 1;
|
2023-07-22 22:37:01 +00:00
|
|
|
} // wirelessConfig;
|
2023-03-01 22:24:58 +00:00
|
|
|
};
|
|
|
|
|
2023-08-27 22:45:27 +00:00
|
|
|
services.int = svc.network.address.build {
|
2023-09-01 16:57:22 +00:00
|
|
|
interface = svc.bridge.primary.build { ifname = "int"; };
|
2023-08-27 22:45:27 +00:00
|
|
|
family = "inet"; address ="10.8.0.1"; prefixLength = 16;
|
|
|
|
};
|
|
|
|
|
|
|
|
services.bridge = svc.bridge.members.build {
|
|
|
|
primary = services.int;
|
|
|
|
members = with config.hardware.networkInterfaces;
|
2023-10-07 21:23:44 +00:00
|
|
|
[ wlan
|
|
|
|
wlan5
|
|
|
|
lan ];
|
2023-08-27 22:45:27 +00:00
|
|
|
};
|
2023-03-01 22:24:58 +00:00
|
|
|
|
2023-08-05 13:16:54 +00:00
|
|
|
services.ntp = svc.ntp.build {
|
2023-07-22 22:22:45 +00:00
|
|
|
pools = { "pool.ntp.org" = ["iburst"]; };
|
|
|
|
makestep = { threshold = 1.0; limit = 3; };
|
|
|
|
};
|
2023-04-23 17:22:39 +00:00
|
|
|
|
2023-08-10 21:53:21 +00:00
|
|
|
services.sshd = svc.ssh.build { };
|
2023-03-04 00:39:54 +00:00
|
|
|
|
2023-05-20 21:48:30 +00:00
|
|
|
users.root = secrets.root;
|
2023-03-04 00:39:54 +00:00
|
|
|
|
2023-02-25 23:12:55 +00:00
|
|
|
services.dns =
|
2023-05-31 22:29:05 +00:00
|
|
|
let interface = services.int;
|
2023-08-04 19:39:29 +00:00
|
|
|
in svc.dnsmasq.build {
|
2023-02-25 23:12:55 +00:00
|
|
|
resolvconf = services.resolvconf;
|
2023-05-31 22:29:05 +00:00
|
|
|
inherit interface;
|
|
|
|
ranges = [
|
|
|
|
"10.8.0.10,10.8.0.240"
|
2023-09-04 22:07:13 +00:00
|
|
|
# ra-stateless: sends router advertisements with the O and A
|
|
|
|
# bits set, and provides a stateless DHCP service. The client
|
|
|
|
# will use a SLAAC address, and use DHCP for other
|
|
|
|
# configuration information.
|
2023-08-27 22:20:58 +00:00
|
|
|
"::,constructor:$(output ${interface} ifname),ra-stateless"
|
2023-05-31 22:29:05 +00:00
|
|
|
];
|
2023-09-04 22:07:13 +00:00
|
|
|
|
|
|
|
# You can add static addresses for the DHCP server here. I'm
|
|
|
|
# not putting my actual MAC addresses in a public git repo ...
|
|
|
|
hosts = { } // lib.optionalAttrs (builtins.pathExists ./static-leases.nix) (import ./static-leases.nix);
|
|
|
|
|
2023-02-25 23:12:55 +00:00
|
|
|
domain = "fake.liminix.org";
|
|
|
|
};
|
|
|
|
|
2023-08-10 21:53:45 +00:00
|
|
|
services.wan = svc.pppoe.build {
|
2023-07-20 11:05:36 +00:00
|
|
|
interface = config.hardware.networkInterfaces.wan;
|
|
|
|
ppp-options = [
|
|
|
|
"debug" "+ipv6" "noauth"
|
|
|
|
"name" secrets.l2tp.name
|
|
|
|
"password" secrets.l2tp.password
|
|
|
|
];
|
|
|
|
};
|
2023-02-25 23:12:55 +00:00
|
|
|
|
|
|
|
services.resolvconf = oneshot rec {
|
|
|
|
dependencies = [ services.wan ];
|
|
|
|
name = "resolvconf";
|
|
|
|
up = ''
|
|
|
|
. ${serviceFns}
|
2023-03-03 23:06:18 +00:00
|
|
|
( in_outputs ${name}
|
2023-02-25 23:12:55 +00:00
|
|
|
echo "nameserver $(output ${services.wan} ns1)" > resolv.conf
|
|
|
|
echo "nameserver $(output ${services.wan} ns2)" >> resolv.conf
|
2023-08-28 19:53:45 +00:00
|
|
|
chmod 0444 resolv.conf
|
2023-02-25 23:12:55 +00:00
|
|
|
)
|
|
|
|
'';
|
|
|
|
};
|
2023-09-04 21:06:15 +00:00
|
|
|
|
2023-08-28 17:23:32 +00:00
|
|
|
filesystem =
|
|
|
|
let inherit (pkgs.pseudofile) dir symlink;
|
|
|
|
in dir {
|
|
|
|
etc = dir {
|
|
|
|
"resolv.conf" = symlink "${services.resolvconf}/.outputs/resolv.conf";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2023-08-31 22:24:23 +00:00
|
|
|
services.defaultroute4 = svc.network.route.build {
|
2023-02-25 23:12:55 +00:00
|
|
|
via = "$(output ${services.wan} address)";
|
|
|
|
target = "default";
|
|
|
|
dependencies = [ services.wan ];
|
|
|
|
};
|
|
|
|
|
2023-08-31 22:24:23 +00:00
|
|
|
services.defaultroute6 = svc.network.route.build {
|
2023-06-30 09:17:33 +00:00
|
|
|
via = "$(output ${services.wan} ipv6-peer-address)";
|
|
|
|
target = "default";
|
2023-08-31 22:24:23 +00:00
|
|
|
interface = services.wan;
|
2023-06-30 09:17:33 +00:00
|
|
|
};
|
|
|
|
|
2023-08-05 11:07:35 +00:00
|
|
|
services.firewall = svc.firewall.build {
|
2023-09-24 22:29:30 +00:00
|
|
|
ruleset = import ./demo-firewall.nix;
|
2023-07-16 16:04:01 +00:00
|
|
|
};
|
2023-06-20 19:20:32 +00:00
|
|
|
|
2023-09-01 16:34:47 +00:00
|
|
|
services.packet_forwarding = svc.network.forward.build { };
|
2023-02-25 23:12:55 +00:00
|
|
|
|
2023-09-24 22:29:30 +00:00
|
|
|
services.dhcp6c =
|
|
|
|
let client = svc.dhcp6c.client.build {
|
|
|
|
interface = services.wan;
|
|
|
|
};
|
|
|
|
in bundle {
|
|
|
|
name = "dhcp6c";
|
|
|
|
contents = [
|
|
|
|
(svc.dhcp6c.prefix.build {
|
|
|
|
inherit client;
|
|
|
|
interface = services.int;
|
|
|
|
})
|
|
|
|
(svc.dhcp6c.address.build {
|
|
|
|
inherit client;
|
|
|
|
interface = services.wan;
|
|
|
|
})
|
|
|
|
];
|
2023-07-08 22:07:07 +00:00
|
|
|
};
|
|
|
|
|
2023-06-20 19:13:59 +00:00
|
|
|
defaultProfile.packages = with pkgs; [
|
|
|
|
min-collect-garbage
|
|
|
|
];
|
2023-12-13 21:54:15 +00:00
|
|
|
|
|
|
|
programs.busybox.applets = [
|
|
|
|
"fdisk" "sfdisk"
|
|
|
|
];
|
2023-02-25 23:12:55 +00:00
|
|
|
}
|