2018-07-20 22:56:59 +02:00
|
|
|
|
{ config, lib, utils, ... }:
|
2014-11-20 11:37:48 +01:00
|
|
|
|
|
|
|
|
|
with utils;
|
2014-12-11 01:28:45 +01:00
|
|
|
|
with lib;
|
2014-11-20 11:37:48 +01:00
|
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
|
|
cfg = config.networking;
|
|
|
|
|
interfaces = attrValues cfg.interfaces;
|
|
|
|
|
|
|
|
|
|
interfaceIps = i:
|
2017-12-03 05:13:14 +01:00
|
|
|
|
i.ipv4.addresses
|
|
|
|
|
++ optionals cfg.enableIPv6 i.ipv6.addresses;
|
2014-11-20 11:37:48 +01:00
|
|
|
|
|
2019-05-11 00:10:08 +02:00
|
|
|
|
dhcpStr = useDHCP: if useDHCP == true || useDHCP == null then "both" else "no";
|
2014-11-20 11:37:48 +01:00
|
|
|
|
|
|
|
|
|
slaves =
|
|
|
|
|
concatLists (map (bond: bond.interfaces) (attrValues cfg.bonds))
|
|
|
|
|
++ concatLists (map (bridge: bridge.interfaces) (attrValues cfg.bridges))
|
|
|
|
|
++ map (sit: sit.dev) (attrValues cfg.sits)
|
|
|
|
|
++ map (vlan: vlan.interface) (attrValues cfg.vlans);
|
|
|
|
|
|
|
|
|
|
in
|
|
|
|
|
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
config = mkIf cfg.useNetworkd {
|
|
|
|
|
|
|
|
|
|
assertions = [ {
|
|
|
|
|
assertion = cfg.defaultGatewayWindowSize == null;
|
|
|
|
|
message = "networking.defaultGatewayWindowSize is not supported by networkd.";
|
2015-09-22 15:49:17 +02:00
|
|
|
|
} {
|
|
|
|
|
assertion = cfg.vswitches == {};
|
|
|
|
|
message = "networking.vswichtes are not supported by networkd.";
|
2017-01-14 02:14:16 +01:00
|
|
|
|
} {
|
|
|
|
|
assertion = cfg.defaultGateway == null || cfg.defaultGateway.interface == null;
|
|
|
|
|
message = "networking.defaultGateway.interface is not supported by networkd.";
|
|
|
|
|
} {
|
|
|
|
|
assertion = cfg.defaultGateway6 == null || cfg.defaultGateway6.interface == null;
|
|
|
|
|
message = "networking.defaultGateway6.interface is not supported by networkd.";
|
2015-02-24 22:09:06 +01:00
|
|
|
|
} ] ++ flip mapAttrsToList cfg.bridges (n: { rstp, ... }: {
|
|
|
|
|
assertion = !rstp;
|
|
|
|
|
message = "networking.bridges.${n}.rstp is not supported by networkd.";
|
|
|
|
|
});
|
2014-11-20 11:37:48 +01:00
|
|
|
|
|
2016-09-13 07:55:17 +02:00
|
|
|
|
networking.dhcpcd.enable = mkDefault false;
|
2014-11-20 11:37:48 +01:00
|
|
|
|
|
|
|
|
|
systemd.services.network-local-commands = {
|
|
|
|
|
after = [ "systemd-networkd.service" ];
|
|
|
|
|
bindsTo = [ "systemd-networkd.service" ];
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
systemd.network =
|
|
|
|
|
let
|
|
|
|
|
domains = cfg.search ++ (optional (cfg.domain != null) cfg.domain);
|
2017-03-25 13:54:57 +01:00
|
|
|
|
genericNetwork = override:
|
|
|
|
|
let gateway = optional (cfg.defaultGateway != null) cfg.defaultGateway.address
|
|
|
|
|
++ optional (cfg.defaultGateway6 != null) cfg.defaultGateway6.address;
|
|
|
|
|
in {
|
|
|
|
|
DHCP = override (dhcpStr cfg.useDHCP);
|
|
|
|
|
} // optionalAttrs (gateway != [ ]) {
|
2019-05-11 00:28:24 +02:00
|
|
|
|
routes = override [
|
|
|
|
|
{
|
|
|
|
|
routeConfig = {
|
|
|
|
|
Gateway = gateway;
|
2019-05-11 13:48:48 +02:00
|
|
|
|
GatewayOnLink = false;
|
2019-05-11 00:28:24 +02:00
|
|
|
|
};
|
|
|
|
|
}
|
|
|
|
|
];
|
2017-03-25 13:54:57 +01:00
|
|
|
|
} // optionalAttrs (domains != [ ]) {
|
|
|
|
|
domains = override domains;
|
|
|
|
|
};
|
2014-11-20 11:37:48 +01:00
|
|
|
|
in mkMerge [ {
|
|
|
|
|
enable = true;
|
2019-09-04 16:20:19 +02:00
|
|
|
|
networks."99-main" = (genericNetwork mkDefault) // {
|
|
|
|
|
# We keep the "broken" behaviour of applying this to all interfaces.
|
|
|
|
|
# In general we want to get rid of this workaround but there hasn't
|
|
|
|
|
# been any work on that.
|
|
|
|
|
# See the following issues for details:
|
|
|
|
|
# - https://github.com/NixOS/nixpkgs/issues/18962
|
|
|
|
|
# - https://github.com/NixOS/nixpkgs/issues/61629
|
|
|
|
|
matchConfig = mkDefault { Name = "*"; };
|
|
|
|
|
};
|
2014-11-20 11:37:48 +01:00
|
|
|
|
}
|
2019-08-05 13:03:38 +02:00
|
|
|
|
(mkMerge (forEach interfaces (i: {
|
2018-01-31 05:51:09 +01:00
|
|
|
|
netdevs = mkIf i.virtual ({
|
|
|
|
|
"40-${i.name}" = {
|
|
|
|
|
netdevConfig = {
|
|
|
|
|
Name = i.name;
|
|
|
|
|
Kind = i.virtualType;
|
|
|
|
|
};
|
|
|
|
|
"${i.virtualType}Config" = optionalAttrs (i.virtualOwner != null) {
|
|
|
|
|
User = i.virtualOwner;
|
2014-11-20 11:37:48 +01:00
|
|
|
|
};
|
2018-01-31 05:51:09 +01:00
|
|
|
|
};
|
|
|
|
|
});
|
2014-11-20 11:37:48 +01:00
|
|
|
|
networks."40-${i.name}" = mkMerge [ (genericNetwork mkDefault) {
|
|
|
|
|
name = mkDefault i.name;
|
|
|
|
|
DHCP = mkForce (dhcpStr
|
2014-11-30 13:46:52 +01:00
|
|
|
|
(if i.useDHCP != null then i.useDHCP else cfg.useDHCP && interfaceIps i == [ ]));
|
2019-08-05 13:03:38 +02:00
|
|
|
|
address = forEach (interfaceIps i)
|
2014-11-20 11:37:48 +01:00
|
|
|
|
(ip: "${ip.address}/${toString ip.prefixLength}");
|
2018-02-01 12:13:17 +01:00
|
|
|
|
networkConfig.IPv6PrivacyExtensions = "kernel";
|
2014-11-20 11:37:48 +01:00
|
|
|
|
} ];
|
|
|
|
|
})))
|
|
|
|
|
(mkMerge (flip mapAttrsToList cfg.bridges (name: bridge: {
|
|
|
|
|
netdevs."40-${name}" = {
|
|
|
|
|
netdevConfig = {
|
|
|
|
|
Name = name;
|
|
|
|
|
Kind = "bridge";
|
|
|
|
|
};
|
|
|
|
|
};
|
2019-08-05 13:03:38 +02:00
|
|
|
|
networks = listToAttrs (forEach bridge.interfaces (bi:
|
2014-11-20 11:37:48 +01:00
|
|
|
|
nameValuePair "40-${bi}" (mkMerge [ (genericNetwork (mkOverride 999)) {
|
|
|
|
|
DHCP = mkOverride 0 (dhcpStr false);
|
|
|
|
|
networkConfig.Bridge = name;
|
|
|
|
|
} ])));
|
|
|
|
|
})))
|
|
|
|
|
(mkMerge (flip mapAttrsToList cfg.bonds (name: bond: {
|
|
|
|
|
netdevs."40-${name}" = {
|
|
|
|
|
netdevConfig = {
|
|
|
|
|
Name = name;
|
|
|
|
|
Kind = "bond";
|
|
|
|
|
};
|
2017-02-03 02:20:47 +01:00
|
|
|
|
bondConfig = let
|
|
|
|
|
# manual mapping as of 2017-02-03
|
|
|
|
|
# man 5 systemd.netdev [BOND]
|
|
|
|
|
# to https://www.kernel.org/doc/Documentation/networking/bonding.txt
|
|
|
|
|
# driver options.
|
|
|
|
|
driverOptionMapping = let
|
|
|
|
|
trans = f: optName: { valTransform = f; optNames = [optName]; };
|
|
|
|
|
simp = trans id;
|
|
|
|
|
ms = trans (v: v + "ms");
|
|
|
|
|
in {
|
|
|
|
|
Mode = simp "mode";
|
2017-02-18 15:51:07 +01:00
|
|
|
|
TransmitHashPolicy = simp "xmit_hash_policy";
|
2017-02-03 02:20:47 +01:00
|
|
|
|
LACPTransmitRate = simp "lacp_rate";
|
|
|
|
|
MIIMonitorSec = ms "miimon";
|
|
|
|
|
UpDelaySec = ms "updelay";
|
|
|
|
|
DownDelaySec = ms "downdelay";
|
|
|
|
|
LearnPacketIntervalSec = simp "lp_interval";
|
|
|
|
|
AdSelect = simp "ad_select";
|
|
|
|
|
FailOverMACPolicy = simp "fail_over_mac";
|
|
|
|
|
ARPValidate = simp "arp_validate";
|
|
|
|
|
# apparently in ms for this value?! Upstream bug?
|
|
|
|
|
ARPIntervalSec = simp "arp_interval";
|
|
|
|
|
ARPIPTargets = simp "arp_ip_target";
|
|
|
|
|
ARPAllTargets = simp "arp_all_targets";
|
|
|
|
|
PrimaryReselectPolicy = simp "primary_reselect";
|
|
|
|
|
ResendIGMP = simp "resend_igmp";
|
|
|
|
|
PacketsPerSlave = simp "packets_per_slave";
|
|
|
|
|
GratuitousARP = { valTransform = id;
|
|
|
|
|
optNames = [ "num_grat_arp" "num_unsol_na" ]; };
|
|
|
|
|
AllSlavesActive = simp "all_slaves_active";
|
|
|
|
|
MinLinks = simp "min_links";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
do = bond.driverOptions;
|
|
|
|
|
assertNoUnknownOption = let
|
|
|
|
|
knownOptions = flatten (mapAttrsToList (_: kOpts: kOpts.optNames)
|
|
|
|
|
driverOptionMapping);
|
|
|
|
|
# options that apparently don’t exist in the networkd config
|
|
|
|
|
unknownOptions = [ "primary" ];
|
|
|
|
|
assertTrace = bool: msg: if bool then true else builtins.trace msg false;
|
|
|
|
|
in assert all (driverOpt: assertTrace
|
|
|
|
|
(elem driverOpt (knownOptions ++ unknownOptions))
|
|
|
|
|
"The bond.driverOption `${driverOpt}` cannot be mapped to the list of known networkd bond options. Please add it to the mapping above the assert or to `unknownOptions` should it not exist in networkd.")
|
|
|
|
|
(mapAttrsToList (k: _: k) do); "";
|
|
|
|
|
# get those driverOptions that have been set
|
|
|
|
|
filterSystemdOptions = filterAttrs (sysDOpt: kOpts:
|
2019-08-13 23:52:01 +02:00
|
|
|
|
any (kOpt: do ? ${kOpt}) kOpts.optNames);
|
2017-02-03 02:20:47 +01:00
|
|
|
|
# build final set of systemd options to bond values
|
|
|
|
|
buildOptionSet = mapAttrs (_: kOpts: with kOpts;
|
|
|
|
|
# we simply take the first set kernel bond option
|
|
|
|
|
# (one option has multiple names, which is silly)
|
2019-08-13 23:52:01 +02:00
|
|
|
|
head (map (optN: valTransform (do.${optN}))
|
2017-02-03 02:20:47 +01:00
|
|
|
|
# only map those that exist
|
2019-08-13 23:52:01 +02:00
|
|
|
|
(filter (o: do ? ${o}) optNames)));
|
2017-02-03 02:20:47 +01:00
|
|
|
|
in seq assertNoUnknownOption
|
|
|
|
|
(buildOptionSet (filterSystemdOptions driverOptionMapping));
|
|
|
|
|
|
2014-11-20 11:37:48 +01:00
|
|
|
|
};
|
2017-02-03 02:20:47 +01:00
|
|
|
|
|
2019-08-05 13:03:38 +02:00
|
|
|
|
networks = listToAttrs (forEach bond.interfaces (bi:
|
2014-11-20 11:37:48 +01:00
|
|
|
|
nameValuePair "40-${bi}" (mkMerge [ (genericNetwork (mkOverride 999)) {
|
|
|
|
|
DHCP = mkOverride 0 (dhcpStr false);
|
|
|
|
|
networkConfig.Bond = name;
|
|
|
|
|
} ])));
|
|
|
|
|
})))
|
2014-11-27 00:42:32 +01:00
|
|
|
|
(mkMerge (flip mapAttrsToList cfg.macvlans (name: macvlan: {
|
|
|
|
|
netdevs."40-${name}" = {
|
|
|
|
|
netdevConfig = {
|
|
|
|
|
Name = name;
|
|
|
|
|
Kind = "macvlan";
|
|
|
|
|
};
|
2014-11-30 10:19:33 +01:00
|
|
|
|
macvlanConfig = optionalAttrs (macvlan.mode != null) { Mode = macvlan.mode; };
|
2014-11-27 00:42:32 +01:00
|
|
|
|
};
|
|
|
|
|
networks."40-${macvlan.interface}" = (mkMerge [ (genericNetwork (mkOverride 999)) {
|
|
|
|
|
macvlan = [ name ];
|
|
|
|
|
} ]);
|
|
|
|
|
})))
|
2014-11-20 11:37:48 +01:00
|
|
|
|
(mkMerge (flip mapAttrsToList cfg.sits (name: sit: {
|
|
|
|
|
netdevs."40-${name}" = {
|
|
|
|
|
netdevConfig = {
|
|
|
|
|
Name = name;
|
|
|
|
|
Kind = "sit";
|
|
|
|
|
};
|
|
|
|
|
tunnelConfig =
|
|
|
|
|
(optionalAttrs (sit.remote != null) {
|
|
|
|
|
Remote = sit.remote;
|
|
|
|
|
}) // (optionalAttrs (sit.local != null) {
|
|
|
|
|
Local = sit.local;
|
|
|
|
|
}) // (optionalAttrs (sit.ttl != null) {
|
|
|
|
|
TTL = sit.ttl;
|
|
|
|
|
});
|
|
|
|
|
};
|
|
|
|
|
networks = mkIf (sit.dev != null) {
|
|
|
|
|
"40-${sit.dev}" = (mkMerge [ (genericNetwork (mkOverride 999)) {
|
|
|
|
|
tunnel = [ name ];
|
|
|
|
|
} ]);
|
|
|
|
|
};
|
|
|
|
|
})))
|
|
|
|
|
(mkMerge (flip mapAttrsToList cfg.vlans (name: vlan: {
|
|
|
|
|
netdevs."40-${name}" = {
|
|
|
|
|
netdevConfig = {
|
|
|
|
|
Name = name;
|
|
|
|
|
Kind = "vlan";
|
|
|
|
|
};
|
|
|
|
|
vlanConfig.Id = vlan.id;
|
|
|
|
|
};
|
|
|
|
|
networks."40-${vlan.interface}" = (mkMerge [ (genericNetwork (mkOverride 999)) {
|
|
|
|
|
vlan = [ name ];
|
|
|
|
|
} ]);
|
|
|
|
|
})))
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
# We need to prefill the slaved devices with networking options
|
|
|
|
|
# This forces the network interface creator to initialize slaves.
|
|
|
|
|
networking.interfaces = listToAttrs (map (i: nameValuePair i { }) slaves);
|
|
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
}
|