2020-07-01 00:02:56 +02:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
cfg = config.boot.initrd.network.openvpn;
|
2020-08-07 15:43:58 +02:00
|
|
|
|
2020-07-01 00:02:56 +02:00
|
|
|
in
|
|
|
|
|
|
|
|
{
|
|
|
|
|
|
|
|
options = {
|
|
|
|
|
|
|
|
boot.initrd.network.openvpn.enable = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description = ''
|
2020-08-07 15:43:58 +02:00
|
|
|
Starts an OpenVPN client during initrd boot. It can be used to e.g.
|
|
|
|
remotely accessing the SSH service controlled by
|
|
|
|
{option}`boot.initrd.network.ssh` or other network services
|
2020-07-01 00:02:56 +02:00
|
|
|
included. Service is killed when stage-1 boot is finished.
|
|
|
|
'';
|
|
|
|
};
|
2020-08-07 15:43:58 +02:00
|
|
|
|
2020-07-01 00:02:56 +02:00
|
|
|
boot.initrd.network.openvpn.configuration = mkOption {
|
|
|
|
type = types.path; # Same type as boot.initrd.secrets
|
|
|
|
description = ''
|
2020-08-07 15:43:58 +02:00
|
|
|
The configuration file for OpenVPN.
|
2020-07-01 00:02:56 +02:00
|
|
|
|
|
|
|
::: {.warning}
|
|
|
|
Unless your bootloader supports initrd secrets, this configuration
|
|
|
|
is stored insecurely in the global Nix store.
|
2022-08-30 02:30:04 +02:00
|
|
|
:::
|
2020-07-01 00:02:56 +02:00
|
|
|
'';
|
2021-10-03 18:06:03 +02:00
|
|
|
example = literalExpression "./configuration.ovpn";
|
2020-07-01 00:02:56 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
config = mkIf (config.boot.initrd.network.enable && cfg.enable) {
|
|
|
|
assertions = [
|
|
|
|
{
|
|
|
|
assertion = cfg.configuration != null;
|
|
|
|
message = "You should specify a configuration for initrd OpenVPN";
|
|
|
|
}
|
|
|
|
];
|
2020-08-07 15:43:58 +02:00
|
|
|
|
2020-07-01 00:02:56 +02:00
|
|
|
# Add kernel modules needed for OpenVPN
|
|
|
|
boot.initrd.kernelModules = [ "tun" "tap" ];
|
|
|
|
|
|
|
|
# Add openvpn and ip binaries to the initrd
|
|
|
|
# The shared libraries are required for DNS resolution
|
2023-02-17 13:47:40 +01:00
|
|
|
boot.initrd.extraUtilsCommands = mkIf (!config.boot.initrd.systemd.enable) ''
|
2020-07-01 00:02:56 +02:00
|
|
|
copy_bin_and_libs ${pkgs.openvpn}/bin/openvpn
|
2021-04-08 13:33:09 +02:00
|
|
|
copy_bin_and_libs ${pkgs.iproute2}/bin/ip
|
2020-07-01 00:02:56 +02:00
|
|
|
|
|
|
|
cp -pv ${pkgs.glibc}/lib/libresolv.so.2 $out/lib
|
|
|
|
cp -pv ${pkgs.glibc}/lib/libnss_dns.so.2 $out/lib
|
|
|
|
'';
|
2020-08-07 15:43:58 +02:00
|
|
|
|
2023-02-17 13:47:40 +01:00
|
|
|
boot.initrd.systemd.storePaths = [
|
|
|
|
"${pkgs.openvpn}/bin/openvpn"
|
|
|
|
"${pkgs.iproute2}/bin/ip"
|
|
|
|
"${pkgs.glibc}/lib/libresolv.so.2"
|
|
|
|
"${pkgs.glibc}/lib/libnss_dns.so.2"
|
|
|
|
];
|
|
|
|
|
2020-07-01 00:02:56 +02:00
|
|
|
boot.initrd.secrets = {
|
|
|
|
"/etc/initrd.ovpn" = cfg.configuration;
|
|
|
|
};
|
2020-08-07 15:43:58 +02:00
|
|
|
|
2020-07-01 00:02:56 +02:00
|
|
|
# openvpn --version would exit with 1 instead of 0
|
2023-02-17 13:47:40 +01:00
|
|
|
boot.initrd.extraUtilsCommandsTest = mkIf (!config.boot.initrd.systemd.enable) ''
|
2020-07-01 00:02:56 +02:00
|
|
|
$out/bin/openvpn --show-gateway
|
|
|
|
'';
|
|
|
|
|
2023-02-17 13:47:40 +01:00
|
|
|
boot.initrd.network.postCommands = mkIf (!config.boot.initrd.systemd.enable) ''
|
2022-12-03 10:31:53 +01:00
|
|
|
openvpn /etc/initrd.ovpn &
|
2020-07-01 00:02:56 +02:00
|
|
|
'';
|
2023-02-17 13:47:40 +01:00
|
|
|
|
|
|
|
boot.initrd.systemd.services.openvpn = {
|
|
|
|
wantedBy = [ "initrd.target" ];
|
|
|
|
path = [ pkgs.iproute2 ];
|
|
|
|
after = [ "network.target" "initrd-nixos-copy-secrets.service" ];
|
|
|
|
serviceConfig.ExecStart = "${pkgs.openvpn}/bin/openvpn /etc/initrd.ovpn";
|
|
|
|
serviceConfig.Type = "notify";
|
|
|
|
};
|
2020-07-01 00:02:56 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
}
|