mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-15 14:26:33 +01:00
6afb255d97
these changes were generated with nixq 0.0.2, by running nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix two mentions of the mdDoc function remain in nixos/, both of which are inside of comments. Since lib.mdDoc is already defined as just id, this commit is a no-op as far as Nix (and the built manual) is concerned.
85 lines
2.2 KiB
Nix
85 lines
2.2 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.miredo;
|
|
pidFile = "/run/miredo.pid";
|
|
miredoConf = pkgs.writeText "miredo.conf" ''
|
|
InterfaceName ${cfg.interfaceName}
|
|
ServerAddress ${cfg.serverAddress}
|
|
${optionalString (cfg.bindAddress != null) "BindAddress ${cfg.bindAddress}"}
|
|
${optionalString (cfg.bindPort != null) "BindPort ${cfg.bindPort}"}
|
|
'';
|
|
in
|
|
{
|
|
|
|
###### interface
|
|
|
|
options = {
|
|
|
|
services.miredo = {
|
|
|
|
enable = mkEnableOption "the Miredo IPv6 tunneling service";
|
|
|
|
package = mkPackageOption pkgs "miredo" { };
|
|
|
|
serverAddress = mkOption {
|
|
default = "teredo.remlab.net";
|
|
type = types.str;
|
|
description = ''
|
|
The hostname or primary IPv4 address of the Teredo server.
|
|
This setting is required if Miredo runs as a Teredo client.
|
|
"teredo.remlab.net" is an experimental service for testing only.
|
|
Please use another server for production and/or large scale deployments.
|
|
'';
|
|
};
|
|
|
|
interfaceName = mkOption {
|
|
default = "teredo";
|
|
type = types.str;
|
|
description = ''
|
|
Name of the network tunneling interface.
|
|
'';
|
|
};
|
|
|
|
bindAddress = mkOption {
|
|
default = null;
|
|
type = types.nullOr types.str;
|
|
description = ''
|
|
Depending on the local firewall/NAT rules, you might need to force
|
|
Miredo to use a fixed UDP port and or IPv4 address.
|
|
'';
|
|
};
|
|
|
|
bindPort = mkOption {
|
|
default = null;
|
|
type = types.nullOr types.str;
|
|
description = ''
|
|
Depending on the local firewall/NAT rules, you might need to force
|
|
Miredo to use a fixed UDP port and or IPv4 address.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
|
|
###### implementation
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
systemd.services.miredo = {
|
|
wantedBy = [ "multi-user.target" ];
|
|
after = [ "network.target" ];
|
|
description = "Teredo IPv6 Tunneling Daemon";
|
|
serviceConfig = {
|
|
Restart = "always";
|
|
RestartSec = "5s";
|
|
ExecStart = "${cfg.package}/bin/miredo -c ${miredoConf} -p ${pidFile} -f";
|
|
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
|
|
};
|
|
};
|
|
|
|
};
|
|
|
|
}
|