nixpkgs/nixos/modules/services/networking/kea.nix

528 lines
15 KiB
Nix

{
config,
lib,
pkgs,
utils,
...
}:
let
cfg = config.services.kea;
format = pkgs.formats.json { };
chooseNotNull = x: y: if x != null then x else y;
ctrlAgentConfig = chooseNotNull cfg.ctrl-agent.configFile (
format.generate "kea-ctrl-agent.conf" {
Control-agent = cfg.ctrl-agent.settings;
}
);
dhcp4Config = chooseNotNull cfg.dhcp4.configFile (
format.generate "kea-dhcp4.conf" {
Dhcp4 = cfg.dhcp4.settings;
}
);
dhcp6Config = chooseNotNull cfg.dhcp6.configFile (
format.generate "kea-dhcp6.conf" {
Dhcp6 = cfg.dhcp6.settings;
}
);
dhcpDdnsConfig = chooseNotNull cfg.dhcp-ddns.configFile (
format.generate "kea-dhcp-ddns.conf" {
DhcpDdns = cfg.dhcp-ddns.settings;
}
);
in
{
options.services.kea = with lib.types; {
package = lib.mkPackageOption pkgs "kea" { };
ctrl-agent = lib.mkOption {
description = ''
Kea Control Agent configuration
'';
default = { };
type = submodule {
options = {
enable = lib.mkEnableOption "Kea Control Agent";
extraArgs = lib.mkOption {
type = listOf str;
default = [ ];
description = ''
List of additional arguments to pass to the daemon.
'';
};
configFile = lib.mkOption {
type = nullOr path;
default = null;
description = ''
Kea Control Agent configuration as a path, see <https://kea.readthedocs.io/en/kea-${cfg.package.version}/arm/agent.html>.
Takes preference over [settings](#opt-services.kea.ctrl-agent.settings).
Most users should prefer using [settings](#opt-services.kea.ctrl-agent.settings) instead.
'';
};
settings = lib.mkOption {
type = format.type;
default = null;
description = ''
Kea Control Agent configuration as an attribute set, see <https://kea.readthedocs.io/en/kea-${cfg.package.version}/arm/agent.html>.
'';
};
};
};
};
dhcp4 = lib.mkOption {
description = ''
DHCP4 Server configuration
'';
default = { };
type = submodule {
options = {
enable = lib.mkEnableOption "Kea DHCP4 server";
extraArgs = lib.mkOption {
type = listOf str;
default = [ ];
description = ''
List of additional arguments to pass to the daemon.
'';
};
configFile = lib.mkOption {
type = nullOr path;
default = null;
description = ''
Kea DHCP4 configuration as a path, see <https://kea.readthedocs.io/en/kea-${cfg.package.version}/arm/dhcp4-srv.html>.
Takes preference over [settings](#opt-services.kea.dhcp4.settings).
Most users should prefer using [settings](#opt-services.kea.dhcp4.settings) instead.
'';
};
settings = lib.mkOption {
type = format.type;
default = null;
example = {
valid-lifetime = 4000;
renew-timer = 1000;
rebind-timer = 2000;
interfaces-config = {
interfaces = [
"eth0"
];
};
lease-database = {
type = "memfile";
persist = true;
name = "/var/lib/kea/dhcp4.leases";
};
subnet4 = [
{
id = 1;
subnet = "192.0.2.0/24";
pools = [
{
pool = "192.0.2.100 - 192.0.2.240";
}
];
}
];
};
description = ''
Kea DHCP4 configuration as an attribute set, see <https://kea.readthedocs.io/en/kea-${cfg.package.version}/arm/dhcp4-srv.html>.
'';
};
};
};
};
dhcp6 = lib.mkOption {
description = ''
DHCP6 Server configuration
'';
default = { };
type = submodule {
options = {
enable = lib.mkEnableOption "Kea DHCP6 server";
extraArgs = lib.mkOption {
type = listOf str;
default = [ ];
description = ''
List of additional arguments to pass to the daemon.
'';
};
configFile = lib.mkOption {
type = nullOr path;
default = null;
description = ''
Kea DHCP6 configuration as a path, see <https://kea.readthedocs.io/en/kea-${cfg.package.version}/arm/dhcp6-srv.html>.
Takes preference over [settings](#opt-services.kea.dhcp6.settings).
Most users should prefer using [settings](#opt-services.kea.dhcp6.settings) instead.
'';
};
settings = lib.mkOption {
type = format.type;
default = null;
example = {
valid-lifetime = 4000;
renew-timer = 1000;
rebind-timer = 2000;
preferred-lifetime = 3000;
interfaces-config = {
interfaces = [
"eth0"
];
};
lease-database = {
type = "memfile";
persist = true;
name = "/var/lib/kea/dhcp6.leases";
};
subnet6 = [
{
id = 1;
subnet = "2001:db8:1::/64";
pools = [
{
pool = "2001:db8:1::1-2001:db8:1::ffff";
}
];
}
];
};
description = ''
Kea DHCP6 configuration as an attribute set, see <https://kea.readthedocs.io/en/kea-${cfg.package.version}/arm/dhcp6-srv.html>.
'';
};
};
};
};
dhcp-ddns = lib.mkOption {
description = ''
Kea DHCP-DDNS configuration
'';
default = { };
type = submodule {
options = {
enable = lib.mkEnableOption "Kea DDNS server";
extraArgs = lib.mkOption {
type = listOf str;
default = [ ];
description = ''
List of additional arguments to pass to the daemon.
'';
};
configFile = lib.mkOption {
type = nullOr path;
default = null;
description = ''
Kea DHCP-DDNS configuration as a path, see <https://kea.readthedocs.io/en/kea-${cfg.package.version}/arm/ddns.html>.
Takes preference over [settings](#opt-services.kea.dhcp-ddns.settings).
Most users should prefer using [settings](#opt-services.kea.dhcp-ddns.settings) instead.
'';
};
settings = lib.mkOption {
type = format.type;
default = null;
example = {
ip-address = "127.0.0.1";
port = 53001;
dns-server-timeout = 100;
ncr-protocol = "UDP";
ncr-format = "JSON";
tsig-keys = [ ];
forward-ddns = {
ddns-domains = [ ];
};
reverse-ddns = {
ddns-domains = [ ];
};
};
description = ''
Kea DHCP-DDNS configuration as an attribute set, see <https://kea.readthedocs.io/en/kea-${cfg.package.version}/arm/ddns.html>.
'';
};
};
};
};
};
config =
let
commonEnvironment = {
# Allow hook scripts only when they originate from the system configuration
KEA_HOOK_SCRIPTS_PATH = lib.mkDefault "/nix/store";
# Allow hooks to originate from the configured package
KEA_HOOKS_PATH = lib.mkDefault "${cfg.package}/lib/kea/hooks";
};
commonServiceConfig = {
ExecReload = toString [
(lib.getExe' pkgs.coreutils "kill")
"-HUP"
"$MAINPID"
];
DynamicUser = true;
User = "kea";
ConfigurationDirectory = "kea";
Restart = "on-failure";
RuntimeDirectory = "kea";
RuntimeDirectoryMode = "0750";
RuntimeDirectoryPreserve = true;
StateDirectory = "kea";
UMask = "0077";
};
in
lib.mkIf (cfg.ctrl-agent.enable || cfg.dhcp4.enable || cfg.dhcp6.enable || cfg.dhcp-ddns.enable) (
lib.mkMerge [
{
environment.systemPackages = [ cfg.package ];
users.users.kea = {
isSystemUser = true;
group = "kea";
};
users.groups.kea = { };
}
(lib.mkIf cfg.ctrl-agent.enable {
assertions = [
{
assertion = lib.xor (cfg.ctrl-agent.settings == null) (cfg.ctrl-agent.configFile == null);
message = "Either services.kea.ctrl-agent.settings or services.kea.ctrl-agent.configFile must be set to a non-null value.";
}
];
environment.etc."kea/ctrl-agent.conf".source = ctrlAgentConfig;
systemd.services.kea-ctrl-agent = {
description = "Kea Control Agent";
documentation = [
"man:kea-ctrl-agent(8)"
"https://kea.readthedocs.io/en/kea-${cfg.package.version}/arm/agent.html"
];
wants = [
"network-online.target"
];
after = [
"network-online.target"
"time-sync.target"
];
wantedBy = [
"kea-dhcp4-server.service"
"kea-dhcp6-server.service"
"kea-dhcp-ddns-server.service"
];
environment = commonEnvironment;
restartTriggers = [
ctrlAgentConfig
];
serviceConfig = {
ExecStart = utils.escapeSystemdExecArgs (
[
(lib.getExe' cfg.package "kea-ctrl-agent")
"-c"
"/etc/kea/ctrl-agent.conf"
]
++ cfg.ctrl-agent.extraArgs
);
KillMode = "process";
Restart = "on-failure";
}
// commonServiceConfig;
};
})
(lib.mkIf cfg.dhcp4.enable {
assertions = [
{
assertion = lib.xor (cfg.dhcp4.settings == null) (cfg.dhcp4.configFile == null);
message = "Either services.kea.dhcp4.settings or services.kea.dhcp4.configFile must be set to a non-null value.";
}
];
environment.etc."kea/dhcp4-server.conf".source = dhcp4Config;
systemd.services.kea-dhcp4-server = {
description = "Kea DHCP4 Server";
documentation = [
"man:kea-dhcp4(8)"
"https://kea.readthedocs.io/en/kea-${cfg.package.version}/arm/dhcp4-srv.html"
];
after = [
"network-online.target"
"time-sync.target"
];
wants = [
"network-online.target"
];
wantedBy = [
"multi-user.target"
];
environment = commonEnvironment;
restartTriggers = [
dhcp4Config
];
serviceConfig = {
ExecStart = utils.escapeSystemdExecArgs (
[
(lib.getExe' cfg.package "kea-dhcp4")
"-c"
"etc/kea/dhcp4-server.conf"
]
++ cfg.dhcp4.extraArgs
);
# Kea does not request capabilities by itself
AmbientCapabilities = [
"CAP_NET_BIND_SERVICE"
"CAP_NET_RAW"
];
CapabilityBoundingSet = [
"CAP_NET_BIND_SERVICE"
"CAP_NET_RAW"
];
}
// commonServiceConfig;
};
})
(lib.mkIf cfg.dhcp6.enable {
assertions = [
{
assertion = lib.xor (cfg.dhcp6.settings == null) (cfg.dhcp6.configFile == null);
message = "Either services.kea.dhcp6.settings or services.kea.dhcp6.configFile must be set to a non-null value.";
}
];
environment.etc."kea/dhcp6-server.conf".source = dhcp6Config;
systemd.services.kea-dhcp6-server = {
description = "Kea DHCP6 Server";
documentation = [
"man:kea-dhcp6(8)"
"https://kea.readthedocs.io/en/kea-${cfg.package.version}/arm/dhcp6-srv.html"
];
after = [
"network-online.target"
"time-sync.target"
];
wants = [
"network-online.target"
];
wantedBy = [
"multi-user.target"
];
environment = commonEnvironment;
restartTriggers = [
dhcp6Config
];
serviceConfig = {
ExecStart = utils.escapeSystemdExecArgs (
[
(lib.getExe' cfg.package "kea-dhcp6")
"-c"
"/etc/kea/dhcp6-server.conf"
]
++ cfg.dhcp6.extraArgs
);
# Kea does not request capabilities by itself
AmbientCapabilities = [
"CAP_NET_BIND_SERVICE"
];
CapabilityBoundingSet = [
"CAP_NET_BIND_SERVICE"
];
}
// commonServiceConfig;
};
})
(lib.mkIf cfg.dhcp-ddns.enable {
assertions = [
{
assertion = lib.xor (cfg.dhcp-ddns.settings == null) (cfg.dhcp-ddns.configFile == null);
message = "Either services.kea.dhcp-ddns.settings or services.kea.dhcp-ddns.configFile must be set to a non-null value.";
}
];
environment.etc."kea/dhcp-ddns.conf".source = dhcpDdnsConfig;
systemd.services.kea-dhcp-ddns-server = {
description = "Kea DHCP-DDNS Server";
documentation = [
"man:kea-dhcp-ddns(8)"
"https://kea.readthedocs.io/en/kea-${cfg.package.version}/arm/ddns.html"
];
wants = [ "network-online.target" ];
after = [
"network-online.target"
"time-sync.target"
];
wantedBy = [
"multi-user.target"
];
environment = commonEnvironment;
restartTriggers = [
dhcpDdnsConfig
];
serviceConfig = {
ExecStart = utils.escapeSystemdExecArgs (
[
(lib.getExe' cfg.package "kea-dhcp-ddns")
"-c"
"/etc/kea/dhcp-ddns.conf"
]
++ cfg.dhcp-ddns.extraArgs
);
AmbientCapabilities = [
"CAP_NET_BIND_SERVICE"
];
CapabilityBoundingSet = [
"CAP_NET_BIND_SERVICE"
];
}
// commonServiceConfig;
};
})
]
);
meta.maintainers = with lib.maintainers; [ hexa ];
# uses attributes of the linked package
meta.buildDocsInSandbox = false;
}