Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: e67dd25516a3^
Choose a base ref
...
head repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 7a6c7716a264
Choose a head ref
  • 19 commits
  • 14 files changed
  • 10 contributors

Commits on Sep 18, 2019

  1. nvidia_x11: 418.74 -> 430.26

    eadwu authored and Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    e67dd25 View commit details
  2. nvidia_x11: 430.26 -> 430.34

    eadwu authored and Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    525fc6d View commit details
  3. nvidia_x11_legacy390: 390.116 -> 390.129

    eadwu authored and Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    7dee255 View commit details
  4. nvidia_x11: 430.34 -> 430.40

    eadwu authored and Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    3910c24 View commit details
  5. zfs: 0.7.13 -> 0.8.0

    Same as zfsUnstable for the moment.
    We still keep the zfsUnstable expression as we likely
    need it in the near future again.
    Also remove spl since it is no longer needed.
    Mic92 authored and Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    f4efc9d View commit details
  6. zfs: 0.8.0 -> 0.8.1

    Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    885f752 View commit details
  7. wireguard: add generatePrivateKeyFile option + test

    Ideally, private keys never leave the host they're generated on - like
    SSH. Setting generatePrivateKeyFile to true causes the PK to be
    generate automatically.
    grahamc authored and Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    ab858f1 View commit details
  8. Wrap 'wg' commands in <command>

    grahamc authored and Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    495e085 View commit details
  9. wireguard service: allow empty interfaces

    This is needed in case one wants to use wg-quick on NixOS.
    abbradar authored and Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    b3311e1 View commit details
  10. wireguard: restart on failure

    As a oneshot service, if the startup failed it would never be attempted again.
    This is problematic when peer's addresses require DNS. DNS may not be reliably available at
    the time wireguard starts. Converting this to a simple service with Restart
    and RestartAfter directives allows the service to be reattempted, but at
    the cost of losing the oneshot semantics.
    
    Signed-off-by: Maximilian Bosch <maximilian@mbosch.me>
    sjau authored and Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    8b4fafc View commit details
  11. wireguard: add each peer in a separate service

    Before, changing any peers caused the entire WireGuard interface to
    be torn down and rebuilt. By configuring each peer in a separate
    service we're able to only restart the affected peers.
    
    Adding each peer individually also means individual peer
    configurations can fail, but the overall interface and all other peers
    will still be added.
    
    A WireGuard peer's internal identifier is its public key. This means
    it is the only reliable identifier to use for the systemd service.
    grahamc authored and Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    3b7e371 View commit details
  12. wireguard: attempt infinity times to resolve a peer

    grahamc authored and Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    efac560 View commit details
  13. wireguard: Don't fail if modprobe fails

    This can lead to unnecessary failures if the kernel module is already
    loaded:
    
      Jun 06 12:38:50 chef bglisn9bz0y5403vdw9hny0ij43r41jk-unit-script-wireguard-wg0-start[13261]: modprobe: FATAL: Module wireguard not found in directory /run/booted-system/kernel-modules/lib/modules/4.19.36
    edolstra authored and Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    e3ee725 View commit details
  14. nixos/wireguard: add peer service to interface dependencies (#62828)

    Previously each oneshot peer service only ran once and was not
    restarted together with the interface unit. Because of this,
    defined peers were missing after restarting their corresponding
    interface unit.
    
    Co-Authored-By: Franz Pletz <fpletz@fnordicwalking.de>
    2 people authored and Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    2a842f4 View commit details
  15. wireguard: allow routes to overlap with other routes

    Previously, `ip route replace` was tripped-up by non-wireguard routes that overlap the wireguard routes.  This commit fixes that by using `ip route add` separately and also adds a metric of 10000 to avoid competing with local interfaces for traffic
    Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    f268e13 View commit details
  16. Add dynamic hairpin routing

    Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    73f83b9 View commit details
  17. Get rid of some old stuff

    Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    ed06f25 View commit details
  18. Try starting container network before postStart

    Ryan Trinkle committed Sep 18, 2019
    Copy the full SHA
    d9c371a View commit details
  19. git-subrepo: init at 0.4.0 (#67217)

    * git-subrepo: init at 0.4.0
    
    * Apply suggestions from code review
    
    Co-Authored-By: worldofpeace <worldofpeace@protonmail.ch>
    Ryan Trinkle and worldofpeace committed Sep 18, 2019
    Copy the full SHA
    7a6c771 View commit details
10 changes: 8 additions & 2 deletions nixos/modules/services/networking/nat.nix
Original file line number Diff line number Diff line change
@@ -50,8 +50,14 @@ let
# NAT from external ports to internal ports.
${concatMapStrings (fwd: ''
iptables -w -t nat -A nixos-nat-pre \
-i ${toString cfg.externalInterface} -p ${fwd.proto} \
--dport ${builtins.toString fwd.sourcePort} \
${concatMapStrings (ip: "\! -d ${ip} ") cfg.internalIPs} \
-m addrtype --dst-type LOCAL \
-p ${fwd.proto} --dport ${builtins.toString fwd.sourcePort} \
-j MARK --set-mark 1
iptables -w -t nat -A nixos-nat-pre \
${concatMapStrings (ip: "\! -d ${ip} ") cfg.internalIPs} \
-m addrtype --dst-type LOCAL \
-p ${fwd.proto} --dport ${builtins.toString fwd.sourcePort} \
-j DNAT --to-destination ${fwd.destination}
${concatMapStrings (loopbackip:
179 changes: 149 additions & 30 deletions nixos/modules/services/networking/wireguard.nix
Original file line number Diff line number Diff line change
@@ -26,19 +26,28 @@ let
type = with types; nullOr str;
default = null;
description = ''
Base64 private key generated by wg genkey.
Base64 private key generated by <command>wg genkey</command>.
Warning: Consider using privateKeyFile instead if you do not
want to store the key in the world-readable Nix store.
'';
};

generatePrivateKeyFile = mkOption {
default = false;
type = types.bool;
description = ''
Automatically generate a private key with
<command>wg genkey</command>, at the privateKeyFile location.
'';
};

privateKeyFile = mkOption {
example = "/private/wireguard_key";
type = with types; nullOr str;
default = null;
description = ''
Private key file as generated by wg genkey.
Private key file as generated by <command>wg genkey</command>.
'';
};

@@ -124,8 +133,8 @@ let
example = "rVXs/Ni9tu3oDBLS4hOyAUAa1qTWVA3loR8eL20os3I=";
type = with types; nullOr str;
description = ''
Base64 preshared key generated by wg genpsk. Optional,
and may be omitted. This option adds an additional layer of
Base64 preshared key generated by <command>wg genpsk</command>.
Optional, and may be omitted. This option adds an additional layer of
symmetric-key cryptography to be mixed into the already existing
public-key cryptography, for post-quantum resistance.
@@ -139,8 +148,8 @@ let
example = "/private/wireguard_psk";
type = with types; nullOr str;
description = ''
File pointing to preshared key as generated by wg pensk. Optional,
and may be omitted. This option adds an additional layer of
File pointing to preshared key as generated by <command>wg pensk</command>.
Optional, and may be omitted. This option adds an additional layer of
symmetric-key cryptography to be mixed into the already existing
public-key cryptography, for post-quantum resistance.
'';
@@ -182,9 +191,101 @@ let

};

generateUnit = name: values:

generatePathUnit = name: values:
assert (values.privateKey == null);
assert (values.privateKeyFile != null);
nameValuePair "wireguard-${name}"
{
description = "WireGuard Tunnel - ${name} - Private Key";
requiredBy = [ "wireguard-${name}.service" ];
before = [ "wireguard-${name}.service" ];
pathConfig.PathExists = values.privateKeyFile;
};

generateKeyServiceUnit = name: values:
assert values.generatePrivateKeyFile;
nameValuePair "wireguard-${name}-key"
{
description = "WireGuard Tunnel - ${name} - Key Generator";
wantedBy = [ "wireguard-${name}.service" ];
requiredBy = [ "wireguard-${name}.service" ];
before = [ "wireguard-${name}.service" ];
path = with pkgs; [ wireguard ];

serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};

script = ''
mkdir --mode 0644 -p "${dirOf values.privateKeyFile}"
if [ ! -f "${values.privateKeyFile}" ]; then
touch "${values.privateKeyFile}"
chmod 0600 "${values.privateKeyFile}"
wg genkey > "${values.privateKeyFile}"
chmod 0400 "${values.privateKeyFile}"
fi
'';
};

generatePeerUnit = { interfaceName, interfaceCfg, peer }:
let
keyToUnitName = replaceChars
[ "/" "-" " " "+" "=" ]
[ "-" "\\x2d" "\\x20" "\\x2b" "\\x3d" ];
unitName = keyToUnitName peer.publicKey;
psk =
if peer.presharedKey != null
then pkgs.writeText "wg-psk" peer.presharedKey
else peer.presharedKeyFile;
in nameValuePair "wireguard-${interfaceName}-peer-${unitName}"
{
description = "WireGuard Peer - ${interfaceName} - ${peer.publicKey}";
requires = [ "wireguard-${interfaceName}.service" ];
after = [ "wireguard-${interfaceName}.service" ];
wantedBy = [ "multi-user.target" "wireguard-${interfaceName}.service" ];
environment.DEVICE = interfaceName;
environment.WG_ENDPOINT_RESOLUTION_RETRIES = "infinity";
path = with pkgs; [ iproute wireguard-tools ];

serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};

script = let
wg_setup = "wg set ${interfaceName} peer ${peer.publicKey}" +
optionalString (psk != null) " preshared-key ${psk}" +
optionalString (peer.endpoint != null) " endpoint ${peer.endpoint}" +
optionalString (peer.persistentKeepalive != null) " persistent-keepalive ${toString peer.persistentKeepalive}" +
optionalString (peer.allowedIPs != []) " allowed-ips ${concatStringsSep "," peer.allowedIPs}";
route_setup =
optionalString (interfaceCfg.allowedIPsAsRoutes != false)
(concatMapStringsSep "\n"
(allowedIP:
"ip route add ${allowedIP} dev ${interfaceName} table ${interfaceCfg.table} metric 10000"
) peer.allowedIPs);
in ''
${wg_setup}
${route_setup}
'';

postStop = let
route_destroy = optionalString (interfaceCfg.allowedIPsAsRoutes != false)
(concatMapStringsSep "\n"
(allowedIP:
"ip route delete ${allowedIP} dev ${interfaceName} table ${interfaceCfg.table}"
) peer.allowedIPs);
in ''
wg set ${interfaceName} peer ${peer.publicKey} remove
${route_destroy}
'';
};

generateInterfaceUnit = name: values:
# exactly one way to specify the private key must be set
assert (values.privateKey != null) != (values.privateKeyFile != null);
#assert (values.privateKey != null) != (values.privateKeyFile != null);
let privKey = if values.privateKeyFile != null then values.privateKeyFile else pkgs.writeText "wg-key" values.privateKey;
in
nameValuePair "wireguard-${name}"
@@ -202,7 +303,7 @@ let
};

script = ''
${optionalString (!config.boot.isContainer) "modprobe wireguard"}
${optionalString (!config.boot.isContainer) "modprobe wireguard || true"}
${values.preSetup}
@@ -215,25 +316,8 @@ let
wg set ${name} private-key ${privKey} ${
optionalString (values.listenPort != null) " listen-port ${toString values.listenPort}"}
${concatMapStringsSep "\n" (peer:
assert (peer.presharedKeyFile == null) || (peer.presharedKey == null); # at most one of the two must be set
let psk = if peer.presharedKey != null then pkgs.writeText "wg-psk" peer.presharedKey else peer.presharedKeyFile;
in
"wg set ${name} peer ${peer.publicKey}" +
optionalString (psk != null) " preshared-key ${psk}" +
optionalString (peer.endpoint != null) " endpoint ${peer.endpoint}" +
optionalString (peer.persistentKeepalive != null) " persistent-keepalive ${toString peer.persistentKeepalive}" +
optionalString (peer.allowedIPs != []) " allowed-ips ${concatStringsSep "," peer.allowedIPs}"
) values.peers}
ip link set up dev ${name}
${optionalString (values.allowedIPsAsRoutes != false) (concatStringsSep "\n" (concatMap (peer:
(map (allowedIP:
"ip route replace ${allowedIP} dev ${name} table ${values.table}"
) peer.allowedIPs)
) values.peers))}
${values.postSetup}
'';

@@ -253,8 +337,16 @@ in

networking.wireguard = {

enable = mkOption {
description = "Whether to enable WireGuard.";
type = types.bool;
# 2019-05-25: Backwards compatibility.
default = cfg.interfaces != {};
example = true;
};

interfaces = mkOption {
description = "Wireguard interfaces.";
description = "WireGuard interfaces.";
default = {};
example = {
wg0 = {
@@ -277,13 +369,40 @@ in

###### implementation

config = mkIf (cfg.interfaces != {}) {
config = mkIf cfg.enable (let
all_peers = flatten
(mapAttrsToList (interfaceName: interfaceCfg:
map (peer: { inherit interfaceName interfaceCfg peer;}) interfaceCfg.peers
) cfg.interfaces);
in {

assertions = (attrValues (
mapAttrs (name: value: {
assertion = (value.privateKey != null) != (value.privateKeyFile != null);
message = "Either networking.wireguard.interfaces.${name}.privateKey or networking.wireguard.interfaces.${name}.privateKeyFile must be set.";
}) cfg.interfaces))
++ (attrValues (
mapAttrs (name: value: {
assertion = value.generatePrivateKeyFile -> (value.privateKey == null);
message = "networking.wireguard.interfaces.${name}.generatePrivateKey must not be set if networking.wireguard.interfaces.${name}.privateKey is set.";
}) cfg.interfaces))
++ map ({ interfaceName, peer, ... }: {
assertion = (peer.presharedKey == null) || (peer.presharedKeyFile == null);
message = "networking.wireguard.interfaces.${interfaceName} peer «${peer.publicKey}» has both presharedKey and presharedKeyFile set, but only one can be used.";
}) all_peers;

boot.extraModulePackages = [ kernel.wireguard ];
environment.systemPackages = [ pkgs.wireguard-tools ];

systemd.services = mapAttrs' generateUnit cfg.interfaces;
systemd.services =
(mapAttrs' generateInterfaceUnit cfg.interfaces)
// (listToAttrs (map generatePeerUnit all_peers))
// (mapAttrs' generateKeyServiceUnit
(filterAttrs (name: value: value.generatePrivateKeyFile) cfg.interfaces));

};
systemd.paths = mapAttrs' generatePathUnit
(filterAttrs (name: value: value.privateKeyFile != null) cfg.interfaces);

});

}
6 changes: 2 additions & 4 deletions nixos/modules/tasks/filesystems/zfs.nix
Original file line number Diff line number Diff line change
@@ -24,11 +24,9 @@ let
kernel = config.boot.kernelPackages;

packages = if config.boot.zfs.enableUnstable then {
spl = null;
zfs = kernel.zfsUnstable;
zfsUser = pkgs.zfsUnstable;
} else {
spl = kernel.spl;
zfs = kernel.zfs;
zfsUser = pkgs.zfs;
};
@@ -325,8 +323,8 @@ in
virtualisation.lxd.zfsSupport = true;

boot = {
kernelModules = [ "zfs" ] ++ optional (!cfgZfs.enableUnstable) "spl";
extraModulePackages = with packages; [ zfs ] ++ optional (!cfgZfs.enableUnstable) spl;
kernelModules = [ "zfs" ];
extraModulePackages = with packages; [ zfs ];
};

boot.initrd = mkIf inInitrd {
Loading