100 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			100 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
{ config, pkgs, lib, ... }:
 | 
						|
 | 
						|
with lib;
 | 
						|
 | 
						|
let
 | 
						|
 | 
						|
  cfg = config.services.sniproxy;
 | 
						|
 | 
						|
  configFile = pkgs.writeText "sniproxy.conf" ''
 | 
						|
    user ${cfg.user}
 | 
						|
    pidfile /run/sniproxy.pid
 | 
						|
    ${cfg.config}
 | 
						|
  '';
 | 
						|
 | 
						|
in
 | 
						|
{
 | 
						|
  options = {
 | 
						|
    services.sniproxy = {
 | 
						|
      enable = mkEnableOption "sniproxy server";
 | 
						|
 | 
						|
      user = mkOption {
 | 
						|
        type = types.str;
 | 
						|
        default = "sniproxy";
 | 
						|
        description = "User account under which sniproxy runs.";
 | 
						|
      };
 | 
						|
 | 
						|
      group = mkOption {
 | 
						|
        type = types.str;
 | 
						|
        default = "sniproxy";
 | 
						|
        description = "Group under which sniproxy runs.";
 | 
						|
      };
 | 
						|
 | 
						|
      config = mkOption {
 | 
						|
        type = types.lines;
 | 
						|
        default = "";
 | 
						|
        description = "sniproxy.conf configuration excluding the daemon username and pid file.";
 | 
						|
        example = literalExample ''
 | 
						|
          error_log {
 | 
						|
            filename /var/log/sniproxy/error.log
 | 
						|
          }
 | 
						|
          access_log {
 | 
						|
            filename /var/log/sniproxy/access.log
 | 
						|
          }
 | 
						|
          listen 443 {
 | 
						|
            proto tls
 | 
						|
          }
 | 
						|
          table {
 | 
						|
            example.com 192.0.2.10
 | 
						|
            example.net 192.0.2.20
 | 
						|
        }
 | 
						|
        '';
 | 
						|
      };
 | 
						|
 | 
						|
      logDir = mkOption {
 | 
						|
        type = types.str;
 | 
						|
        default = "/var/log/sniproxy/";
 | 
						|
        description = "Location of the log directory for sniproxy.";
 | 
						|
      };
 | 
						|
 | 
						|
    };
 | 
						|
 | 
						|
  };
 | 
						|
 | 
						|
  config = mkIf cfg.enable {
 | 
						|
    systemd.services.sniproxy = {
 | 
						|
      description = "sniproxy server";
 | 
						|
      after = [ "network.target" ];
 | 
						|
      wantedBy = [ "multi-user.target" ];
 | 
						|
      preStart = ''
 | 
						|
        test -d ${cfg.logDir} || {
 | 
						|
          echo "Creating initial log directory for sniproxy in ${cfg.logDir}"
 | 
						|
          mkdir -p ${cfg.logDir}
 | 
						|
          chmod 640 ${cfg.logDir}
 | 
						|
          }
 | 
						|
        chown -R ${cfg.user}:${cfg.group} ${cfg.logDir}
 | 
						|
      '';
 | 
						|
 | 
						|
      serviceConfig = {
 | 
						|
        Type = "forking";
 | 
						|
        ExecStart = "${pkgs.sniproxy}/bin/sniproxy -c ${configFile}";
 | 
						|
        Restart = "always";
 | 
						|
      };
 | 
						|
    };
 | 
						|
 | 
						|
    users.users = mkIf (cfg.user == "sniproxy") {
 | 
						|
      sniproxy = {
 | 
						|
        group = cfg.group;
 | 
						|
        uid = config.ids.uids.sniproxy;
 | 
						|
      };
 | 
						|
    };
 | 
						|
 | 
						|
    users.groups = mkIf (cfg.group == "sniproxy") {
 | 
						|
      sniproxy = {
 | 
						|
        gid = config.ids.gids.sniproxy;
 | 
						|
      };
 | 
						|
    };
 | 
						|
 | 
						|
  };
 | 
						|
}
 |