6afb255d97
these changes were generated with nixq 0.0.2, by running nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix two mentions of the mdDoc function remain in nixos/, both of which are inside of comments. Since lib.mdDoc is already defined as just id, this commit is a no-op as far as Nix (and the built manual) is concerned.
169 lines
4.5 KiB
Nix
169 lines
4.5 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
with lib;
|
|
let
|
|
|
|
cfg = config.programs.proxychains;
|
|
|
|
configFile = ''
|
|
${cfg.chain.type}_chain
|
|
${optionalString (cfg.chain.type == "random")
|
|
"chain_len = ${builtins.toString cfg.chain.length}"}
|
|
${optionalString cfg.proxyDNS "proxy_dns"}
|
|
${optionalString cfg.quietMode "quiet_mode"}
|
|
remote_dns_subnet ${builtins.toString cfg.remoteDNSSubnet}
|
|
tcp_read_time_out ${builtins.toString cfg.tcpReadTimeOut}
|
|
tcp_connect_time_out ${builtins.toString cfg.tcpConnectTimeOut}
|
|
localnet ${cfg.localnet}
|
|
[ProxyList]
|
|
${builtins.concatStringsSep "\n"
|
|
(lib.mapAttrsToList (k: v: "${v.type} ${v.host} ${builtins.toString v.port}")
|
|
(lib.filterAttrs (k: v: v.enable) cfg.proxies))}
|
|
'';
|
|
|
|
proxyOptions = {
|
|
options = {
|
|
enable = mkEnableOption "this proxy";
|
|
|
|
type = mkOption {
|
|
type = types.enum [ "http" "socks4" "socks5" ];
|
|
description = "Proxy type.";
|
|
};
|
|
|
|
host = mkOption {
|
|
type = types.str;
|
|
description = "Proxy host or IP address.";
|
|
};
|
|
|
|
port = mkOption {
|
|
type = types.port;
|
|
description = "Proxy port";
|
|
};
|
|
};
|
|
};
|
|
|
|
in {
|
|
|
|
###### interface
|
|
|
|
options = {
|
|
|
|
programs.proxychains = {
|
|
|
|
enable = mkEnableOption "proxychains configuration";
|
|
|
|
package = mkPackageOption pkgs "proxychains" {
|
|
example = "proxychains-ng";
|
|
};
|
|
|
|
chain = {
|
|
type = mkOption {
|
|
type = types.enum [ "dynamic" "strict" "random" ];
|
|
default = "strict";
|
|
description = ''
|
|
`dynamic` - Each connection will be done via chained proxies
|
|
all proxies chained in the order as they appear in the list
|
|
at least one proxy must be online to play in chain
|
|
(dead proxies are skipped)
|
|
otherwise `EINTR` is returned to the app.
|
|
|
|
`strict` - Each connection will be done via chained proxies
|
|
all proxies chained in the order as they appear in the list
|
|
all proxies must be online to play in chain
|
|
otherwise `EINTR` is returned to the app.
|
|
|
|
`random` - Each connection will be done via random proxy
|
|
(or proxy chain, see {option}`programs.proxychains.chain.length`) from the list.
|
|
'';
|
|
};
|
|
length = mkOption {
|
|
type = types.nullOr types.int;
|
|
default = null;
|
|
description = ''
|
|
Chain length for random chain.
|
|
'';
|
|
};
|
|
};
|
|
|
|
proxyDNS = mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = "Proxy DNS requests - no leak for DNS data.";
|
|
};
|
|
|
|
quietMode = mkEnableOption "Quiet mode (no output from the library)";
|
|
|
|
remoteDNSSubnet = mkOption {
|
|
type = types.enum [ 10 127 224 ];
|
|
default = 224;
|
|
description = ''
|
|
Set the class A subnet number to use for the internal remote DNS mapping, uses the reserved 224.x.x.x range by default.
|
|
'';
|
|
};
|
|
|
|
tcpReadTimeOut = mkOption {
|
|
type = types.int;
|
|
default = 15000;
|
|
description = "Connection read time-out in milliseconds.";
|
|
};
|
|
|
|
tcpConnectTimeOut = mkOption {
|
|
type = types.int;
|
|
default = 8000;
|
|
description = "Connection time-out in milliseconds.";
|
|
};
|
|
|
|
localnet = mkOption {
|
|
type = types.str;
|
|
default = "127.0.0.0/255.0.0.0";
|
|
description = "By default enable localnet for loopback address ranges.";
|
|
};
|
|
|
|
proxies = mkOption {
|
|
type = types.attrsOf (types.submodule proxyOptions);
|
|
description = ''
|
|
Proxies to be used by proxychains.
|
|
'';
|
|
|
|
example = literalExpression ''
|
|
{ myproxy =
|
|
{ type = "socks4";
|
|
host = "127.0.0.1";
|
|
port = 1337;
|
|
};
|
|
}
|
|
'';
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
###### implementation
|
|
|
|
meta.maintainers = with maintainers; [ sorki ];
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
assertions = singleton {
|
|
assertion = cfg.chain.type != "random" && cfg.chain.length == null;
|
|
message = ''
|
|
Option `programs.proxychains.chain.length`
|
|
only makes sense with `programs.proxychains.chain.type` = "random".
|
|
'';
|
|
};
|
|
|
|
programs.proxychains.proxies = mkIf config.services.tor.client.enable
|
|
{
|
|
torproxy = mkDefault {
|
|
enable = true;
|
|
type = "socks4";
|
|
host = "127.0.0.1";
|
|
port = 9050;
|
|
};
|
|
};
|
|
|
|
environment.etc."proxychains.conf".text = configFile;
|
|
environment.systemPackages = [ cfg.package ];
|
|
};
|
|
|
|
}
|