2020-04-24 23:36:52 +00:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
dhcpcd = if !config.boot.isContainer then pkgs.dhcpcd else pkgs.dhcpcd.override { udev = null; };
|
|
|
|
|
|
|
|
cfg = config.networking.dhcpcd;
|
|
|
|
|
|
|
|
interfaces = attrValues config.networking.interfaces;
|
|
|
|
|
|
|
|
enableDHCP = config.networking.dhcpcd.enable &&
|
|
|
|
(config.networking.useDHCP || any (i: i.useDHCP == true) interfaces);
|
|
|
|
|
|
|
|
# Don't start dhcpcd on explicitly configured interfaces or on
|
|
|
|
# interfaces that are part of a bridge, bond or sit device.
|
|
|
|
ignoredInterfaces =
|
|
|
|
map (i: i.name) (filter (i: if i.useDHCP != null then !i.useDHCP else i.ipv4.addresses != [ ]) interfaces)
|
|
|
|
++ mapAttrsToList (i: _: i) config.networking.sits
|
|
|
|
++ concatLists (attrValues (mapAttrs (n: v: v.interfaces) config.networking.bridges))
|
|
|
|
++ flatten (concatMap (i: attrNames (filterAttrs (_: config: config.type != "internal") i.interfaces)) (attrValues config.networking.vswitches))
|
|
|
|
++ concatLists (attrValues (mapAttrs (n: v: v.interfaces) config.networking.bonds))
|
|
|
|
++ config.networking.dhcpcd.denyInterfaces;
|
|
|
|
|
|
|
|
arrayAppendOrNull = a1: a2: if a1 == null && a2 == null then null
|
|
|
|
else if a1 == null then a2 else if a2 == null then a1
|
|
|
|
else a1 ++ a2;
|
|
|
|
|
|
|
|
# If dhcp is disabled but explicit interfaces are enabled,
|
|
|
|
# we need to provide dhcp just for those interfaces.
|
|
|
|
allowInterfaces = arrayAppendOrNull cfg.allowInterfaces
|
|
|
|
(if !config.networking.useDHCP && enableDHCP then
|
|
|
|
map (i: i.name) (filter (i: i.useDHCP == true) interfaces) else null);
|
|
|
|
|
2023-02-02 18:25:31 +00:00
|
|
|
staticIPv6Addresses = map (i: i.name) (filter (i: i.ipv6.addresses != [ ]) interfaces);
|
|
|
|
|
|
|
|
noIPv6rs = concatStringsSep "\n" (map (name: ''
|
|
|
|
interface ${name}
|
|
|
|
noipv6rs
|
|
|
|
'') staticIPv6Addresses);
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
# Config file adapted from the one that ships with dhcpcd.
|
|
|
|
dhcpcdConf = pkgs.writeText "dhcpcd.conf"
|
|
|
|
''
|
|
|
|
# Inform the DHCP server of our hostname for DDNS.
|
|
|
|
hostname
|
|
|
|
|
|
|
|
# A list of options to request from the DHCP server.
|
|
|
|
option domain_name_servers, domain_name, domain_search, host_name
|
|
|
|
option classless_static_routes, ntp_servers, interface_mtu
|
|
|
|
|
|
|
|
# A ServerID is required by RFC2131.
|
|
|
|
# Commented out because of many non-compliant DHCP servers in the wild :(
|
|
|
|
#require dhcp_server_identifier
|
|
|
|
|
|
|
|
# A hook script is provided to lookup the hostname if not set by
|
|
|
|
# the DHCP server, but it should not be run by default.
|
|
|
|
nohook lookup-hostname
|
|
|
|
|
|
|
|
# Ignore peth* devices; on Xen, they're renamed physical
|
|
|
|
# Ethernet cards used for bridging. Likewise for vif* and tap*
|
|
|
|
# (Xen) and virbr* and vnet* (libvirt).
|
|
|
|
denyinterfaces ${toString ignoredInterfaces} lo peth* vif* tap* tun* virbr* vnet* vboxnet* sit*
|
|
|
|
|
|
|
|
# Use the list of allowed interfaces if specified
|
|
|
|
${optionalString (allowInterfaces != null) "allowinterfaces ${toString allowInterfaces}"}
|
|
|
|
|
|
|
|
# Immediately fork to background if specified, otherwise wait for IP address to be assigned
|
|
|
|
${{
|
|
|
|
background = "background";
|
|
|
|
any = "waitip";
|
|
|
|
ipv4 = "waitip 4";
|
|
|
|
ipv6 = "waitip 6";
|
|
|
|
both = "waitip 4\nwaitip 6";
|
|
|
|
if-carrier-up = "";
|
|
|
|
}.${cfg.wait}}
|
|
|
|
|
2020-11-06 00:33:48 +00:00
|
|
|
${optionalString (config.networking.enableIPv6 == false) ''
|
|
|
|
# Don't solicit or accept IPv6 Router Advertisements and DHCPv6 if disabled IPv6
|
|
|
|
noipv6
|
|
|
|
''}
|
|
|
|
|
2023-04-12 12:48:02 +00:00
|
|
|
${optionalString (config.networking.enableIPv6 && cfg.IPv6rs == null && staticIPv6Addresses != [ ]) noIPv6rs}
|
|
|
|
${optionalString (config.networking.enableIPv6 && cfg.IPv6rs == false) ''
|
|
|
|
noipv6rs
|
|
|
|
''}
|
2023-02-02 18:25:31 +00:00
|
|
|
|
2023-04-12 12:48:02 +00:00
|
|
|
${cfg.extraConfig}
|
2020-04-24 23:36:52 +00:00
|
|
|
'';
|
|
|
|
|
|
|
|
exitHook = pkgs.writeText "dhcpcd.exit-hook"
|
|
|
|
''
|
|
|
|
if [ "$reason" = BOUND -o "$reason" = REBOOT ]; then
|
|
|
|
# Restart ntpd. We need to restart it to make sure that it
|
|
|
|
# will actually do something: if ntpd cannot resolve the
|
|
|
|
# server hostnames in its config file, then it will never do
|
|
|
|
# anything ever again ("couldn't resolve ..., giving up on
|
|
|
|
# it"), so we silently lose time synchronisation. This also
|
|
|
|
# applies to openntpd.
|
2020-05-29 06:06:01 +00:00
|
|
|
/run/current-system/systemd/bin/systemctl try-reload-or-restart ntpd.service openntpd.service chronyd.service || true
|
2020-04-24 23:36:52 +00:00
|
|
|
fi
|
|
|
|
|
|
|
|
${cfg.runHook}
|
|
|
|
'';
|
|
|
|
|
|
|
|
in
|
|
|
|
|
|
|
|
{
|
|
|
|
|
|
|
|
###### interface
|
|
|
|
|
|
|
|
options = {
|
|
|
|
|
|
|
|
networking.dhcpcd.enable = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = true;
|
2022-08-12 12:06:08 +00:00
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
Whether to enable dhcpcd for device configuration. This is mainly to
|
|
|
|
explicitly disable dhcpcd (for example when using networkd).
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
networking.dhcpcd.persistent = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
2022-08-12 12:06:08 +00:00
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
Whenever to leave interfaces configured on dhcpcd daemon
|
|
|
|
shutdown. Set to true if you have your root or store mounted
|
|
|
|
over the network or this machine accepts SSH connections
|
|
|
|
through DHCP interfaces and clients should be notified when
|
|
|
|
it shuts down.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
networking.dhcpcd.denyInterfaces = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
default = [];
|
2022-08-12 12:06:08 +00:00
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
Disable the DHCP client for any interface whose name matches
|
|
|
|
any of the shell glob patterns in this list. The purpose of
|
|
|
|
this option is to blacklist virtual interfaces such as those
|
|
|
|
created by Xen, libvirt, LXC, etc.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
networking.dhcpcd.allowInterfaces = mkOption {
|
|
|
|
type = types.nullOr (types.listOf types.str);
|
|
|
|
default = null;
|
2022-08-12 12:06:08 +00:00
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
Enable the DHCP client for any interface whose name matches
|
|
|
|
any of the shell glob patterns in this list. Any interface not
|
|
|
|
explicitly matched by this pattern will be denied. This pattern only
|
|
|
|
applies when non-null.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
networking.dhcpcd.extraConfig = mkOption {
|
|
|
|
type = types.lines;
|
|
|
|
default = "";
|
2022-08-12 12:06:08 +00:00
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
Literal string to append to the config file generated for dhcpcd.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2023-04-12 12:48:02 +00:00
|
|
|
networking.dhcpcd.IPv6rs = mkOption {
|
|
|
|
type = types.nullOr types.bool;
|
|
|
|
default = null;
|
|
|
|
description = lib.mdDoc ''
|
|
|
|
Force enable or disable solicitation and receipt of IPv6 Router Advertisements.
|
|
|
|
This is required, for example, when using a static unique local IPv6 address (ULA)
|
|
|
|
and global IPv6 address auto-configuration with SLAAC.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
networking.dhcpcd.runHook = mkOption {
|
|
|
|
type = types.lines;
|
|
|
|
default = "";
|
|
|
|
example = "if [[ $reason =~ BOUND ]]; then echo $interface: Routers are $new_routers - were $old_routers; fi";
|
2022-08-21 13:32:41 +00:00
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
Shell code that will be run after all other hooks. See
|
|
|
|
`man dhcpcd-run-hooks` for details on what is possible.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
networking.dhcpcd.wait = mkOption {
|
|
|
|
type = types.enum [ "background" "any" "ipv4" "ipv6" "both" "if-carrier-up" ];
|
|
|
|
default = "any";
|
2022-08-12 12:06:08 +00:00
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
This option specifies when the dhcpcd service will fork to background.
|
|
|
|
If set to "background", dhcpcd will fork to background immediately.
|
|
|
|
If set to "ipv4" or "ipv6", dhcpcd will wait for the corresponding IP
|
|
|
|
address to be assigned. If set to "any", dhcpcd will wait for any type
|
|
|
|
(IPv4 or IPv6) to be assigned. If set to "both", dhcpcd will wait for
|
|
|
|
both an IPv4 and an IPv6 address before forking.
|
|
|
|
The option "if-carrier-up" is equivalent to "any" if either ethernet
|
|
|
|
is plugged nor WiFi is powered, and to "background" otherwise.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
###### implementation
|
|
|
|
|
|
|
|
config = mkIf enableDHCP {
|
|
|
|
|
2022-02-10 20:34:41 +00:00
|
|
|
assertions = [ {
|
|
|
|
# dhcpcd doesn't start properly with malloc ∉ [ libc scudo ]
|
|
|
|
# see https://github.com/NixOS/nixpkgs/issues/151696
|
|
|
|
assertion =
|
|
|
|
dhcpcd.enablePrivSep
|
|
|
|
-> elem config.environment.memoryAllocator.provider [ "libc" "scudo" ];
|
|
|
|
message = ''
|
|
|
|
dhcpcd with privilege separation is incompatible with chosen system malloc.
|
|
|
|
Currently only the `libc` and `scudo` allocators are known to work.
|
|
|
|
To disable dhcpcd's privilege separation, overlay Nixpkgs and override dhcpcd
|
|
|
|
to set `enablePrivSep = false`.
|
|
|
|
'';
|
|
|
|
} ];
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
systemd.services.dhcpcd = let
|
|
|
|
cfgN = config.networking;
|
|
|
|
hasDefaultGatewaySet = (cfgN.defaultGateway != null && cfgN.defaultGateway.address != "")
|
|
|
|
&& (!cfgN.enableIPv6 || (cfgN.defaultGateway6 != null && cfgN.defaultGateway6.address != ""));
|
|
|
|
in
|
|
|
|
{ description = "DHCP Client";
|
|
|
|
|
|
|
|
wantedBy = [ "multi-user.target" ] ++ optional (!hasDefaultGatewaySet) "network-online.target";
|
2021-02-22 21:28:39 +00:00
|
|
|
wants = [ "network.target" ];
|
2020-04-24 23:36:52 +00:00
|
|
|
before = [ "network-online.target" ];
|
|
|
|
|
|
|
|
restartTriggers = [ exitHook ];
|
|
|
|
|
|
|
|
# Stopping dhcpcd during a reconfiguration is undesirable
|
|
|
|
# because it brings down the network interfaces configured by
|
|
|
|
# dhcpcd. So do a "systemctl restart" instead.
|
|
|
|
stopIfChanged = false;
|
|
|
|
|
2022-07-14 12:49:19 +00:00
|
|
|
path = [ dhcpcd pkgs.nettools config.networking.resolvconf.package ];
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
unitConfig.ConditionCapability = "CAP_NET_ADMIN";
|
|
|
|
|
|
|
|
serviceConfig =
|
|
|
|
{ Type = "forking";
|
2021-12-21 02:18:32 +00:00
|
|
|
PIDFile = "/run/dhcpcd/pid";
|
|
|
|
RuntimeDirectory = "dhcpcd";
|
2020-04-24 23:36:52 +00:00
|
|
|
ExecStart = "@${dhcpcd}/sbin/dhcpcd dhcpcd --quiet ${optionalString cfg.persistent "--persistent"} --config ${dhcpcdConf}";
|
|
|
|
ExecReload = "${dhcpcd}/sbin/dhcpcd --rebind";
|
|
|
|
Restart = "always";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2021-12-21 02:18:32 +00:00
|
|
|
users.users.dhcpcd = {
|
|
|
|
isSystemUser = true;
|
|
|
|
group = "dhcpcd";
|
|
|
|
};
|
|
|
|
users.groups.dhcpcd = {};
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
environment.systemPackages = [ dhcpcd ];
|
|
|
|
|
|
|
|
environment.etc."dhcpcd.exit-hook".source = exitHook;
|
|
|
|
|
|
|
|
powerManagement.resumeCommands = mkIf config.systemd.services.dhcpcd.enable
|
|
|
|
''
|
|
|
|
# Tell dhcpcd to rebind its interfaces if it's running.
|
2020-05-29 06:06:01 +00:00
|
|
|
/run/current-system/systemd/bin/systemctl reload dhcpcd.service
|
2020-04-24 23:36:52 +00:00
|
|
|
'';
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
}
|