summaryrefslogtreecommitdiffstats
path: root/tv/3modules/dnsmasq.nix
blob: ab24ac08987ed99e7bb580e5dd35f3efbf7ed8d9 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
with import <stockholm/lib>;
{ config, ... }: let
  cfg = config.tv.dnsmasq;
in {

  options.tv.dnsmasq = {
    enable = mkEnableOption "tv.dnsmasq";
    dhcp-range = mkOption {
      type = types.str;
    };
    interface = mkOption {
      type = types.str;
    };
    address = mkOption {
      type = types.str;
    };
    prefixLength = mkOption {
      type = types.addCheck types.int (x: x >= 0 && x <= 32);
    };
  };

  config = mkIf cfg.enable (mkMerge [
    {
      networking.dhcpcd.denyInterfaces = [ cfg.interface ];
      services.dnsmasq.resolveLocalQueries = false;
      networking.interfaces.${cfg.interface} = {
        ipv4.addresses = singleton {
          address = cfg.address;
          prefixLength = cfg.prefixLength;
        };
      };
      services.dnsmasq.enable = true;
      services.dnsmasq.extraConfig = ''
        bind-interfaces
        dhcp-range=${cfg.dhcp-range}
        listen-address=${cfg.address}
      '';
      tv.iptables.extra.filter.INPUT = [
        "-i ${cfg.interface} -p tcp -m tcp --dport bootps -j ACCEPT"
        "-i ${cfg.interface} -p udp -m udp --dport bootps -j ACCEPT"
        "-i ${cfg.interface} -p tcp -m tcp --dport domain -j ACCEPT"
        "-i ${cfg.interface} -p udp -m udp --dport domain -j ACCEPT"
      ];
    }
    {
      # enable forwarding
      boot.kernel.sysctl."net.ipv4.ip_forward" = true;
      tv.iptables.extra.filter.FORWARD = [
        "-m state --state RELATED,ESTABLISHED -j ACCEPT"
        "-i ${cfg.interface} -j ACCEPT"
      ];
      tv.iptables.extra.nat.POSTROUTING = [
        "-j MASQUERADE"
      ];
    }
  ]);

}