summary refs log tree commit diff
path: root/modules/services/security/torify.nix
blob: 1c158906a911cc88e843d7d37ad9a1e07c7e7f12 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
{ config, pkgs, ... }:
with pkgs.lib;
let

  cfg = config.services.tor;

  torify = pkgs.writeTextFile {
    name = "torify";
    text = ''
        #!${pkgs.stdenv.shell}
        TSOCKS_CONF_FILE=${pkgs.writeText "tsocks.conf" cfg.torify.config} LD_PRELOAD="${pkgs.tsocks}/lib/libtsocks.so $LD_PRELOAD" "$@"
    '';
    executable = true;
    destination = "/bin/torify";
  };

in

{

  ###### interface
  
  options = {
  
    services.tor.torify = {

      enable = mkOption {
        default = cfg.client.enable;
        description = ''
          Whether to build torify scipt to relay application traffic via TOR.
        '';
      };

      server = mkOption {
        default = "localhost:9050";
        example = "192.168.0.20";
        description = ''
          IP address of TOR client to use.
        '';
      };

      config = mkOption {
        default = "";
        description = ''
          Extra configuration. Contents will be added verbatim to TSocks
          configuration file.
        '';
      };

    };

  };

  ###### implementation

  config = mkIf cfg.torify.enable {

    environment.systemPackages = [ torify ];  # expose it to the users

    services.tor.torify.config = ''
      server = ${toString(head (splitString ":" cfg.torify.server))}
      server_port = ${toString(tail (splitString ":" cfg.torify.server))}

      local = 127.0.0.0/255.128.0.0
      local = 127.128.0.0/255.192.0.0
    '';
  };

}