blob: 734ea116d58f48617c88f09370dd8f04fc323378 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
|
{
inputs = {
flake-utils.url = "github:numtide/flake-utils";
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.05";
};
outputs =
{
flake-utils,
nixpkgs,
self,
}:
flake-utils.lib.eachDefaultSystem (
system:
let
pkgs = import nixpkgs {
inherit system;
};
lib = pkgs.lib;
in
{
packages =
let
makeShellScript =
name: action:
pkgs.writeScriptBin name ''
#!${pkgs.runtimeShell}
if [ "$(id -u)" -ne 0 ]; then
exec sudo "$0" "$@"
fi
${action}
'';
in
{
pia-start = makeShellScript "pia-start" "sudo systemctl start openvpn-$1.service";
pia-stop = makeShellScript "pia-stop" "sudo systemctl stop openvpn-$1.service";
pia-list = makeShellScript "pia-list" "ls /etc/systemd/system/ | awk '/openvpn/ {gsub(/openvpn-|.service/, \"\"); print}'";
pia-search = makeShellScript "pia-search" "${
lib.getExe self.packages.${system}.pia-list
} | ${lib.getExe pkgs.fzf}";
};
nixosModules.default =
{ config, ... }:
{
options.services.pia = {
enable = nixpkgs.lib.mkOption {
default = false;
type = nixpkgs.lib.types.bool;
};
authUserPass = {
username = nixpkgs.lib.mkOption {
default = false;
type = nixpkgs.lib.types.str;
};
password = nixpkgs.lib.mkOption {
default = false;
type = nixpkgs.lib.types.str;
};
};
};
config = nixpkgs.lib.mkIf config.services.pia.enable {
environment.systemPackages =
let
piaPackages = self.packages.${system};
in
[
piaPackages.pia-start
piaPackages.pia-stop
piaPackages.pia-list
piaPackages.pia-search
];
services.openvpn.servers =
let
resources = nixpkgs.legacyPackages.${system}.fetchzip {
name = "pia-vpn-config";
url = "https://www.privateinternetaccess.com/openvpn/openvpn.zip";
sha256 = "ZA8RS6eIjMVQfBt+9hYyhaq8LByy5oJaO9Ed+x8KtW8=";
stripRoot = false;
};
in
builtins.listToAttrs (
map
(name: {
name =
(builtins.replaceStrings
[
".ovpn"
"_"
]
[
""
"-"
]
)
name;
value = {
inherit (config.services.pia) authUserPass;
autoStart = false;
config = "config ${resources}/${name}";
updateResolvConf = true;
};
})
(
builtins.filter (name: (builtins.match ".+ovpn$" name) != null) (
builtins.attrNames (builtins.readDir resources)
)
)
);
};
};
}
);
}
|