2019-01-27 09:55:33 +00:00
|
|
|
{ config, lib, pkgs, utils, ... }:
|
2009-10-12 18:27:57 +01:00
|
|
|
|
2014-04-14 15:26:48 +01:00
|
|
|
with lib;
|
2009-07-16 22:08:32 +01:00
|
|
|
|
|
|
|
let
|
2012-04-01 11:54:10 +01:00
|
|
|
cfg = config.networking.wireless;
|
2020-07-25 13:15:20 +01:00
|
|
|
configFile = if cfg.networks != {} || cfg.extraConfig != "" || cfg.userControlled.enable then pkgs.writeText "wpa_supplicant.conf" ''
|
2015-12-29 10:21:38 +00:00
|
|
|
${optionalString cfg.userControlled.enable ''
|
2019-03-24 20:14:15 +00:00
|
|
|
ctrl_interface=DIR=/run/wpa_supplicant GROUP=${cfg.userControlled.group}
|
2015-12-29 10:21:38 +00:00
|
|
|
update_config=1''}
|
2018-08-08 04:07:13 +01:00
|
|
|
${cfg.extraConfig}
|
2017-10-17 10:14:44 +01:00
|
|
|
${concatStringsSep "\n" (mapAttrsToList (ssid: config: with config; let
|
|
|
|
key = if psk != null
|
|
|
|
then ''"${psk}"''
|
|
|
|
else pskRaw;
|
|
|
|
baseAuth = if key != null
|
2021-01-24 09:19:10 +00:00
|
|
|
then "psk=${key}"
|
|
|
|
else "key_mgmt=NONE";
|
2016-02-09 15:53:11 +00:00
|
|
|
in ''
|
2015-12-29 10:21:38 +00:00
|
|
|
network={
|
|
|
|
ssid="${ssid}"
|
2017-01-07 12:19:32 +00:00
|
|
|
${optionalString (priority != null) ''priority=${toString priority}''}
|
2017-10-17 10:14:44 +01:00
|
|
|
${optionalString hidden "scan_ssid=1"}
|
|
|
|
${if (auth != null) then auth else baseAuth}
|
|
|
|
${extraConfig}
|
2015-12-29 10:21:38 +00:00
|
|
|
}
|
|
|
|
'') cfg.networks)}
|
|
|
|
'' else "/etc/wpa_supplicant.conf";
|
2015-12-26 01:12:32 +00:00
|
|
|
in {
|
2009-07-16 22:08:32 +01:00
|
|
|
options = {
|
2012-04-01 11:54:10 +01:00
|
|
|
networking.wireless = {
|
2015-12-29 10:21:38 +00:00
|
|
|
enable = mkEnableOption "wpa_supplicant";
|
2012-04-01 11:54:10 +01:00
|
|
|
|
|
|
|
interfaces = mkOption {
|
2015-06-15 17:18:46 +01:00
|
|
|
type = types.listOf types.str;
|
2012-04-01 11:54:10 +01:00
|
|
|
default = [];
|
|
|
|
example = [ "wlan0" "wlan1" ];
|
|
|
|
description = ''
|
2015-12-29 10:21:38 +00:00
|
|
|
The interfaces <command>wpa_supplicant</command> will use. If empty, it will
|
2014-04-24 17:16:12 +01:00
|
|
|
automatically use all wireless interfaces.
|
2012-04-01 11:54:10 +01:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
driver = mkOption {
|
2013-10-30 10:02:04 +00:00
|
|
|
type = types.str;
|
2013-01-22 11:32:19 +00:00
|
|
|
default = "nl80211,wext";
|
2012-11-02 16:05:30 +00:00
|
|
|
description = "Force a specific wpa_supplicant driver.";
|
2012-04-01 11:54:10 +01:00
|
|
|
};
|
2009-12-09 20:30:40 +00:00
|
|
|
|
2015-12-29 10:21:38 +00:00
|
|
|
networks = mkOption {
|
|
|
|
type = types.attrsOf (types.submodule {
|
|
|
|
options = {
|
|
|
|
psk = mkOption {
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
default = null;
|
|
|
|
description = ''
|
|
|
|
The network's pre-shared key in plaintext defaulting
|
|
|
|
to being a network without any authentication.
|
2016-01-06 03:57:25 +00:00
|
|
|
|
|
|
|
Be aware that these will be written to the nix store
|
|
|
|
in plaintext!
|
2016-02-09 15:53:11 +00:00
|
|
|
|
|
|
|
Mutually exclusive with <varname>pskRaw</varname>.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
pskRaw = mkOption {
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
default = null;
|
|
|
|
description = ''
|
|
|
|
The network's pre-shared key in hex defaulting
|
|
|
|
to being a network without any authentication.
|
|
|
|
|
|
|
|
Mutually exclusive with <varname>psk</varname>.
|
2015-12-29 10:21:38 +00:00
|
|
|
'';
|
|
|
|
};
|
2017-10-17 10:14:44 +01:00
|
|
|
|
|
|
|
auth = mkOption {
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
default = null;
|
|
|
|
example = ''
|
|
|
|
key_mgmt=WPA-EAP
|
|
|
|
eap=PEAP
|
|
|
|
identity="user@example.com"
|
|
|
|
password="secret"
|
|
|
|
'';
|
|
|
|
description = ''
|
|
|
|
Use this option to configure advanced authentication methods like EAP.
|
2019-02-10 12:08:54 +00:00
|
|
|
See
|
|
|
|
<citerefentry>
|
|
|
|
<refentrytitle>wpa_supplicant.conf</refentrytitle>
|
|
|
|
<manvolnum>5</manvolnum>
|
|
|
|
</citerefentry>
|
|
|
|
for example configurations.
|
2017-10-17 10:14:44 +01:00
|
|
|
|
|
|
|
Mutually exclusive with <varname>psk</varname> and <varname>pskRaw</varname>.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
hidden = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description = ''
|
|
|
|
Set this to <literal>true</literal> if the SSID of the network is hidden.
|
|
|
|
'';
|
2019-08-14 23:29:13 +01:00
|
|
|
example = literalExample ''
|
|
|
|
{ echelon = {
|
|
|
|
hidden = true;
|
|
|
|
psk = "abcdefgh";
|
|
|
|
};
|
|
|
|
}
|
|
|
|
'';
|
2017-10-17 10:14:44 +01:00
|
|
|
};
|
|
|
|
|
2017-01-07 12:19:32 +00:00
|
|
|
priority = mkOption {
|
|
|
|
type = types.nullOr types.int;
|
|
|
|
default = null;
|
|
|
|
description = ''
|
|
|
|
By default, all networks will get same priority group (0). If some of the
|
|
|
|
networks are more desirable, this field can be used to change the order in
|
|
|
|
which wpa_supplicant goes through the networks when selecting a BSS. The
|
|
|
|
priority groups will be iterated in decreasing priority (i.e., the larger the
|
|
|
|
priority value, the sooner the network is matched against the scan results).
|
|
|
|
Within each priority group, networks will be selected based on security
|
|
|
|
policy, signal strength, etc.
|
|
|
|
'';
|
|
|
|
};
|
2017-10-17 10:14:44 +01:00
|
|
|
|
|
|
|
extraConfig = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "";
|
|
|
|
example = ''
|
|
|
|
bssid_blacklist=02:11:22:33:44:55 02:22:aa:44:55:66
|
|
|
|
'';
|
|
|
|
description = ''
|
|
|
|
Extra configuration lines appended to the network block.
|
2019-02-10 12:08:54 +00:00
|
|
|
See
|
|
|
|
<citerefentry>
|
|
|
|
<refentrytitle>wpa_supplicant.conf</refentrytitle>
|
|
|
|
<manvolnum>5</manvolnum>
|
|
|
|
</citerefentry>
|
|
|
|
for available options.
|
2017-10-17 10:14:44 +01:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2015-12-29 10:21:38 +00:00
|
|
|
};
|
|
|
|
});
|
|
|
|
description = ''
|
|
|
|
The network definitions to automatically connect to when
|
|
|
|
<command>wpa_supplicant</command> is running. If this
|
|
|
|
parameter is left empty wpa_supplicant will use
|
|
|
|
/etc/wpa_supplicant.conf as the configuration file.
|
|
|
|
'';
|
|
|
|
default = {};
|
|
|
|
example = literalExample ''
|
2019-08-14 23:29:13 +01:00
|
|
|
{ echelon = { # SSID with no spaces or special characters
|
2016-02-29 00:47:12 +00:00
|
|
|
psk = "abcdefgh";
|
|
|
|
};
|
2019-08-14 23:29:13 +01:00
|
|
|
"echelon's AP" = { # SSID with spaces and/or special characters
|
|
|
|
psk = "ijklmnop";
|
|
|
|
};
|
|
|
|
"free.wifi" = {}; # Public wireless network
|
2016-02-29 00:47:12 +00:00
|
|
|
}
|
2015-12-29 10:21:38 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2012-04-01 11:54:10 +01:00
|
|
|
userControlled = {
|
|
|
|
enable = mkOption {
|
2013-10-29 12:04:26 +00:00
|
|
|
type = types.bool;
|
2012-04-01 11:54:10 +01:00
|
|
|
default = false;
|
|
|
|
description = ''
|
|
|
|
Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli.
|
2015-02-17 21:14:29 +00:00
|
|
|
This is useful for laptop users that switch networks a lot and don't want
|
|
|
|
to depend on a large package such as NetworkManager just to pick nearby
|
|
|
|
access points.
|
2012-04-01 11:54:10 +01:00
|
|
|
|
2015-12-29 10:21:38 +00:00
|
|
|
When using a declarative network specification you cannot persist any
|
|
|
|
settings via wpa_gui or wpa_cli.
|
2012-04-01 11:54:10 +01:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
group = mkOption {
|
2013-10-30 10:02:04 +00:00
|
|
|
type = types.str;
|
2012-04-01 11:54:10 +01:00
|
|
|
default = "wheel";
|
|
|
|
example = "network";
|
2012-11-02 16:05:30 +00:00
|
|
|
description = "Members of this group can control wpa_supplicant.";
|
2012-04-01 11:54:10 +01:00
|
|
|
};
|
|
|
|
};
|
2018-08-08 04:07:13 +01:00
|
|
|
extraConfig = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "";
|
|
|
|
example = ''
|
|
|
|
p2p_disabled=1
|
|
|
|
'';
|
|
|
|
description = ''
|
|
|
|
Extra lines appended to the configuration file.
|
2019-02-10 12:08:54 +00:00
|
|
|
See
|
|
|
|
<citerefentry>
|
|
|
|
<refentrytitle>wpa_supplicant.conf</refentrytitle>
|
|
|
|
<manvolnum>5</manvolnum>
|
|
|
|
</citerefentry>
|
|
|
|
for available options.
|
2018-08-08 04:07:13 +01:00
|
|
|
'';
|
|
|
|
};
|
2012-04-01 11:54:10 +01:00
|
|
|
};
|
2009-07-16 22:08:32 +01:00
|
|
|
};
|
|
|
|
|
2016-05-09 06:53:27 +01:00
|
|
|
config = mkIf cfg.enable {
|
|
|
|
assertions = flip mapAttrsToList cfg.networks (name: cfg: {
|
2017-10-17 10:14:44 +01:00
|
|
|
assertion = with cfg; count (x: x != null) [ psk pskRaw auth ] <= 1;
|
|
|
|
message = ''options networking.wireless."${name}".{psk,pskRaw,auth} are mutually exclusive'';
|
2016-05-09 06:53:27 +01:00
|
|
|
});
|
|
|
|
|
|
|
|
environment.systemPackages = [ pkgs.wpa_supplicant ];
|
|
|
|
|
|
|
|
services.dbus.packages = [ pkgs.wpa_supplicant ];
|
2019-07-28 22:08:43 +01:00
|
|
|
services.udev.packages = [ pkgs.crda ];
|
2016-05-09 06:53:27 +01:00
|
|
|
|
|
|
|
# FIXME: start a separate wpa_supplicant instance per interface.
|
|
|
|
systemd.services.wpa_supplicant = let
|
|
|
|
ifaces = cfg.interfaces;
|
2019-01-27 09:55:33 +00:00
|
|
|
deviceUnit = interface: [ "sys-subsystem-net-devices-${utils.escapeSystemdPath interface}.device" ];
|
2016-05-09 06:53:27 +01:00
|
|
|
in {
|
|
|
|
description = "WPA Supplicant";
|
|
|
|
|
2016-10-18 23:09:49 +01:00
|
|
|
after = lib.concatMap deviceUnit ifaces;
|
|
|
|
before = [ "network.target" ];
|
|
|
|
wants = [ "network.target" ];
|
2016-05-09 06:53:27 +01:00
|
|
|
requires = lib.concatMap deviceUnit ifaces;
|
2016-10-18 23:09:49 +01:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
2017-09-27 22:20:08 +01:00
|
|
|
stopIfChanged = false;
|
2016-05-09 06:53:27 +01:00
|
|
|
|
|
|
|
path = [ pkgs.wpa_supplicant ];
|
|
|
|
|
|
|
|
script = ''
|
2020-12-22 09:17:32 +00:00
|
|
|
if [ -f /etc/wpa_supplicant.conf -a "/etc/wpa_supplicant.conf" != "${configFile}" ]
|
|
|
|
then echo >&2 "<3>/etc/wpa_supplicant.conf present but ignored. Generated ${configFile} is used instead."
|
2020-08-25 11:03:29 +01:00
|
|
|
fi
|
2021-02-19 18:56:19 +00:00
|
|
|
iface_args="-s -u -D${cfg.driver} -c /etc/wpa_supplicant.conf -I ${configFile}"
|
2016-05-09 06:53:27 +01:00
|
|
|
${if ifaces == [] then ''
|
|
|
|
for i in $(cd /sys/class/net && echo *); do
|
|
|
|
DEVTYPE=
|
2019-11-12 16:53:29 +00:00
|
|
|
UEVENT_PATH=/sys/class/net/$i/uevent
|
|
|
|
if [ -e "$UEVENT_PATH" ]; then
|
|
|
|
source "$UEVENT_PATH"
|
|
|
|
if [ "$DEVTYPE" = "wlan" -o -e /sys/class/net/$i/wireless ]; then
|
2020-01-12 12:28:50 +00:00
|
|
|
args+="''${args:+ -N} -i$i $iface_args"
|
2019-11-12 16:53:29 +00:00
|
|
|
fi
|
2016-05-09 06:53:27 +01:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
'' else ''
|
2020-01-12 12:28:50 +00:00
|
|
|
args="${concatMapStringsSep " -N " (i: "-i${i} $iface_args") ifaces}"
|
2016-05-09 06:53:27 +01:00
|
|
|
''}
|
2020-01-12 12:28:50 +00:00
|
|
|
exec wpa_supplicant $args
|
2012-02-19 22:53:25 +00:00
|
|
|
'';
|
2016-05-09 06:53:27 +01:00
|
|
|
};
|
2012-02-19 22:53:25 +00:00
|
|
|
|
2016-05-09 06:53:27 +01:00
|
|
|
powerManagement.resumeCommands = ''
|
2020-05-21 09:31:08 +01:00
|
|
|
/run/current-system/systemd/bin/systemctl try-restart wpa_supplicant
|
2016-05-09 06:53:27 +01:00
|
|
|
'';
|
|
|
|
|
|
|
|
# Restart wpa_supplicant when a wlan device appears or disappears.
|
|
|
|
services.udev.extraRules = ''
|
2020-12-22 09:17:32 +00:00
|
|
|
ACTION=="add|remove", SUBSYSTEM=="net", ENV{DEVTYPE}=="wlan", RUN+="/run/current-system/systemd/bin/systemctl try-restart wpa_supplicant.service"
|
2016-05-09 06:53:27 +01:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
meta.maintainers = with lib.maintainers; [ globin ];
|
2009-07-16 22:08:32 +01:00
|
|
|
}
|