nixpkgs/modules/services/networking/privoxy.nix
Peter Simons eb6e1310b8 strip trailing whitespace; no functional change
svn path=/nixos/trunk/; revision=29285
2011-09-14 18:20:50 +00:00

100 lines
1.9 KiB
Nix

{ config, pkgs, ... }:
with pkgs.lib;
let
inherit (pkgs) privoxy;
stateDir = "/var/spool/privoxy";
privoxyUser = "privoxy";
modprobe = config.system.sbin.modprobe;
privoxyFlags = "--no-daemon --user ${privoxyUser} ${privoxyCfg}";
privoxyCfg = pkgs.writeText "privoxy.conf" ''
listen-address ${config.services.privoxy.listenAddress}
logdir ${config.services.privoxy.logDir}
confdir ${privoxy}/etc
filterfile default.filter
${config.services.privoxy.extraConfig}
'';
in
{
###### interface
options = {
services.privoxy = {
enable = mkOption {
default = false;
description = ''
Whether to run the machine as a HTTP proxy server.
'';
};
listenAddress = mkOption {
default = "127.0.0.1:8118";
description = ''
Address the proxy server is listening to.
'';
};
logDir = mkOption {
default = "/var/log/privoxy" ;
description = ''
Location for privoxy log files.
'';
};
extraConfig = mkOption {
default = "" ;
description = ''
Extra configuration. Contents will be added verbatim to the configuration file.
'';
};
};
};
###### implementation
config = mkIf config.services.privoxy.enable {
environment.systemPackages = [ privoxy ];
users.extraUsers = singleton
{ name = privoxyUser;
uid = config.ids.uids.privoxy;
description = "privoxy daemon user";
home = stateDir;
};
jobs.privoxy =
{ name = "privoxy";
startOn = "startup";
preStart =
''
mkdir -m 0755 -p ${stateDir}
chown ${privoxyUser} ${stateDir}
# Needed to run privoxy as an unprivileged user.
${modprobe}/sbin/modprobe capability || true
'';
exec = "${privoxy}/sbin/privoxy ${privoxyFlags}";
};
};
}