nixpkgs/modules/services/networking/privoxy.nix
Rob Vermaas 0e2c160e2e added privoxy nixos module
svn path=/nixos/trunk/; revision=17646
2009-10-05 15:11:32 +00:00

104 lines
2 KiB
Nix

{pkgs, config, ...}:
let
inherit (pkgs.lib) mkOption mkIf singleton;
inherit (pkgs) privoxy;
stateDir = "/var/spool/privoxy";
privoxyUser = "privoxy";
modprobe = config.system.sbin.modprobe;
privoxyFlags = "--no-daemon ${privoxyCfg}";
privoxyCfg = pkgs.writeText "privoxy.conf" ''
listen-address ${config.services.privoxy.listenAddress}
logdir ${config.services.privoxy.logDir}
confdir ${privoxy}/etc
filterfile default.filter
${config.services.privoxy.extraConfig}
'';
in
{
###### interface
options = {
services.privoxy = {
enable = mkOption {
default = false;
description = ''
Whether to run the machine as a HTTP proxy server.
'';
};
listenAddress = mkOption {
default = "127.0.0.1:8118";
description = ''
Address the proxy server is listening to.
'';
};
logDir = mkOption {
default = "/var/log/privoxy" ;
description = ''
Location for privoxy log files.
'';
};
extraConfig = mkOption {
default = "" ;
description = ''
Extra configuration. Contents will be added verbatim to the configuration file.
'';
};
};
};
###### implementation
config = mkIf config.services.privoxy.enable {
environment.systemPackages = [ privoxy ];
users.extraUsers = singleton
{ name = privoxyUser;
uid = config.ids.uids.privoxy;
description = "privoxy daemon user";
home = stateDir;
};
jobs = singleton {
name = "privoxy";
startOn = "startup";
stopOn = "shutdown";
preStart = ''
mkdir -m 0755 -p ${stateDir}
chown ${privoxyUser} ${stateDir}
# Needed to run privoxy as an unprivileged user.
${modprobe}/sbin/modprobe capability || true
'';
script = ''
${privoxy}/sbin/privoxy ${privoxyFlags}
'';
};
};
}