3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/nixos/modules/services/networking/unbound.nix

124 lines
3 KiB
Nix
Raw Normal View History

{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.unbound;
stateDir = "/var/lib/unbound";
access = concatMapStrings (x: " access-control: ${x} allow\n") cfg.allowedAccess;
interfaces = concatMapStrings (x: " interface: ${x}\n") cfg.interfaces;
forward = optionalString (length cfg.forwardAddresses != 0)
"forward-zone:\n name: .\n" +
concatMapStrings (x: " forward-addr: ${x}\n") cfg.forwardAddresses;
rootTrustAnchorFile = "${stateDir}/root.key";
trustAnchor = optionalString cfg.enableRootTrustAnchor
"auto-trust-anchor-file: ${rootTrustAnchorFile}";
confFile = pkgs.writeText "unbound.conf" ''
server:
directory: "${stateDir}"
2014-08-27 02:24:09 +01:00
username: unbound
chroot: "${stateDir}"
2014-08-27 02:24:09 +01:00
pidfile: ""
${interfaces}
${access}
${trustAnchor}
${cfg.extraConfig}
2014-08-27 02:24:09 +01:00
${forward}
'';
in
{
###### interface
options = {
services.unbound = {
enable = mkOption {
2016-02-07 17:40:15 +00:00
default = false;
2016-02-15 02:37:45 +00:00
type = types.bool;
2016-02-07 17:40:15 +00:00
description = "Whether to enable the Unbound domain name server.";
};
allowedAccess = mkOption {
2016-02-07 17:40:15 +00:00
default = ["127.0.0.0/24"];
2016-02-15 02:37:45 +00:00
type = types.listOf types.str;
2016-02-07 17:40:15 +00:00
description = "What networks are allowed to use unbound as a resolver.";
};
interfaces = mkOption {
2016-02-07 17:40:15 +00:00
default = [ "127.0.0.1" "::1" ];
2016-02-15 02:37:45 +00:00
type = types.listOf types.str;
2016-02-07 17:40:15 +00:00
description = "What addresses the server should listen on.";
};
forwardAddresses = mkOption {
2016-02-07 17:40:15 +00:00
default = [ ];
2016-02-15 02:37:45 +00:00
type = types.listOf types.str;
2016-02-07 17:40:15 +00:00
description = "What servers to forward queries to.";
};
enableRootTrustAnchor = mkOption {
default = true;
type = types.bool;
description = "Use and update root trust anchor for DNSSEC validation.";
};
extraConfig = mkOption {
2016-02-07 17:40:15 +00:00
default = "";
2016-02-15 02:37:45 +00:00
type = types.str;
2016-02-07 17:40:15 +00:00
description = "Extra lines of unbound config.";
};
};
};
###### implementation
config = mkIf cfg.enable {
environment.systemPackages = [ pkgs.unbound ];
users.extraUsers = singleton {
2014-08-27 02:24:09 +01:00
name = "unbound";
uid = config.ids.uids.unbound;
description = "unbound daemon user";
home = stateDir;
createHome = true;
};
systemd.services.unbound = {
description="Unbound recursive Domain Name Server";
after = [ "network.target" ];
before = [ "nss-lookup.target" ];
wants = [" nss-lookup.target" ];
wantedBy = [ "multi-user.target" ];
2014-08-27 02:24:09 +01:00
preStart = ''
mkdir -m 0755 -p ${stateDir}/dev/
2016-02-07 17:40:15 +00:00
cp ${confFile} ${stateDir}/unbound.conf
${pkgs.unbound}/bin/unbound-anchor -a ${rootTrustAnchorFile}
chown unbound ${stateDir} ${rootTrustAnchorFile}
2016-02-07 17:40:15 +00:00
touch ${stateDir}/dev/random
2014-08-27 02:24:09 +01:00
${pkgs.utillinux}/bin/mount --bind -n /dev/random ${stateDir}/dev/random
'';
serviceConfig = {
ExecStart = "${pkgs.unbound}/sbin/unbound -d -c ${stateDir}/unbound.conf";
ExecStopPost="${pkgs.utillinux}/bin/umount ${stateDir}/dev/random";
};
};
};
}