3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/nixos/modules/services/networking/powerdns.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

68 lines
2.1 KiB
Nix
Raw Normal View History

2016-09-17 22:30:27 +01:00
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.powerdns;
configDir = pkgs.writeTextDir "pdns.conf" "${cfg.extraConfig}";
2022-12-26 01:01:03 +00:00
finalConfigDir = if cfg.secretFile == null then configDir else "/run/pdns";
2016-09-17 22:30:27 +01:00
in {
options = {
services.powerdns = {
enable = mkEnableOption (lib.mdDoc "PowerDNS domain name server");
2016-09-17 22:30:27 +01:00
extraConfig = mkOption {
type = types.lines;
default = "launch=bind";
description = lib.mdDoc ''
PowerDNS configuration. Refer to
<https://doc.powerdns.com/authoritative/settings.html>
for details on supported values.
2016-09-17 22:30:27 +01:00
'';
};
2022-12-26 01:01:03 +00:00
secretFile = mkOption {
type = types.nullOr types.path;
default = null;
example = "/run/keys/powerdns.env";
description = lib.mdDoc ''
Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: `$ENVIRONMENT`
or `''${VARIABLE}`.
The file should contain lines formatted as `SECRET_VAR=SECRET_VALUE`.
This is useful to avoid putting secrets into the nix store.
'';
};
2016-09-17 22:30:27 +01:00
};
};
config = mkIf cfg.enable {
systemd.packages = [ pkgs.pdns ];
2016-09-17 22:30:27 +01:00
systemd.services.pdns = {
wantedBy = [ "multi-user.target" ];
after = [ "network.target" "mysql.service" "postgresql.service" "openldap.service" ];
2016-09-17 22:30:27 +01:00
serviceConfig = {
2022-12-26 01:01:03 +00:00
EnvironmentFile = lib.optional (cfg.secretFile != null) cfg.secretFile;
ExecStartPre = lib.optional (cfg.secretFile != null)
(pkgs.writeShellScript "pdns-pre-start" ''
umask 077
${pkgs.envsubst}/bin/envsubst -i "${configDir}/pdns.conf" > ${finalConfigDir}/pdns.conf
'');
ExecStart = [ "" "${pkgs.pdns}/bin/pdns_server --config-dir=${finalConfigDir} --guardian=no --daemon=no --disable-syslog --log-timestamp=no --write-pid=no" ];
2016-09-17 22:30:27 +01:00
};
};
users.users.pdns = {
isSystemUser = true;
group = "pdns";
description = "PowerDNS";
};
users.groups.pdns = {};
2016-09-17 22:30:27 +01:00
};
}