mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-12-28 00:24:18 +00:00
96 lines
2.8 KiB
Nix
96 lines
2.8 KiB
Nix
|
{ config, lib, pkgs, ... }:
|
||
|
|
||
|
with lib;
|
||
|
|
||
|
let
|
||
|
cfg = config.services.knot;
|
||
|
|
||
|
configFile = pkgs.writeText "knot.conf" cfg.extraConfig;
|
||
|
socketFile = "/run/knot/knot.sock";
|
||
|
|
||
|
knotConfCheck = file: pkgs.runCommand "knot-config-checked"
|
||
|
{ buildInputs = [ cfg.package ]; } ''
|
||
|
ln -s ${configFile} $out
|
||
|
knotc --config=${configFile} conf-check
|
||
|
'';
|
||
|
|
||
|
knot-cli-wrappers = pkgs.stdenv.mkDerivation {
|
||
|
name = "knot-cli-wrappers";
|
||
|
buildInputs = [ pkgs.makeWrapper ];
|
||
|
buildCommand = ''
|
||
|
mkdir -p $out/bin
|
||
|
makeWrapper ${cfg.package}/bin/knotc "$out/bin/knotc" \
|
||
|
--add-flags "--config=${configFile}" \
|
||
|
--add-flags "--socket=${socketFile}"
|
||
|
makeWrapper ${cfg.package}/bin/keymgr "$out/bin/keymgr" \
|
||
|
--add-flags "--config=${configFile}"
|
||
|
for executable in kdig khost kjournalprint knsec3hash knsupdate kzonecheck
|
||
|
do
|
||
|
ln -s "${cfg.package}/bin/$executable" "$out/bin/$executable"
|
||
|
done
|
||
|
mkdir -p "$out/share"
|
||
|
ln -s '${cfg.package}/share/man' "$out/share/"
|
||
|
'';
|
||
|
};
|
||
|
in {
|
||
|
options = {
|
||
|
services.knot = {
|
||
|
enable = mkEnableOption "Knot authoritative-only DNS server";
|
||
|
|
||
|
extraArgs = mkOption {
|
||
|
type = types.listOf types.str;
|
||
|
default = [];
|
||
|
description = ''
|
||
|
List of additional command line paramters for knotd
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
extraConfig = mkOption {
|
||
|
type = types.lines;
|
||
|
default = "";
|
||
|
description = ''
|
||
|
Extra lines to be added verbatim to knot.conf
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
package = mkOption {
|
||
|
type = types.package;
|
||
|
default = pkgs.knot-dns;
|
||
|
description = ''
|
||
|
Which Knot DNS package to use
|
||
|
'';
|
||
|
};
|
||
|
};
|
||
|
};
|
||
|
|
||
|
config = mkIf config.services.knot.enable {
|
||
|
systemd.services.knot = {
|
||
|
unitConfig.Documentation = "man:knotd(8) man:knot.conf(5) man:knotc(8) https://www.knot-dns.cz/docs/${cfg.package.version}/html/";
|
||
|
description = cfg.package.meta.description;
|
||
|
wantedBy = [ "multi-user.target" ];
|
||
|
wants = [ "network.target" ];
|
||
|
after = ["network.target" ];
|
||
|
|
||
|
serviceConfig = {
|
||
|
Type = "notify";
|
||
|
ExecStart = "${cfg.package}/bin/knotd --config=${knotConfCheck configFile} --socket=${socketFile} ${concatStringsSep " " cfg.extraArgs}";
|
||
|
ExecReload = "${knot-cli-wrappers}/bin/knotc reload";
|
||
|
CapabilityBoundingSet = "CAP_NET_BIND_SERVICE CAP_SETPCAP";
|
||
|
AmbientCapabilities = "CAP_NET_BIND_SERVICE CAP_SETPCAP";
|
||
|
NoNewPrivileges = true;
|
||
|
DynamicUser = "yes";
|
||
|
RuntimeDirectory = "knot";
|
||
|
StateDirectory = "knot";
|
||
|
StateDirectoryMode = "0700";
|
||
|
PrivateDevices = true;
|
||
|
RestrictAddressFamilies = "AF_UNIX AF_INET AF_INET6";
|
||
|
SystemCallArchitectures = "native";
|
||
|
Restart = "on-abort";
|
||
|
};
|
||
|
};
|
||
|
|
||
|
environment.systemPackages = [ knot-cli-wrappers ];
|
||
|
};
|
||
|
}
|
||
|
|