mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-24 16:03:23 +00:00
6afb255d97
these changes were generated with nixq 0.0.2, by running nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix two mentions of the mdDoc function remain in nixos/, both of which are inside of comments. Since lib.mdDoc is already defined as just id, this commit is a no-op as far as Nix (and the built manual) is concerned.
187 lines
5.2 KiB
Nix
187 lines
5.2 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.dnsdist;
|
|
|
|
toLua = lib.generators.toLua {};
|
|
|
|
mkBind = cfg: toLua "${cfg.listenAddress}:${toString cfg.listenPort}";
|
|
|
|
configFile = pkgs.writeText "dnsdist.conf" ''
|
|
setLocal(${mkBind cfg})
|
|
${lib.optionalString cfg.dnscrypt.enable dnscryptSetup}
|
|
${cfg.extraConfig}
|
|
'';
|
|
|
|
dnscryptSetup = ''
|
|
last_rotation = 0
|
|
cert_serial = 0
|
|
provider_key = ${toLua cfg.dnscrypt.providerKey}
|
|
cert_lifetime = ${toLua cfg.dnscrypt.certLifetime} * 60
|
|
|
|
function file_exists(name)
|
|
local f = io.open(name, "r")
|
|
return f ~= nil and io.close(f)
|
|
end
|
|
|
|
function dnscrypt_setup()
|
|
-- generate provider keys on first run
|
|
if provider_key == nil then
|
|
provider_key = "/var/lib/dnsdist/private.key"
|
|
if not file_exists(provider_key) then
|
|
generateDNSCryptProviderKeys("/var/lib/dnsdist/public.key",
|
|
"/var/lib/dnsdist/private.key")
|
|
print("DNSCrypt: generated provider keypair")
|
|
end
|
|
end
|
|
|
|
-- generate resolver certificate
|
|
local now = os.time()
|
|
generateDNSCryptCertificate(
|
|
provider_key, "/run/dnsdist/resolver.cert", "/run/dnsdist/resolver.key",
|
|
cert_serial, now - 60, now + cert_lifetime)
|
|
addDNSCryptBind(
|
|
${mkBind cfg.dnscrypt}, ${toLua cfg.dnscrypt.providerName},
|
|
"/run/dnsdist/resolver.cert", "/run/dnsdist/resolver.key")
|
|
end
|
|
|
|
function maintenance()
|
|
-- certificate rotation
|
|
local now = os.time()
|
|
local dnscrypt = getDNSCryptBind(0)
|
|
|
|
if ((now - last_rotation) > 0.9 * cert_lifetime) then
|
|
-- generate and start using a new certificate
|
|
dnscrypt:generateAndLoadInMemoryCertificate(
|
|
provider_key, cert_serial + 1,
|
|
now - 60, now + cert_lifetime)
|
|
|
|
-- stop advertising the last certificate
|
|
dnscrypt:markInactive(cert_serial)
|
|
|
|
-- remove the second to last certificate
|
|
if (cert_serial > 1) then
|
|
dnscrypt:removeInactiveCertificate(cert_serial - 1)
|
|
end
|
|
|
|
print("DNSCrypt: rotated certificate")
|
|
|
|
-- increment serial number
|
|
cert_serial = cert_serial + 1
|
|
last_rotation = now
|
|
end
|
|
end
|
|
|
|
dnscrypt_setup()
|
|
'';
|
|
|
|
in {
|
|
options = {
|
|
services.dnsdist = {
|
|
enable = mkEnableOption "dnsdist domain name server";
|
|
|
|
listenAddress = mkOption {
|
|
type = types.str;
|
|
description = "Listen IP address";
|
|
default = "0.0.0.0";
|
|
};
|
|
listenPort = mkOption {
|
|
type = types.port;
|
|
description = "Listen port";
|
|
default = 53;
|
|
};
|
|
|
|
dnscrypt = {
|
|
enable = mkEnableOption "a DNSCrypt endpoint to dnsdist";
|
|
|
|
listenAddress = mkOption {
|
|
type = types.str;
|
|
description = "Listen IP address of the endpoint";
|
|
default = "0.0.0.0";
|
|
};
|
|
|
|
listenPort = mkOption {
|
|
type = types.port;
|
|
description = "Listen port of the endpoint";
|
|
default = 443;
|
|
};
|
|
|
|
providerName = mkOption {
|
|
type = types.str;
|
|
default = "2.dnscrypt-cert.${config.networking.hostName}";
|
|
defaultText = literalExpression "2.dnscrypt-cert.\${config.networking.hostName}";
|
|
example = "2.dnscrypt-cert.myresolver";
|
|
description = ''
|
|
The name that will be given to this DNSCrypt resolver.
|
|
|
|
::: {.note}
|
|
The provider name must start with `2.dnscrypt-cert.`.
|
|
:::
|
|
'';
|
|
};
|
|
|
|
providerKey = mkOption {
|
|
type = types.nullOr types.path;
|
|
default = null;
|
|
description = ''
|
|
The filepath to the provider secret key.
|
|
If not given a new provider key pair will be generated in
|
|
/var/lib/dnsdist on the first run.
|
|
|
|
::: {.note}
|
|
The file must be readable by the dnsdist user/group.
|
|
:::
|
|
'';
|
|
};
|
|
|
|
certLifetime = mkOption {
|
|
type = types.ints.positive;
|
|
default = 15;
|
|
description = ''
|
|
The lifetime (in minutes) of the resolver certificate.
|
|
This will be automatically rotated before expiration.
|
|
'';
|
|
};
|
|
|
|
};
|
|
|
|
extraConfig = mkOption {
|
|
type = types.lines;
|
|
default = "";
|
|
description = ''
|
|
Extra lines to be added verbatim to dnsdist.conf.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
users.users.dnsdist = {
|
|
description = "dnsdist daemons user";
|
|
isSystemUser = true;
|
|
group = "dnsdist";
|
|
};
|
|
|
|
users.groups.dnsdist = {};
|
|
|
|
systemd.packages = [ pkgs.dnsdist ];
|
|
|
|
systemd.services.dnsdist = {
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
startLimitIntervalSec = 0;
|
|
serviceConfig = {
|
|
User = "dnsdist";
|
|
Group = "dnsdist";
|
|
RuntimeDirectory = "dnsdist";
|
|
StateDirectory = "dnsdist";
|
|
# upstream overrides for better nixos compatibility
|
|
ExecStartPre = [ "" "${pkgs.dnsdist}/bin/dnsdist --check-config --config ${configFile}" ];
|
|
ExecStart = [ "" "${pkgs.dnsdist}/bin/dnsdist --supervised --disable-syslog --config ${configFile}" ];
|
|
};
|
|
};
|
|
};
|
|
}
|