mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-28 18:03:04 +00:00
87245df5d3
In much older versions, Stubby only supported debug logging, but that is no longer true, so support the fine-grained log level.
104 lines
3.2 KiB
Nix
104 lines
3.2 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.stubby;
|
|
settingsFormat = pkgs.formats.yaml { };
|
|
confFile = settingsFormat.generate "stubby.yml" cfg.settings;
|
|
in {
|
|
imports = [
|
|
(mkRemovedOptionModule [ "stubby" "debugLogging" ] "Use services.stubby.logLevel = \"debug\"; instead.")
|
|
] ++ map (x:
|
|
(mkRemovedOptionModule [ "services" "stubby" x ]
|
|
"Stubby configuration moved to services.stubby.settings.")) [
|
|
"authenticationMode"
|
|
"fallbackProtocols"
|
|
"idleTimeout"
|
|
"listenAddresses"
|
|
"queryPaddingBlocksize"
|
|
"roundRobinUpstreams"
|
|
"subnetPrivate"
|
|
"upstreamServers"
|
|
];
|
|
|
|
options = {
|
|
services.stubby = {
|
|
|
|
enable = mkEnableOption (lib.mdDoc "Stubby DNS resolver");
|
|
|
|
settings = mkOption {
|
|
type = types.attrsOf settingsFormat.type;
|
|
example = lib.literalExpression ''
|
|
pkgs.stubby.passthru.settingsExample // {
|
|
upstream_recursive_servers = [{
|
|
address_data = "158.64.1.29";
|
|
tls_auth_name = "kaitain.restena.lu";
|
|
tls_pubkey_pinset = [{
|
|
digest = "sha256";
|
|
value = "7ftvIkA+UeN/ktVkovd/7rPZ6mbkhVI7/8HnFJIiLa4=";
|
|
}];
|
|
}];
|
|
};
|
|
'';
|
|
description = lib.mdDoc ''
|
|
Content of the Stubby configuration file. All Stubby settings may be set or queried
|
|
here. The default settings are available at
|
|
`pkgs.stubby.passthru.settingsExample`. See
|
|
<https://dnsprivacy.org/wiki/display/DP/Configuring+Stubby>.
|
|
A list of the public recursive servers can be found here:
|
|
<https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Test+Servers>.
|
|
'';
|
|
};
|
|
|
|
logLevel = let
|
|
logLevels = {
|
|
emerg = 0;
|
|
alert = 1;
|
|
crit = 2;
|
|
error = 3;
|
|
warning = 4;
|
|
notice = 5;
|
|
info = 6;
|
|
debug = 7;
|
|
};
|
|
in mkOption {
|
|
default = null;
|
|
type = types.nullOr (types.enum (attrNames logLevels ++ attrValues logLevels));
|
|
apply = v: if isString v then logLevels.${v} else v;
|
|
description = lib.mdDoc "Log verbosity (syslog keyword or level).";
|
|
};
|
|
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
assertions = [{
|
|
assertion =
|
|
(cfg.settings.resolution_type or "") == "GETDNS_RESOLUTION_STUB";
|
|
message = ''
|
|
services.stubby.settings.resolution_type must be set to "GETDNS_RESOLUTION_STUB".
|
|
Is services.stubby.settings unset?
|
|
'';
|
|
}];
|
|
|
|
services.stubby.settings.appdata_dir = "/var/cache/stubby";
|
|
|
|
systemd.services.stubby = {
|
|
description = "Stubby local DNS resolver";
|
|
after = [ "network.target" ];
|
|
before = [ "nss-lookup.target" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
serviceConfig = {
|
|
Type = "notify";
|
|
AmbientCapabilities = "CAP_NET_BIND_SERVICE";
|
|
CapabilityBoundingSet = "CAP_NET_BIND_SERVICE";
|
|
ExecStart = "${pkgs.stubby}/bin/stubby -C ${confFile} ${optionalString (cfg.logLevel != null) "-v ${toString cfg.logLevel}"}";
|
|
DynamicUser = true;
|
|
CacheDirectory = "stubby";
|
|
};
|
|
};
|
|
};
|
|
}
|