nixpkgs/nixos/modules/services/networking/unbound.nix

142 lines
3.7 KiB
Nix
Raw Normal View History

{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.unbound;
stateDir = "/var/lib/unbound";
access = concatMapStringsSep "\n " (x: "access-control: ${x} allow") cfg.allowedAccess;
interfaces = concatMapStringsSep "\n " (x: "interface: ${x}") cfg.interfaces;
isLocalAddress = x: substring 0 3 x == "::1" || substring 0 9 x == "127.0.0.1";
forward =
optionalString (any isLocalAddress cfg.forwardAddresses) ''
do-not-query-localhost: no
'' +
optionalString (cfg.forwardAddresses != []) ''
forward-zone:
name: .
'' +
concatMapStringsSep "\n" (x: " forward-addr: ${x}") cfg.forwardAddresses;
rootTrustAnchorFile = "${stateDir}/root.key";
trustAnchor = optionalString cfg.enableRootTrustAnchor
"auto-trust-anchor-file: ${rootTrustAnchorFile}";
confFile = pkgs.writeText "unbound.conf" ''
server:
directory: "${stateDir}"
2014-08-27 03:24:09 +02:00
username: unbound
chroot: "${stateDir}"
2014-08-27 03:24:09 +02:00
pidfile: ""
${interfaces}
${access}
${trustAnchor}
${cfg.extraConfig}
2014-08-27 03:24:09 +02:00
${forward}
'';
in
{
###### interface
options = {
services.unbound = {
2016-08-30 19:28:30 +02:00
enable = mkEnableOption "Unbound domain name server";
allowedAccess = mkOption {
2016-08-30 19:30:28 +02:00
default = [ "127.0.0.0/24" ];
2016-02-15 03:37:45 +01:00
type = types.listOf types.str;
2016-02-07 18:40:15 +01:00
description = "What networks are allowed to use unbound as a resolver.";
};
interfaces = mkOption {
2018-06-12 14:29:25 +02:00
default = [ "127.0.0.1" ] ++ optional config.networking.enableIPv6 "::1";
2016-02-15 03:37:45 +01:00
type = types.listOf types.str;
2016-02-07 18:40:15 +01:00
description = "What addresses the server should listen on.";
};
forwardAddresses = mkOption {
2016-02-07 18:40:15 +01:00
default = [ ];
2016-02-15 03:37:45 +01:00
type = types.listOf types.str;
2016-02-07 18:40:15 +01:00
description = "What servers to forward queries to.";
};
enableRootTrustAnchor = mkOption {
default = true;
type = types.bool;
description = "Use and update root trust anchor for DNSSEC validation.";
};
extraConfig = mkOption {
2016-02-07 18:40:15 +01:00
default = "";
2016-10-23 19:33:41 +02:00
type = types.lines;
description = ''
Extra unbound config. See
<citerefentry><refentrytitle>unbound.conf</refentrytitle><manvolnum>8
</manvolnum></citerefentry>.
'';
};
};
};
###### implementation
config = mkIf cfg.enable {
environment.systemPackages = [ pkgs.unbound ];
users.users.unbound = {
description = "unbound daemon user";
isSystemUser = true;
};
networking.resolvconf.useLocalResolver = mkDefault true;
systemd.services.unbound = {
2016-08-30 19:30:28 +02:00
description = "Unbound recursive Domain Name Server";
after = [ "network.target" ];
before = [ "nss-lookup.target" ];
2017-10-10 22:08:36 +02:00
wants = [ "nss-lookup.target" ];
wantedBy = [ "multi-user.target" ];
2014-08-27 03:24:09 +02:00
preStart = ''
mkdir -m 0755 -p ${stateDir}/dev/
2016-02-07 18:40:15 +01:00
cp ${confFile} ${stateDir}/unbound.conf
${optionalString cfg.enableRootTrustAnchor ''
2018-06-12 14:29:25 +02:00
${pkgs.unbound}/bin/unbound-anchor -a ${rootTrustAnchorFile} || echo "Root anchor updated!"
chown unbound ${stateDir} ${rootTrustAnchorFile}
''}
2016-02-07 18:40:15 +01:00
touch ${stateDir}/dev/random
${pkgs.utillinux}/bin/mount --bind -n /dev/urandom ${stateDir}/dev/random
2014-08-27 03:24:09 +02:00
'';
serviceConfig = {
2016-03-06 13:50:41 +01:00
ExecStart = "${pkgs.unbound}/bin/unbound -d -c ${stateDir}/unbound.conf";
2014-08-27 03:24:09 +02:00
ExecStopPost="${pkgs.utillinux}/bin/umount ${stateDir}/dev/random";
ProtectSystem = true;
ProtectHome = true;
PrivateDevices = true;
2018-06-12 14:29:25 +02:00
Restart = "always";
RestartSec = "5s";
2014-08-27 03:24:09 +02:00
};
};
# If networkmanager is enabled, ask it to interface with unbound.
networking.networkmanager.dns = "unbound";
};
}