2017-01-25 18:41:52 +01:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
2020-01-26 21:15:20 +01:00
|
|
|
|
2020-02-05 19:18:11 +01:00
|
|
|
cfg = config.services.kresd;
|
|
|
|
configFile = pkgs.writeText "kresd.conf" ''
|
|
|
|
${optionalString (cfg.listenDoH != []) "modules.load('http')"}
|
|
|
|
${cfg.extraConfig};
|
|
|
|
'';
|
2017-01-25 18:41:52 +01:00
|
|
|
|
2020-01-23 20:19:14 +01:00
|
|
|
package = pkgs.knot-resolver.override {
|
|
|
|
extraFeatures = cfg.listenDoH != [];
|
|
|
|
};
|
|
|
|
in {
|
2017-01-25 18:41:52 +01:00
|
|
|
meta.maintainers = [ maintainers.vcunat /* upstream developer */ ];
|
|
|
|
|
2019-12-16 23:06:27 +01:00
|
|
|
imports = [
|
|
|
|
(mkChangedOptionModule [ "services" "kresd" "interfaces" ] [ "services" "kresd" "listenPlain" ]
|
|
|
|
(config:
|
|
|
|
let value = getAttrFromPath [ "services" "kresd" "interfaces" ] config;
|
|
|
|
in map
|
|
|
|
(iface: if elem ":" (stringToCharacters iface) then "[${iface}]:53" else "${iface}:53") # Syntax depends on being IPv6 or IPv4.
|
|
|
|
value
|
|
|
|
)
|
|
|
|
)
|
|
|
|
];
|
|
|
|
|
2017-01-25 18:41:52 +01:00
|
|
|
###### interface
|
|
|
|
options.services.kresd = {
|
|
|
|
enable = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description = ''
|
|
|
|
Whether to enable knot-resolver domain name server.
|
|
|
|
DNSSEC validation is turned on by default.
|
2020-02-05 19:18:11 +01:00
|
|
|
You can run <literal>sudo nc -U /run/kresd/control</literal>
|
|
|
|
and give commands interactively to kresd.
|
2017-01-25 18:41:52 +01:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
extraConfig = mkOption {
|
|
|
|
type = types.lines;
|
|
|
|
default = "";
|
|
|
|
description = ''
|
|
|
|
Extra lines to be added verbatim to the generated configuration file.
|
|
|
|
'';
|
|
|
|
};
|
2020-02-05 19:18:11 +01:00
|
|
|
cacheDir = mkOption {
|
|
|
|
type = types.path;
|
|
|
|
default = "/var/cache/kresd";
|
|
|
|
description = ''
|
|
|
|
Directory for caches. They are intended to survive reboots.
|
|
|
|
'';
|
|
|
|
};
|
2019-12-16 23:06:27 +01:00
|
|
|
listenPlain = mkOption {
|
2017-01-25 18:41:52 +01:00
|
|
|
type = with types; listOf str;
|
2019-12-16 23:06:27 +01:00
|
|
|
default = [ "[::1]:53" "127.0.0.1:53" ];
|
2017-01-25 18:41:52 +01:00
|
|
|
description = ''
|
2019-12-16 23:06:27 +01:00
|
|
|
What addresses and ports the server should listen on.
|
|
|
|
For detailed syntax see ListenStream in man systemd.socket.
|
2017-01-25 18:41:52 +01:00
|
|
|
'';
|
|
|
|
};
|
2018-02-12 20:48:25 +01:00
|
|
|
listenTLS = mkOption {
|
|
|
|
type = with types; listOf str;
|
|
|
|
default = [];
|
|
|
|
example = [ "198.51.100.1:853" "[2001:db8::1]:853" "853" ];
|
|
|
|
description = ''
|
2019-12-16 23:06:27 +01:00
|
|
|
Addresses and ports on which kresd should provide DNS over TLS (see RFC 7858).
|
2018-02-12 20:48:25 +01:00
|
|
|
For detailed syntax see ListenStream in man systemd.socket.
|
|
|
|
'';
|
|
|
|
};
|
2020-01-23 20:19:14 +01:00
|
|
|
listenDoH = mkOption {
|
|
|
|
type = with types; listOf str;
|
|
|
|
default = [];
|
|
|
|
example = [ "198.51.100.1:443" "[2001:db8::1]:443" "443" ];
|
|
|
|
description = ''
|
2020-02-05 19:18:11 +01:00
|
|
|
Addresses and ports on which kresd should provide DNS over HTTPS (see RFC 7858).
|
2020-01-23 20:19:14 +01:00
|
|
|
For detailed syntax see ListenStream in man systemd.socket.
|
|
|
|
'';
|
|
|
|
};
|
2017-01-25 18:41:52 +01:00
|
|
|
# TODO: perhaps options for more common stuff like cache size or forwarding
|
|
|
|
};
|
|
|
|
|
|
|
|
###### implementation
|
|
|
|
config = mkIf cfg.enable {
|
2020-02-05 19:18:11 +01:00
|
|
|
environment.etc."kresd.conf".source = configFile; # not required
|
2017-01-25 18:41:52 +01:00
|
|
|
|
2020-02-05 19:18:11 +01:00
|
|
|
users.users.kresd =
|
|
|
|
{ uid = config.ids.uids.kresd;
|
|
|
|
group = "kresd";
|
2017-01-25 18:41:52 +01:00
|
|
|
description = "Knot-resolver daemon user";
|
|
|
|
};
|
2020-02-05 19:18:11 +01:00
|
|
|
users.groups.kresd.gid = config.ids.gids.kresd;
|
|
|
|
|
|
|
|
systemd.sockets.kresd = rec {
|
|
|
|
wantedBy = [ "sockets.target" ];
|
|
|
|
before = wantedBy;
|
|
|
|
listenStreams = cfg.listenPlain;
|
|
|
|
socketConfig = {
|
|
|
|
ListenDatagram = listenStreams;
|
|
|
|
FreeBind = true;
|
|
|
|
FileDescriptorName = "dns";
|
|
|
|
};
|
|
|
|
};
|
2017-01-25 18:41:52 +01:00
|
|
|
|
2020-02-05 19:18:11 +01:00
|
|
|
systemd.sockets.kresd-tls = mkIf (cfg.listenTLS != []) rec {
|
|
|
|
wantedBy = [ "sockets.target" ];
|
|
|
|
before = wantedBy;
|
|
|
|
partOf = [ "kresd.socket" ];
|
|
|
|
listenStreams = cfg.listenTLS;
|
|
|
|
socketConfig = {
|
|
|
|
FileDescriptorName = "tls";
|
|
|
|
FreeBind = true;
|
|
|
|
Service = "kresd.service";
|
|
|
|
};
|
|
|
|
};
|
2017-01-25 18:41:52 +01:00
|
|
|
|
2020-02-05 19:18:11 +01:00
|
|
|
systemd.sockets.kresd-doh = mkIf (cfg.listenDoH != []) rec {
|
|
|
|
wantedBy = [ "sockets.target" ];
|
|
|
|
before = wantedBy;
|
|
|
|
partOf = [ "kresd.socket" ];
|
|
|
|
listenStreams = cfg.listenDoH;
|
|
|
|
socketConfig = {
|
|
|
|
FileDescriptorName = "doh";
|
|
|
|
FreeBind = true;
|
|
|
|
Service = "kresd.service";
|
|
|
|
};
|
2018-02-12 20:48:25 +01:00
|
|
|
};
|
2020-02-05 19:18:11 +01:00
|
|
|
|
|
|
|
systemd.sockets.kresd-control = rec {
|
|
|
|
wantedBy = [ "sockets.target" ];
|
|
|
|
before = wantedBy;
|
|
|
|
partOf = [ "kresd.socket" ];
|
|
|
|
listenStreams = [ "/run/kresd/control" ];
|
|
|
|
socketConfig = {
|
|
|
|
FileDescriptorName = "control";
|
|
|
|
Service = "kresd.service";
|
|
|
|
SocketMode = "0660"; # only root user/group may connect and control kresd
|
|
|
|
};
|
2020-01-23 20:19:14 +01:00
|
|
|
};
|
|
|
|
|
2020-02-05 19:18:11 +01:00
|
|
|
systemd.tmpfiles.rules = [ "d '${cfg.cacheDir}' 0770 kresd kresd - -" ];
|
2017-01-25 18:41:52 +01:00
|
|
|
|
2020-02-05 19:18:11 +01:00
|
|
|
systemd.services.kresd = {
|
|
|
|
description = "Knot-resolver daemon";
|
|
|
|
|
|
|
|
serviceConfig = {
|
|
|
|
User = "kresd";
|
|
|
|
Type = "notify";
|
|
|
|
WorkingDirectory = cfg.cacheDir;
|
|
|
|
Restart = "on-failure";
|
|
|
|
Sockets = [ "kresd.socket" "kresd-control.socket" ]
|
|
|
|
++ optional (cfg.listenTLS != []) "kresd-tls.socket";
|
|
|
|
};
|
|
|
|
|
|
|
|
# Trust anchor goes from dns-root-data by default.
|
|
|
|
script = ''
|
|
|
|
exec '${package}/bin/kresd' --config '${configFile}' --forks=1
|
|
|
|
'';
|
|
|
|
|
|
|
|
requires = [ "kresd.socket" ];
|
|
|
|
};
|
2017-01-25 18:41:52 +01:00
|
|
|
};
|
|
|
|
}
|