nixos/technitium-dns-server: init module
This commit is contained in:
parent
921495ab81
commit
f126a02f2f
2 changed files with 110 additions and 0 deletions
|
@ -1139,6 +1139,7 @@
|
||||||
./services/networking/tayga.nix
|
./services/networking/tayga.nix
|
||||||
./services/networking/tcpcrypt.nix
|
./services/networking/tcpcrypt.nix
|
||||||
./services/networking/teamspeak3.nix
|
./services/networking/teamspeak3.nix
|
||||||
|
./services/networking/technitium-dns-server.nix
|
||||||
./services/networking/teleport.nix
|
./services/networking/teleport.nix
|
||||||
./services/networking/tetrd.nix
|
./services/networking/tetrd.nix
|
||||||
./services/networking/tftpd.nix
|
./services/networking/tftpd.nix
|
||||||
|
|
109
nixos/modules/services/networking/technitium-dns-server.nix
Normal file
109
nixos/modules/services/networking/technitium-dns-server.nix
Normal file
|
@ -0,0 +1,109 @@
|
||||||
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
|
||||||
|
let
|
||||||
|
cfg = config.services.technitium-dns-server;
|
||||||
|
stateDir = "/var/lib/technitium-dns-server";
|
||||||
|
inherit (lib)
|
||||||
|
mkEnableOption
|
||||||
|
mkPackageOption
|
||||||
|
mkOption
|
||||||
|
mkIf
|
||||||
|
types
|
||||||
|
;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options.services.technitium-dns-server = {
|
||||||
|
enable = mkEnableOption "Technitium DNS Server";
|
||||||
|
|
||||||
|
package = mkPackageOption pkgs "technitium-dns-server" { };
|
||||||
|
|
||||||
|
openFirewall = mkOption {
|
||||||
|
type = types.bool;
|
||||||
|
default = false;
|
||||||
|
description = ''
|
||||||
|
Whether to open ports in the firewall.
|
||||||
|
Standard ports are 53 (UDP and TCP, for DNS), 5380 and 53443 (TCP, HTTP and HTTPS for web interface).
|
||||||
|
Specify different or additional ports in options firewallUDPPorts and firewallTCPPorts if necessary.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
firewallUDPPorts = mkOption {
|
||||||
|
type = with types; listOf int;
|
||||||
|
default = [ 53 ];
|
||||||
|
description = ''
|
||||||
|
List of UDP ports to open in firewall.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
firewallTCPPorts = mkOption {
|
||||||
|
type = with types; listOf int;
|
||||||
|
default = [
|
||||||
|
53
|
||||||
|
5380 # web interface HTTP
|
||||||
|
53443 # web interface HTTPS
|
||||||
|
];
|
||||||
|
description = ''
|
||||||
|
List of TCP ports to open in firewall.
|
||||||
|
You might want to open ports 443 and 853 if you intend to use DNS over HTTPS or DNS over TLS.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = mkIf cfg.enable {
|
||||||
|
systemd.services.technitium-dns-server = {
|
||||||
|
description = "Technitium DNS Server";
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
after = [ "network.target" ];
|
||||||
|
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = "${cfg.package}/bin/technitium-dns-server ${stateDir}";
|
||||||
|
|
||||||
|
DynamicUser = true;
|
||||||
|
|
||||||
|
StateDirectory = "technitium-dns-server";
|
||||||
|
WorkingDirectory = stateDir;
|
||||||
|
BindPaths = stateDir;
|
||||||
|
|
||||||
|
Restart = "always";
|
||||||
|
RestartSec = 10;
|
||||||
|
TimeoutStopSec = 10;
|
||||||
|
KillSignal = "SIGINT";
|
||||||
|
|
||||||
|
# Harden the service
|
||||||
|
LockPersonality = true;
|
||||||
|
NoNewPrivileges = true;
|
||||||
|
PrivateDevices = true;
|
||||||
|
PrivateMounts = true;
|
||||||
|
PrivateTmp = true;
|
||||||
|
ProtectClock = true;
|
||||||
|
ProtectControlGroups = true;
|
||||||
|
ProtectHome = true;
|
||||||
|
ProtectHostname = true;
|
||||||
|
ProtectKernelLogs = true;
|
||||||
|
ProtectKernelModules = true;
|
||||||
|
ProtectKernelTunables = true;
|
||||||
|
ProtectSystem = "strict";
|
||||||
|
RemoveIPC = true;
|
||||||
|
RestrictAddressFamilies = "AF_INET AF_INET6 AF_UNIX AF_NETLINK";
|
||||||
|
RestrictNamespaces = true;
|
||||||
|
RestrictRealtime = true;
|
||||||
|
RestrictSUIDSGID = true;
|
||||||
|
|
||||||
|
AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ];
|
||||||
|
CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.firewall = mkIf cfg.openFirewall {
|
||||||
|
allowedUDPPorts = cfg.firewallUDPPorts;
|
||||||
|
allowedTCPPorts = cfg.firewallTCPPorts;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
meta.maintainers = with lib.maintainers; [ fabianrig ];
|
||||||
|
}
|
Loading…
Reference in a new issue