Merge pull request #37289 from disassembler/dnsdist
nixos/dnsdist: init module
This commit is contained in:
commit
bffc59badd
@ -473,6 +473,7 @@
|
|||||||
./services/networking/dnschain.nix
|
./services/networking/dnschain.nix
|
||||||
./services/networking/dnscrypt-proxy.nix
|
./services/networking/dnscrypt-proxy.nix
|
||||||
./services/networking/dnscrypt-wrapper.nix
|
./services/networking/dnscrypt-wrapper.nix
|
||||||
|
./services/networking/dnsdist.nix
|
||||||
./services/networking/dnsmasq.nix
|
./services/networking/dnsmasq.nix
|
||||||
./services/networking/ejabberd.nix
|
./services/networking/ejabberd.nix
|
||||||
./services/networking/fakeroute.nix
|
./services/networking/fakeroute.nix
|
||||||
|
61
nixos/modules/services/networking/dnsdist.nix
Normal file
61
nixos/modules/services/networking/dnsdist.nix
Normal file
@ -0,0 +1,61 @@
|
|||||||
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
|
with lib;
|
||||||
|
|
||||||
|
let
|
||||||
|
cfg = config.services.dnsdist;
|
||||||
|
configFile = pkgs.writeText "dndist.conf" ''
|
||||||
|
setLocal('${cfg.listenAddress}:${toString cfg.listenPort}')
|
||||||
|
${cfg.extraConfig}
|
||||||
|
'';
|
||||||
|
in {
|
||||||
|
options = {
|
||||||
|
services.dnsdist = {
|
||||||
|
enable = mkEnableOption "dnsdist domain name server";
|
||||||
|
|
||||||
|
listenAddress = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
description = "Listen IP Address";
|
||||||
|
default = "0.0.0.0";
|
||||||
|
};
|
||||||
|
listenPort = mkOption {
|
||||||
|
type = types.int;
|
||||||
|
description = "Listen port";
|
||||||
|
default = 53;
|
||||||
|
};
|
||||||
|
|
||||||
|
extraConfig = mkOption {
|
||||||
|
type = types.lines;
|
||||||
|
default = ''
|
||||||
|
'';
|
||||||
|
description = ''
|
||||||
|
Extra lines to be added verbatim to dnsdist.conf.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = mkIf config.services.dnsdist.enable {
|
||||||
|
systemd.services.dnsdist = {
|
||||||
|
description = "dnsdist load balancer";
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
after = ["network.target"];
|
||||||
|
|
||||||
|
serviceConfig = {
|
||||||
|
Restart="on-failure";
|
||||||
|
RestartSec="1";
|
||||||
|
DynamicUser = true;
|
||||||
|
StartLimitInterval="0";
|
||||||
|
PrivateTmp=true;
|
||||||
|
PrivateDevices=true;
|
||||||
|
CapabilityBoundingSet="CAP_NET_BIND_SERVICE CAP_SETGID CAP_SETUID";
|
||||||
|
ExecStart = "${pkgs.dnsdist}/bin/dnsdist --supervised --disable-syslog --config ${configFile}";
|
||||||
|
ProtectSystem="full";
|
||||||
|
ProtectHome=true;
|
||||||
|
RestrictAddressFamilies="AF_UNIX AF_INET AF_INET6";
|
||||||
|
LimitNOFILE="16384";
|
||||||
|
TasksMax="8192";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
@ -47,6 +47,6 @@ stdenv.mkDerivation rec {
|
|||||||
platforms = platforms.linux;
|
platforms = platforms.linux;
|
||||||
# cannot find postgresql libs on macos x
|
# cannot find postgresql libs on macos x
|
||||||
license = licenses.gpl2;
|
license = licenses.gpl2;
|
||||||
maintainers = [ maintainers.mic92 ];
|
maintainers = with maintainers; [ mic92 disassembler ];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user