99f759de1c
This reverts commit 670b4e29adc16e0a29aa5b4c126703dcca56aeb6. The change added in this commit was controversial when it was originally suggested in https://github.com/NixOS/nixpkgs/pull/29205. Then that PR was closed and a new one opened, https://github.com/NixOS/nixpkgs/pull/29503, effectively circumventing the review process. I don't agree with this modification. Adding an option 'resolveLocalQueries' to tell the locally running name server that it should resolve local DNS queries feels outright nuts. I agree that the current state is unsatisfactory and that it should be improved, but this is not the right way. (cherry picked from commit 23a021d12e8f939cd0bfddb1c7adeb125028c1e3)
302 lines
10 KiB
Nix
302 lines
10 KiB
Nix
# /etc files related to networking, such as /etc/services.
|
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
|
|
cfg = config.networking;
|
|
dnsmasqResolve = config.services.dnsmasq.enable &&
|
|
config.services.dnsmasq.resolveLocalQueries;
|
|
hasLocalResolver = config.services.bind.enable || dnsmasqResolve;
|
|
|
|
resolvconfOptions = cfg.resolvconfOptions
|
|
++ optional cfg.dnsSingleRequest "single-request"
|
|
++ optional cfg.dnsExtensionMechanism "edns0";
|
|
in
|
|
|
|
{
|
|
|
|
options = {
|
|
|
|
networking.hosts = lib.mkOption {
|
|
type = types.attrsOf ( types.listOf types.str );
|
|
default = {};
|
|
example = literalExample ''
|
|
{
|
|
"127.0.0.1" = [ "foo.bar.baz" ];
|
|
"192.168.0.2" = [ "fileserver.local" "nameserver.local" ];
|
|
};
|
|
'';
|
|
description = ''
|
|
Locally defined maps of hostnames to IP addresses.
|
|
'';
|
|
};
|
|
|
|
networking.extraHosts = lib.mkOption {
|
|
type = types.lines;
|
|
default = "";
|
|
example = "192.168.0.1 lanlocalhost";
|
|
description = ''
|
|
Additional verbatim entries to be appended to <filename>/etc/hosts</filename>.
|
|
'';
|
|
};
|
|
|
|
networking.hostConf = lib.mkOption {
|
|
type = types.lines;
|
|
default = "multi on";
|
|
example = ''
|
|
multi on
|
|
reorder on
|
|
trim lan
|
|
'';
|
|
description = ''
|
|
The contents of <filename>/etc/host.conf</filename>. See also <citerefentry><refentrytitle>host.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
|
|
'';
|
|
};
|
|
|
|
networking.dnsSingleRequest = lib.mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Recent versions of glibc will issue both ipv4 (A) and ipv6 (AAAA)
|
|
address queries at the same time, from the same port. Sometimes upstream
|
|
routers will systemically drop the ipv4 queries. The symptom of this problem is
|
|
that 'getent hosts example.com' only returns ipv6 (or perhaps only ipv4) addresses. The
|
|
workaround for this is to specify the option 'single-request' in
|
|
/etc/resolv.conf. This option enables that.
|
|
'';
|
|
};
|
|
|
|
networking.dnsExtensionMechanism = lib.mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = ''
|
|
Enable the <code>edns0</code> option in <filename>resolv.conf</filename>. With
|
|
that option set, <code>glibc</code> supports use of the extension mechanisms for
|
|
DNS (EDNS) specified in RFC 2671. The most popular user of that feature is DNSSEC,
|
|
which does not work without it.
|
|
'';
|
|
};
|
|
|
|
networking.extraResolvconfConf = lib.mkOption {
|
|
type = types.lines;
|
|
default = "";
|
|
example = "libc=NO";
|
|
description = ''
|
|
Extra configuration to append to <filename>resolvconf.conf</filename>.
|
|
'';
|
|
};
|
|
|
|
networking.resolvconfOptions = lib.mkOption {
|
|
type = types.listOf types.str;
|
|
default = [];
|
|
example = [ "ndots:1" "rotate" ];
|
|
description = ''
|
|
Set the options in <filename>/etc/resolv.conf</filename>.
|
|
'';
|
|
};
|
|
|
|
networking.timeServers = mkOption {
|
|
default = [
|
|
"0.nixos.pool.ntp.org"
|
|
"1.nixos.pool.ntp.org"
|
|
"2.nixos.pool.ntp.org"
|
|
"3.nixos.pool.ntp.org"
|
|
];
|
|
description = ''
|
|
The set of NTP servers from which to synchronise.
|
|
'';
|
|
};
|
|
|
|
networking.proxy = {
|
|
|
|
default = lib.mkOption {
|
|
type = types.nullOr types.str;
|
|
default = null;
|
|
description = ''
|
|
This option specifies the default value for httpProxy, httpsProxy, ftpProxy and rsyncProxy.
|
|
'';
|
|
example = "http://127.0.0.1:3128";
|
|
};
|
|
|
|
httpProxy = lib.mkOption {
|
|
type = types.nullOr types.str;
|
|
default = cfg.proxy.default;
|
|
description = ''
|
|
This option specifies the http_proxy environment variable.
|
|
'';
|
|
example = "http://127.0.0.1:3128";
|
|
};
|
|
|
|
httpsProxy = lib.mkOption {
|
|
type = types.nullOr types.str;
|
|
default = cfg.proxy.default;
|
|
description = ''
|
|
This option specifies the https_proxy environment variable.
|
|
'';
|
|
example = "http://127.0.0.1:3128";
|
|
};
|
|
|
|
ftpProxy = lib.mkOption {
|
|
type = types.nullOr types.str;
|
|
default = cfg.proxy.default;
|
|
description = ''
|
|
This option specifies the ftp_proxy environment variable.
|
|
'';
|
|
example = "http://127.0.0.1:3128";
|
|
};
|
|
|
|
rsyncProxy = lib.mkOption {
|
|
type = types.nullOr types.str;
|
|
default = cfg.proxy.default;
|
|
description = ''
|
|
This option specifies the rsync_proxy environment variable.
|
|
'';
|
|
example = "http://127.0.0.1:3128";
|
|
};
|
|
|
|
allProxy = lib.mkOption {
|
|
type = types.nullOr types.str;
|
|
default = cfg.proxy.default;
|
|
description = ''
|
|
This option specifies the all_proxy environment variable.
|
|
'';
|
|
example = "http://127.0.0.1:3128";
|
|
};
|
|
|
|
noProxy = lib.mkOption {
|
|
type = types.nullOr types.str;
|
|
default = null;
|
|
description = ''
|
|
This option specifies the no_proxy environment variable.
|
|
If a default proxy is used and noProxy is null,
|
|
then noProxy will be set to 127.0.0.1,localhost.
|
|
'';
|
|
example = "127.0.0.1,localhost,.localdomain";
|
|
};
|
|
|
|
envVars = lib.mkOption {
|
|
type = types.attrs;
|
|
internal = true;
|
|
default = {};
|
|
description = ''
|
|
Environment variables used for the network proxy.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
config = {
|
|
|
|
environment.etc =
|
|
{ # /etc/services: TCP/UDP port assignments.
|
|
"services".source = pkgs.iana-etc + "/etc/services";
|
|
|
|
# /etc/protocols: IP protocol numbers.
|
|
"protocols".source = pkgs.iana-etc + "/etc/protocols";
|
|
|
|
# /etc/rpc: RPC program numbers.
|
|
"rpc".source = pkgs.glibc.out + "/etc/rpc";
|
|
|
|
# /etc/hosts: Hostname-to-IP mappings.
|
|
"hosts".text =
|
|
let oneToString = set : ip : ip + " " + concatStringsSep " " ( getAttr ip set );
|
|
allToString = set : concatMapStringsSep "\n" ( oneToString set ) ( attrNames set );
|
|
userLocalHosts = optionalString
|
|
( builtins.hasAttr "127.0.0.1" cfg.hosts )
|
|
( concatStringsSep " " ( remove "localhost" cfg.hosts."127.0.0.1" ));
|
|
userLocalHosts6 = optionalString
|
|
( builtins.hasAttr "::1" cfg.hosts )
|
|
( concatStringsSep " " ( remove "localhost" cfg.hosts."::1" ));
|
|
otherHosts = allToString ( removeAttrs cfg.hosts [ "127.0.0.1" "::1" ]);
|
|
in
|
|
''
|
|
127.0.0.1 ${userLocalHosts} localhost
|
|
${optionalString cfg.enableIPv6 ''
|
|
::1 ${userLocalHosts6} localhost
|
|
''}
|
|
${otherHosts}
|
|
${cfg.extraHosts}
|
|
'';
|
|
|
|
# /etc/host.conf: resolver configuration file
|
|
"host.conf".text = cfg.hostConf;
|
|
|
|
# /etc/resolvconf.conf: Configuration for openresolv.
|
|
"resolvconf.conf".text =
|
|
''
|
|
# This is the default, but we must set it here to prevent
|
|
# a collision with an apparently unrelated environment
|
|
# variable with the same name exported by dhcpcd.
|
|
interface_order='lo lo[0-9]*'
|
|
'' + optionalString config.services.nscd.enable ''
|
|
# Invalidate the nscd cache whenever resolv.conf is
|
|
# regenerated.
|
|
libc_restart='${pkgs.systemd}/bin/systemctl try-restart --no-block nscd.service 2> /dev/null'
|
|
'' + optionalString (length resolvconfOptions > 0) ''
|
|
# Options as described in resolv.conf(5)
|
|
resolv_conf_options='${concatStringsSep " " resolvconfOptions}'
|
|
'' + optionalString hasLocalResolver ''
|
|
# This hosts runs a full-blown DNS resolver.
|
|
name_servers='127.0.0.1'
|
|
'' + optionalString dnsmasqResolve ''
|
|
dnsmasq_conf=/etc/dnsmasq-conf.conf
|
|
dnsmasq_resolv=/etc/dnsmasq-resolv.conf
|
|
'' + cfg.extraResolvconfConf + ''
|
|
'';
|
|
|
|
} // optionalAttrs config.services.resolved.enable {
|
|
# symlink the static version of resolv.conf as recommended by upstream:
|
|
# https://www.freedesktop.org/software/systemd/man/systemd-resolved.html#/etc/resolv.conf
|
|
"resolv.conf".source = "${pkgs.systemd}/lib/systemd/resolv.conf";
|
|
} // optionalAttrs (config.services.resolved.enable && dnsmasqResolve) {
|
|
"dnsmasq-resolv.conf".source = "/run/systemd/resolve/resolv.conf";
|
|
};
|
|
|
|
networking.proxy.envVars =
|
|
optionalAttrs (cfg.proxy.default != null) {
|
|
# other options already fallback to proxy.default
|
|
no_proxy = "127.0.0.1,localhost";
|
|
} // optionalAttrs (cfg.proxy.httpProxy != null) {
|
|
http_proxy = cfg.proxy.httpProxy;
|
|
} // optionalAttrs (cfg.proxy.httpsProxy != null) {
|
|
https_proxy = cfg.proxy.httpsProxy;
|
|
} // optionalAttrs (cfg.proxy.rsyncProxy != null) {
|
|
rsync_proxy = cfg.proxy.rsyncProxy;
|
|
} // optionalAttrs (cfg.proxy.ftpProxy != null) {
|
|
ftp_proxy = cfg.proxy.ftpProxy;
|
|
} // optionalAttrs (cfg.proxy.allProxy != null) {
|
|
all_proxy = cfg.proxy.allProxy;
|
|
} // optionalAttrs (cfg.proxy.noProxy != null) {
|
|
no_proxy = cfg.proxy.noProxy;
|
|
};
|
|
|
|
# Install the proxy environment variables
|
|
environment.sessionVariables = cfg.proxy.envVars;
|
|
|
|
# This is needed when /etc/resolv.conf is being overriden by networkd
|
|
# and other configurations. If the file is destroyed by an environment
|
|
# activation then it must be rebuilt so that applications which interface
|
|
# with /etc/resolv.conf directly don't break.
|
|
system.activationScripts.resolvconf = stringAfter [ "etc" "specialfs" "var" ]
|
|
''
|
|
# Systemd resolved controls its own resolv.conf
|
|
rm -f /run/resolvconf/interfaces/systemd
|
|
${optionalString config.services.resolved.enable ''
|
|
rm -rf /run/resolvconf/interfaces
|
|
mkdir -p /run/resolvconf/interfaces
|
|
ln -s /run/systemd/resolve/resolv.conf /run/resolvconf/interfaces/systemd
|
|
''}
|
|
|
|
# Make sure resolv.conf is up to date if not managed by systemd
|
|
${optionalString (!config.services.resolved.enable) ''
|
|
${pkgs.openresolv}/bin/resolvconf -u
|
|
''}
|
|
'';
|
|
|
|
};
|
|
|
|
}
|