145 lines
3.9 KiB
Nix
145 lines
3.9 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
let
|
|
cfg = config.services.authoritative-dns;
|
|
|
|
zoneOpts = import ./zone-definition.nix { inherit lib; };
|
|
|
|
zoneToZonefile = import ./zone-to-zonefile.nix { inherit lib; };
|
|
|
|
reverseZonefile = import ./reverse-zone.nix { inherit pkgs; };
|
|
|
|
domainOpts = { name, ... }: {
|
|
options = with types; {
|
|
domain = mkOption {
|
|
type = str;
|
|
description = "Domain name.";
|
|
default = name;
|
|
};
|
|
|
|
ksk = {
|
|
key-file = mkOption {
|
|
type = nullOr str;
|
|
description =
|
|
"Key-signing key for this zone. DNSSEC disabled when null.";
|
|
default = null;
|
|
};
|
|
};
|
|
|
|
zone = mkOption {
|
|
type = submodule zoneOpts;
|
|
description = "Definition of network zone to be served.";
|
|
};
|
|
|
|
reverse-zones = mkOption {
|
|
type = listOf str;
|
|
description =
|
|
"List of subnets for which to generate reverse lookup zones.";
|
|
default = [ ];
|
|
};
|
|
|
|
notify = {
|
|
ipv4 = mkOption {
|
|
type = listOf str;
|
|
description = "List of IPv4 addresses to notify of changes.";
|
|
default = [ ];
|
|
};
|
|
|
|
ipv6 = mkOption {
|
|
type = listOf str;
|
|
description = "List of IPv6 addresses to notify of changes.";
|
|
default = [ ];
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
in {
|
|
options.services.authoritative-dns = with types; {
|
|
enable = mkEnableOption "Enable authoritative DNS service.";
|
|
|
|
identity = mkOption {
|
|
type = str;
|
|
description = "The identity (CH TXT ID.SERVER) of this host.";
|
|
};
|
|
|
|
domains = mkOption {
|
|
type = attrsOf (submodule domainOpts);
|
|
default = { };
|
|
description = "A map of domain to domain options.";
|
|
};
|
|
|
|
listen-ips = mkOption {
|
|
type = listOf str;
|
|
description =
|
|
"List of IP addresses on which to listen. If empty, listen on all addresses.";
|
|
default = [ ];
|
|
};
|
|
|
|
state-directory = mkOption {
|
|
type = str;
|
|
description =
|
|
"Path on which to store nameserver state, including DNSSEC keys.";
|
|
};
|
|
|
|
timestamp = mkOption {
|
|
type = str;
|
|
description = "Timestamp to attach to zone record.";
|
|
};
|
|
|
|
ip-host-map = mkOption {
|
|
type = attrsOf str;
|
|
description =
|
|
"Map of IP address to authoritative hostname. Unneeded hosts will be ignored.";
|
|
default = { };
|
|
};
|
|
|
|
mirrored-domains = mkOption {
|
|
type = attrsOf str;
|
|
description = "Map of domain name to primary server IP.";
|
|
default = { };
|
|
};
|
|
};
|
|
|
|
imports = [ ./nsd.nix ];
|
|
|
|
config = mkIf cfg.enable {
|
|
services.fudo-nsd = {
|
|
enable = true;
|
|
identity = cfg.identity;
|
|
interfaces = cfg.listen-ips;
|
|
stateDirectory = cfg.state-directory;
|
|
zones = let
|
|
forwardZones = mapAttrs' (domain:
|
|
{ ksk, zone, notify, ... }:
|
|
nameValuePair "${domain}." {
|
|
dnssec = ksk.key-file != null;
|
|
ksk.keyFile = ksk.key-file;
|
|
provideXFR = (map (ns: "${ns}/32 NOKEY") notify.ipv4)
|
|
++ (map (ns: "${ns}/64 NOKEY") notify.ipv6);
|
|
notify = map (ns: "${ns} NOKEY") (notify.ipv4 ++ notify.ipv6);
|
|
data = zoneToZonefile {
|
|
inherit domain;
|
|
inherit (cfg) timestamp;
|
|
inherit zone;
|
|
};
|
|
}) cfg.domains;
|
|
reverseZones = concatMapAttrs (domain:
|
|
{ ksk, zone, reverse-zones, notify, ... }:
|
|
listToAttrs (map (network:
|
|
reverseZonefile {
|
|
inherit domain network notify;
|
|
inherit (zone) nameservers;
|
|
ipHostMap = cfg.ip-host-map;
|
|
serial = cfg.timestamp;
|
|
}) reverse-zones)) cfg.domains;
|
|
secondaryZones = mapAttrs (domain: masterIp: {
|
|
allowNotify = "${masterIp}/32";
|
|
requestXFR = "AXFR ${masterIp} NOKEY";
|
|
}) cfg.mirrored-domains;
|
|
in forwardZones // reverseZones;
|
|
};
|
|
};
|
|
}
|