aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/nixos/modules/services/networking/bind.nix
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/nixos/modules/services/networking/bind.nix')
-rw-r--r--nixpkgs/nixos/modules/services/networking/bind.nix207
1 files changed, 207 insertions, 0 deletions
diff --git a/nixpkgs/nixos/modules/services/networking/bind.nix b/nixpkgs/nixos/modules/services/networking/bind.nix
new file mode 100644
index 00000000000..06af4dbcca4
--- /dev/null
+++ b/nixpkgs/nixos/modules/services/networking/bind.nix
@@ -0,0 +1,207 @@
+{ config, lib, pkgs, ... }:
+
+with lib;
+
+let
+
+ cfg = config.services.bind;
+
+ bindUser = "named";
+
+ confFile = pkgs.writeText "named.conf"
+ ''
+ include "/etc/bind/rndc.key";
+ controls {
+ inet 127.0.0.1 allow {localhost;} keys {"rndc-key";};
+ };
+
+ acl cachenetworks { ${concatMapStrings (entry: " ${entry}; ") cfg.cacheNetworks} };
+ acl badnetworks { ${concatMapStrings (entry: " ${entry}; ") cfg.blockedNetworks} };
+
+ options {
+ listen-on { ${concatMapStrings (entry: " ${entry}; ") cfg.listenOn} };
+ listen-on-v6 { ${concatMapStrings (entry: " ${entry}; ") cfg.listenOnIpv6} };
+ allow-query { cachenetworks; };
+ blackhole { badnetworks; };
+ forward first;
+ forwarders { ${concatMapStrings (entry: " ${entry}; ") cfg.forwarders} };
+ directory "/run/named";
+ pid-file "/run/named/named.pid";
+ ${cfg.extraOptions}
+ };
+
+ ${cfg.extraConfig}
+
+ ${ concatMapStrings
+ ({ name, file, master ? true, slaves ? [], masters ? [], extraConfig ? "" }:
+ ''
+ zone "${name}" {
+ type ${if master then "master" else "slave"};
+ file "${file}";
+ ${ if master then
+ ''
+ allow-transfer {
+ ${concatMapStrings (ip: "${ip};\n") slaves}
+ };
+ ''
+ else
+ ''
+ masters {
+ ${concatMapStrings (ip: "${ip};\n") masters}
+ };
+ ''
+ }
+ allow-query { any; };
+ ${extraConfig}
+ };
+ '')
+ cfg.zones }
+ '';
+
+in
+
+{
+
+ ###### interface
+
+ options = {
+
+ services.bind = {
+
+ enable = mkOption {
+ default = false;
+ description = "
+ Whether to enable BIND domain name server.
+ ";
+ };
+
+ cacheNetworks = mkOption {
+ default = ["127.0.0.0/24"];
+ description = "
+ What networks are allowed to use us as a resolver.
+ ";
+ };
+
+ blockedNetworks = mkOption {
+ default = [];
+ description = "
+ What networks are just blocked.
+ ";
+ };
+
+ ipv4Only = mkOption {
+ default = false;
+ description = "
+ Only use ipv4, even if the host supports ipv6.
+ ";
+ };
+
+ forwarders = mkOption {
+ default = config.networking.nameservers;
+ description = "
+ List of servers we should forward requests to.
+ ";
+ };
+
+ listenOn = mkOption {
+ default = ["any"];
+ type = types.listOf types.str;
+ description = "
+ Interfaces to listen on.
+ ";
+ };
+
+ listenOnIpv6 = mkOption {
+ default = ["any"];
+ type = types.listOf types.str;
+ description = "
+ Ipv6 interfaces to listen on.
+ ";
+ };
+
+ zones = mkOption {
+ default = [];
+ description = "
+ List of zones we claim authority over.
+ master=false means slave server; slaves means addresses
+ who may request zone transfer.
+ ";
+ example = [{
+ name = "example.com";
+ master = false;
+ file = "/var/dns/example.com";
+ masters = ["192.168.0.1"];
+ slaves = [];
+ extraConfig = "";
+ }];
+ };
+
+ extraConfig = mkOption {
+ type = types.lines;
+ default = "";
+ description = "
+ Extra lines to be added verbatim to the generated named configuration file.
+ ";
+ };
+
+ extraOptions = mkOption {
+ type = types.lines;
+ default = "";
+ description = ''
+ Extra lines to be added verbatim to the options section of the
+ generated named configuration file.
+ '';
+ };
+
+ configFile = mkOption {
+ type = types.path;
+ default = confFile;
+ defaultText = "confFile";
+ description = "
+ Overridable config file to use for named. By default, that
+ generated by nixos.
+ ";
+ };
+
+ };
+
+ };
+
+
+ ###### implementation
+
+ config = mkIf cfg.enable {
+
+ networking.resolvconf.useLocalResolver = mkDefault true;
+
+ users.users = singleton
+ { name = bindUser;
+ uid = config.ids.uids.bind;
+ description = "BIND daemon user";
+ };
+
+ systemd.services.bind = {
+ description = "BIND Domain Name Server";
+ after = [ "network.target" ];
+ wantedBy = [ "multi-user.target" ];
+
+ preStart = ''
+ mkdir -m 0755 -p /etc/bind
+ if ! [ -f "/etc/bind/rndc.key" ]; then
+ ${pkgs.bind.out}/sbin/rndc-confgen -c /etc/bind/rndc.key -u ${bindUser} -a -A hmac-sha256 2>/dev/null
+ fi
+
+ ${pkgs.coreutils}/bin/mkdir -p /run/named
+ chown ${bindUser} /run/named
+ '';
+
+ serviceConfig = {
+ ExecStart = "${pkgs.bind.out}/sbin/named -u ${bindUser} ${optionalString cfg.ipv4Only "-4"} -c ${cfg.configFile} -f";
+ ExecReload = "${pkgs.bind.out}/sbin/rndc -k '/etc/bind/rndc.key' reload";
+ ExecStop = "${pkgs.bind.out}/sbin/rndc -k '/etc/bind/rndc.key' stop";
+ };
+
+ unitConfig.Documentation = "man:named(8)";
+ };
+ };
+}