mirror of
https://codeberg.org/jopejoe1/nix-conf.git
synced 2025-01-04 11:06:54 +01:00
add bind
This commit is contained in:
parent
bc7452853d
commit
4f2f2d7f5e
2 changed files with 61 additions and 0 deletions
60
systems/hetzner/bind.nix
Normal file
60
systems/hetzner/bind.nix
Normal file
|
@ -0,0 +1,60 @@
|
||||||
|
{ ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
services.bind = {
|
||||||
|
enable = true;
|
||||||
|
extraConfig = ''
|
||||||
|
include "/var/lib/secrets/dnskeys.conf";
|
||||||
|
'';
|
||||||
|
zones = [
|
||||||
|
rec {
|
||||||
|
name = "net0loggy.net";
|
||||||
|
file = "/var/db/bind/${name}";
|
||||||
|
master = true;
|
||||||
|
extraConfig = "allow-update { key rfc2136key.net0loggy.net.; };";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
# Now we can configure ACME
|
||||||
|
security.acme.acceptTerms = true;
|
||||||
|
security.acme.defaults.email = "admin+acme@net0loggy.net";
|
||||||
|
security.acme.certs."net0loggy.net" = {
|
||||||
|
domain = "*.net0loggy.net";
|
||||||
|
dnsProvider = "rfc2136";
|
||||||
|
environmentFile = "/var/lib/secrets/certs.secret";
|
||||||
|
# We don't need to wait for propagation since this is a local DNS server
|
||||||
|
dnsPropagationCheck = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services.dns-rfc2136-conf = {
|
||||||
|
requiredBy = [ "acme-net0loggy.net.service" "bind.service" ];
|
||||||
|
before = [ "acme-net0loggy.net.service" "bind.service" ];
|
||||||
|
unitConfig = {
|
||||||
|
ConditionPathExists = "!/var/lib/secrets/dnskeys.conf";
|
||||||
|
};
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
UMask = 0077;
|
||||||
|
};
|
||||||
|
path = [ pkgs.bind ];
|
||||||
|
script = ''
|
||||||
|
mkdir -p /var/lib/secrets
|
||||||
|
chmod 755 /var/lib/secrets
|
||||||
|
tsig-keygen rfc2136key.net0loggy.net > /var/lib/secrets/dnskeys.conf
|
||||||
|
chown named:root /var/lib/secrets/dnskeys.conf
|
||||||
|
chmod 400 /var/lib/secrets/dnskeys.conf
|
||||||
|
|
||||||
|
# extract secret value from the dnskeys.conf
|
||||||
|
while read x y; do if [ "$x" = "secret" ]; then secret="''${y:1:''${#y}-3}"; fi; done < /var/lib/secrets/dnskeys.conf
|
||||||
|
|
||||||
|
cat > /var/lib/secrets/certs.secret << EOF
|
||||||
|
RFC2136_NAMESERVER='127.0.0.1:53'
|
||||||
|
RFC2136_TSIG_ALGORITHM='hmac-sha256.'
|
||||||
|
RFC2136_TSIG_KEY='rfc2136key.net0loggy.net'
|
||||||
|
RFC2136_TSIG_SECRET='$secret'
|
||||||
|
EOF
|
||||||
|
chmod 400 /var/lib/secrets/certs.secret
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
}
|
|
@ -6,6 +6,7 @@
|
||||||
self.inputs.srvos.nixosModules.server
|
self.inputs.srvos.nixosModules.server
|
||||||
self.inputs.srvos.nixosModules.hardware-hetzner-online-amd
|
self.inputs.srvos.nixosModules.hardware-hetzner-online-amd
|
||||||
self.inputs.srvos.nixosModules.mixins-nginx
|
self.inputs.srvos.nixosModules.mixins-nginx
|
||||||
|
./bind.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
jopejoe1 = {
|
jopejoe1 = {
|
||||||
|
|
Loading…
Reference in a new issue