nixos-config/config/services/named.nix
2023-09-15 13:58:12 +01:00

135 lines
4.1 KiB
Nix

{
pkgs,
config,
dns,
...
}: let
darkkirb-de = import ../../zones/darkkirb.de.nix {inherit dns;};
chir-rs = import ../../zones/chir.rs.nix {inherit dns;};
int-chir-rs = import ../../zones/int.chir.rs.nix {inherit dns;};
signzone = import ../../zones/signzone.nix;
shitallover-me = import ../../zones/shitallover.me.nix {inherit dns;};
in {
imports = [
(signzone {
inherit dns;
ksk = "services/dns/rs/chir/32969";
zsk = "services/dns/rs/chir/51207";
zone = chir-rs;
zonename = "chir.rs";
})
(signzone {
inherit dns;
ksk = "services/dns/rs/chir/int/35133";
zsk = "services/dns/rs/chir/int/19631";
zone = int-chir-rs;
zonename = "int.chir.rs";
})
(signzone {
inherit dns;
ksk = "services/dns/de/darkkirb/53136";
zsk = "services/dns/de/darkkirb/61825";
zone = darkkirb-de;
zonename = "darkkirb.de";
})
(signzone {
inherit dns;
zsk = "services/dns/me/shitallover/30477";
ksk = "services/dns/me/shitallover/38310";
zone = shitallover-me;
zonename = "shitallover.me";
})
];
services.bind = {
enable = true;
zones = {
"darkkirb.de" = {
master = true;
file = "/var/lib/named/darkkirb.de";
slaves = ["fd7a:115c:a1e0:ab12:4843:cd96:6263:ad6b" "100.99.173.107"];
extraConfig = "also-notify {fd7a:115c:a1e0:ab12:4843:cd96:6263:ad6b; 100.99.173.107;};";
};
"_acme-challenge.darkkirb.de" = {
master = true;
file = "/var/lib/named/_acme-challenge.darkkirb.de";
extraConfig = ''
update-policy {
grant certbot. name _acme-challenge.darkkirb.de. txt;
};
'';
};
"chir.rs" = {
master = true;
file = "/var/lib/named/chir.rs";
slaves = ["fd7a:115c:a1e0:ab12:4843:cd96:6263:ad6b" "100.99.173.107"];
extraConfig = "also-notify {fd7a:115c:a1e0:ab12:4843:cd96:6263:ad6b; 100.99.173.107;};";
};
"_acme-challenge.chir.rs" = {
master = true;
file = "/var/lib/named/_acme-challenge.chir.rs";
extraConfig = ''
update-policy {
grant certbot. name _acme-challenge.chir.rs. txt;
};
'';
};
"int.chir.rs" = {
master = true;
file = "/var/lib/named/int.chir.rs";
slaves = ["fd7a:115c:a1e0:ab12:4843:cd96:6263:ad6b" "100.99.173.107"];
extraConfig = "also-notify {fd7a:115c:a1e0:ab12:4843:cd96:6263:ad6b; 100.99.173.107;};";
};
"_acme-challenge.int.chir.rs" = {
master = true;
file = "/var/lib/named/_acme-challenge.int.chir.rs";
extraConfig = ''
update-policy {
grant certbot. name _acme-challenge.int.chir.rs. txt;
};
'';
};
"shitallover.me" = {
master = true;
file = "/var/lib/named/shitallover.me";
slaves = ["fd7a:115c:a1e0:ab12:4843:cd96:6263:ad6b" "100.99.173.107"];
extraConfig = "also-notify {fd7a:115c:a1e0:ab12:4843:cd96:6263:ad6b; 100.99.173.107;};";
};
"_acme-challenge.shitallover.me" = {
master = true;
file = "/var/lib/named/_acme-challenge.shitallover.me";
extraConfig = ''
update-policy {
grant certbot. name _acme-challenge.shitallover.me. txt;
};
'';
};
};
extraConfig = ''
statistics-channels {
inet 127.0.0.1 port 8653 allow { 127.0.0.1; };
};
include "/run/secrets/services/dns/named-keys";
'';
extraOptions = ''
allow-recursion {
127.0.0.1;
::1;
fc00::/7;
100.0.0.0/8;
};
recursion yes;
dnssec-validation yes;
allow-transfer {fd7a:115c:a1e0:ab12:4843:cd96:6263:ad6b; 100.99.173.107;};
notify-delay 0;
'';
};
networking.firewall.allowedTCPPorts = [53];
networking.firewall.allowedUDPPorts = [53];
services.prometheus.exporters.bind = {
enable = true;
bindGroups = ["server" "view" "tasks"];
bindURI = "http://127.0.0.1:8653/";
};
sops.secrets."services/dns/named-keys" = {owner = "named";};
}