nixos: add dns server

This commit is contained in:
Vivian 2021-11-21 19:30:19 +01:00
parent c3f86d5ae5
commit b965765312
5 changed files with 175 additions and 44 deletions

View file

@ -196,16 +196,16 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1637348621, "lastModified": 1637469704,
"narHash": "sha256-dTxccBfFK5ViweuYqx2GwtDo+m9SBSjyBZj0+zMds5M=", "narHash": "sha256-tNbrZZDHCLBw5/3REe8Dm/WMYiAXgXy7n5GuhRn5lI0=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "2d97acad3b9cc16063b554d850a8fe1c2e7bb36d", "rev": "296032dd5ff5e4c266782e73f9c00ee044f19c70",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "NixOS", "owner": "NixOS",
"ref": "master", "ref": "nixos-unstable-small",
"repo": "nixpkgs", "repo": "nixpkgs",
"type": "github" "type": "github"
} }

View file

@ -7,7 +7,7 @@
inputs = { inputs = {
deploy-rs.url = "github:serokell/deploy-rs"; deploy-rs.url = "github:serokell/deploy-rs";
nixpkgs.url = "github:NixOS/nixpkgs/master"; nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable-small";
serokell-nix.url = "github:serokell/serokell.nix"; serokell-nix.url = "github:serokell/serokell.nix";
vault-secrets.url = "github:serokell/vault-secrets"; vault-secrets.url = "github:serokell/vault-secrets";
}; };
@ -16,8 +16,9 @@
{ self, nixpkgs, deploy-rs, vault-secrets, serokell-nix, ... }@inputs: { self, nixpkgs, deploy-rs, vault-secrets, serokell-nix, ... }@inputs:
let let
inherit (nixpkgs) lib; inherit (nixpkgs) lib;
inherit (builtins) filter; inherit (builtins) filter mapAttrs;
system = "x86_64-linux"; system = "x86_64-linux";
hosts = import ./hosts.nix;
# Create a nixosConfiguration based on a foldername (nixname) and if the host is an LXC container or a VM. # Create a nixosConfiguration based on a foldername (nixname) and if the host is an LXC container or a VM.
mkConfig = { hostname, profile ? hostname, lxc ? true, ... }: { mkConfig = { hostname, profile ? hostname, lxc ? true, ... }: {
@ -30,7 +31,7 @@
./nixos/common/generic-lxc.nix ./nixos/common/generic-lxc.nix
] else ] else
[ ./nixos/common/generic-vm.nix ]); [ ./nixos/common/generic-vm.nix ]);
specialArgs.inputs = inputs; specialArgs = { inherit hosts inputs; };
}; };
}; };
@ -41,16 +42,19 @@
fastConnection = true; fastConnection = true;
profiles.system = { profiles.system = {
user = "root"; user = "root";
path = deploy-rs.lib.${system}.activate.nixos self.nixosConfigurations.${profile}; path = deploy-rs.lib.${system}.activate.nixos
self.nixosConfigurations.${profile};
}; };
}; };
}; };
# Import all nixos host definitions that are actual nix machines # Import all nixos host definitions that are actual nix machines
nixHosts = filter ({ nix ? true, ... }: nix) (import ./hosts.nix); nixHosts = filter ({ nix ? true, ... }: nix) hosts;
in { in {
# Make the config and deploy sets # Make the config and deploy sets
nixosConfigurations = lib.foldr (el: acc: acc // mkConfig el) { } nixHosts; nixosConfigurations =
lib.foldr (el: acc: acc // mkConfig el) { } nixHosts;
deploy.nodes = lib.foldr (el: acc: acc // mkDeploy el) { } nixHosts; deploy.nodes = lib.foldr (el: acc: acc // mkDeploy el) { } nixHosts;
# Use by running `nix develop` # Use by running `nix develop`
@ -76,6 +80,7 @@
]; ];
}; };
checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib; checks = mapAttrs (system: deployLib: deployLib.deployChecks self.deploy)
deploy-rs.lib;
}; };
} }

102
hosts.nix
View file

@ -1,35 +1,71 @@
[ [
{ {
hostname = "bastion"; hostname = "edgerouter";
ip = "10.42.42.4"; ip = "10.42.42.1";
mac = "82:F0:7C:CB:BD:6D"; mac = "B4:FB:E4:53:9C:0A";
lxc = false; nix = false;
} }
{ {
hostname = "k3s-node1"; hostname = "nuc";
profile = "k3s"; ip = "10.42.42.42";
ip = "10.42.42.10"; mac = "1C:69:7A:62:30:88";
mac = "2E:F8:55:23:D9:9B"; nix = false;
lxc = false; }
} {
{ hostname = "LGwebOSTV";
hostname = "vault"; ip = "10.42.42.13";
ip = "10.42.42.6"; mac = "74:40:be:48:85:a4";
mac = "16:2B:87:55:0C:0C"; nix = false;
} }
{ {
hostname = "mosquitto"; hostname = "home-assistant";
ip = "10.42.42.7"; ip = "10.42.42.8";
mac = "C6:F9:8B:3D:9E:37"; mac = "74:40:be:48:85:a4";
} nix = false;
{ }
hostname = "nginx"; {
ip = "10.42.42.9"; hostname = "bastion";
mac = "6A:C2:89:85:CF:A6"; ip = "10.42.42.4";
} mac = "82:F0:7C:CB:BD:6D";
{ lxc = false;
hostname = "consul"; }
ip = "10.42.42.14"; {
mac = "D6:DE:07:41:73:81"; hostname = "k3s-node1";
} profile = "k3s";
ip = "10.42.42.10";
mac = "2E:F8:55:23:D9:9B";
lxc = false;
}
{
hostname = "vault";
ip = "10.42.42.6";
mac = "16:2B:87:55:0C:0C";
}
{
hostname = "mosquitto";
ip = "10.42.42.7";
mac = "C6:F9:8B:3D:9E:37";
}
{
hostname = "nginx";
ip = "10.42.42.9";
mac = "6A:C2:89:85:CF:A6";
}
{
hostname = "consul";
ip = "10.42.42.14";
mac = "D6:DE:07:41:73:81";
}
{
hostname = "dns-1";
profile = "dns";
ip = "10.42.42.15";
mac = "5E:F6:36:23:16:E3";
}
{
hostname = "dns-2";
profile = "dns";
ip = "10.42.42.16";
mac = "B6:04:0B:CD:0F:9F";
}
] ]

View file

@ -0,0 +1,66 @@
{ config, pkgs, hosts, ... }:
let
localdomain = "olympus";
localData = { hostname, ip, ... }: ''"${hostname}.${localdomain}. A ${ip}"'';
ptrData = { hostname, ip, ... }: ''"${ip} ${hostname}.${localdomain}"'';
in {
imports = [ ];
networking.hostName = "dns";
# This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions
# on your system were taken. Its perfectly fine and recommended to leave
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "21.11"; # Did you read the comment?
# Additional packages
environment.systemPackages = with pkgs; [ dig ];
networking.firewall.allowedTCPPorts = [ 53 ];
networking.firewall.allowedUDPPorts = [ 53 ];
services.unbound = {
enable = true;
settings = {
server = {
use-syslog = "yes";
module-config = ''"validator iterator"'';
interface-automatic = "yes";
interface = [ "0.0.0.0" "::0" ];
local-zone = ''"${localdomain}." transparent'';
local-data = map localData hosts;
local-data-ptr = map ptrData hosts;
access-control = [
"127.0.0.1/32 allow_snoop"
"::1 allow_snoop"
"10.42.0.0/16 allow"
"127.0.0.0/8 allow"
"192.168.2.0/24 allow"
"::1/128 allow"
];
private-address = [
"127.0.0.0/8"
"10.0.0.0/8"
"::ffff:a00:0/104"
"172.16.0.0/12"
"::ffff:ac10:0/108"
"169.254.0.0/16"
"::ffff:a9fe:0/112"
"192.168.0.0/16"
"::ffff:c0a8:0/112"
"fd00::/8"
"fe80::/10"
];
};
# forward-zone = {
# name = ''"."'';
# forward-addr = [ "8.8.8.8" "9.9.9.9" ];
# };
};
};
}

View file

@ -0,0 +1,24 @@
# Edit this configuration file to define what should be installed on
# your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running nixos-help).
{ config, pkgs, ... }:
{
imports = [ ];
networking.hostName = "template";
# This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions
# on your system were taken. Its perfectly fine and recommended to leave
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "21.11"; # Did you read the comment?
# Additional packages
environment.systemPackages = with pkgs; [ ];
networking.firewall.allowedTCPPorts = [ ];
}