b450903751
GitOrigin-RevId: 74a1793c659d09d7cf738005308b1f86c90cb59b
47 lines
1.1 KiB
Nix
47 lines
1.1 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.powerdns;
|
|
configDir = pkgs.writeTextDir "pdns.conf" "${cfg.extraConfig}";
|
|
in {
|
|
options = {
|
|
services.powerdns = {
|
|
enable = mkEnableOption (lib.mdDoc "PowerDNS domain name server");
|
|
|
|
extraConfig = mkOption {
|
|
type = types.lines;
|
|
default = "launch=bind";
|
|
description = lib.mdDoc ''
|
|
PowerDNS configuration. Refer to
|
|
<https://doc.powerdns.com/authoritative/settings.html>
|
|
for details on supported values.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
systemd.packages = [ pkgs.pdns ];
|
|
|
|
systemd.services.pdns = {
|
|
wantedBy = [ "multi-user.target" ];
|
|
after = [ "network.target" "mysql.service" "postgresql.service" "openldap.service" ];
|
|
|
|
serviceConfig = {
|
|
ExecStart = [ "" "${pkgs.pdns}/bin/pdns_server --config-dir=${configDir} --guardian=no --daemon=no --disable-syslog --log-timestamp=no --write-pid=no" ];
|
|
};
|
|
};
|
|
|
|
users.users.pdns = {
|
|
isSystemUser = true;
|
|
group = "pdns";
|
|
description = "PowerDNS";
|
|
};
|
|
|
|
users.groups.pdns = {};
|
|
|
|
};
|
|
}
|