3a4df29a92
GitOrigin-RevId: 3d7435c638baffaa826b85459df0fff47f12317d
72 lines
1.7 KiB
Nix
72 lines
1.7 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.r53-ddns;
|
|
pkg = pkgs.r53-ddns;
|
|
in
|
|
{
|
|
options = {
|
|
services.r53-ddns = {
|
|
|
|
enable = mkEnableOption "r53-ddyns";
|
|
|
|
interval = mkOption {
|
|
type = types.str;
|
|
default = "15min";
|
|
description = "How often to update the entry";
|
|
};
|
|
|
|
zoneID = mkOption {
|
|
type = types.str;
|
|
description = "The ID of your zone in Route53";
|
|
};
|
|
|
|
domain = mkOption {
|
|
type = types.str;
|
|
description = "The name of your domain in Route53";
|
|
};
|
|
|
|
hostname = mkOption {
|
|
type = types.str;
|
|
description = ''
|
|
Manually specify the hostname. Otherwise the tool will try to use the name
|
|
returned by the OS (Call to gethostname)
|
|
'';
|
|
};
|
|
|
|
environmentFile = mkOption {
|
|
type = types.str;
|
|
description = ''
|
|
File containing the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY
|
|
in the format of an EnvironmentFile as described by systemd.exec(5)
|
|
'';
|
|
};
|
|
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
systemd.timers.r53-ddns = {
|
|
description = "r53-ddns timer";
|
|
wantedBy = [ "timers.target" ];
|
|
timerConfig = {
|
|
OnBootSec = cfg.interval;
|
|
OnUnitActiveSec = cfg.interval;
|
|
};
|
|
};
|
|
|
|
systemd.services.r53-ddns = {
|
|
description = "r53-ddns service";
|
|
serviceConfig = {
|
|
ExecStart = "${pkg}/bin/r53-ddns -zone-id ${cfg.zoneID} -domain ${cfg.domain}"
|
|
+ lib.optionalString (cfg.hostname != null) " -hostname ${cfg.hostname}";
|
|
EnvironmentFile = "${cfg.environmentFile}";
|
|
DynamicUser = true;
|
|
};
|
|
};
|
|
|
|
};
|
|
}
|