nixpkgs/nixos/modules/services/networking/doh-proxy-rust.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

70 lines
1.6 KiB
Nix
Raw Normal View History

2020-08-18 08:36:13 +02:00
{
config,
lib,
pkgs,
...
}:
let
cfg = config.services.doh-proxy-rust;
in
{
options.services.doh-proxy-rust = {
enable = lib.mkEnableOption "doh-proxy-rust";
2020-08-18 08:36:13 +02:00
flags = lib.mkOption {
type = lib.types.listOf lib.types.str;
2020-08-18 08:36:13 +02:00
default = [ ];
example = [ "--server-address=9.9.9.9:53" ];
2020-08-18 08:36:13 +02:00
description = ''
A list of command-line flags to pass to doh-proxy. For details on the
available options, see <https://github.com/jedisct1/doh-server#usage>.
'';
};
};
config = lib.mkIf cfg.enable {
2020-08-18 08:36:13 +02:00
systemd.services.doh-proxy-rust = {
description = "doh-proxy-rust";
after = [
"network.target"
"nss-lookup.target"
];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
ExecStart = "${pkgs.doh-proxy-rust}/bin/doh-proxy ${lib.escapeShellArgs cfg.flags}";
2020-08-18 08:36:13 +02:00
Restart = "always";
RestartSec = 10;
DynamicUser = true;
CapabilityBoundingSet = "";
LockPersonality = true;
MemoryDenyWriteExecute = true;
NoNewPrivileges = true;
ProtectClock = true;
ProtectHome = true;
ProtectHostname = true;
ProtectKernelLogs = true;
RemoveIPC = true;
RestrictAddressFamilies = "AF_INET AF_INET6";
RestrictNamespaces = true;
RestrictRealtime = true;
RestrictSUIDSGID = true;
SystemCallArchitectures = "native";
SystemCallErrorNumber = "EPERM";
SystemCallFilter = [
"@system-service"
"~@privileged @resources"
];
};
};
};
meta.maintainers = with lib.maintainers; [ stephank ];
2020-08-18 08:36:13 +02:00
}