diff options
author | Gregor Kleen <gkleen@yggdrasil.li> | 2023-03-04 19:23:36 +0100 |
---|---|---|
committer | Gregor Kleen <gkleen@yggdrasil.li> | 2023-03-04 19:23:36 +0100 |
commit | 29480b6e86ca6057d4151accdb5d4103f1657596 (patch) | |
tree | aad8ef8a38f2b679ff64039d6a2445eba9041d09 /hosts/vidhar/dns/default.nix | |
parent | 7fcaba2d4cabc8d5dfd35648ec1b9b6795e490ec (diff) | |
download | nixos-29480b6e86ca6057d4151accdb5d4103f1657596.tar nixos-29480b6e86ca6057d4151accdb5d4103f1657596.tar.gz nixos-29480b6e86ca6057d4151accdb5d4103f1657596.tar.bz2 nixos-29480b6e86ca6057d4151accdb5d4103f1657596.tar.xz nixos-29480b6e86ca6057d4151accdb5d4103f1657596.zip |
...
Diffstat (limited to 'hosts/vidhar/dns/default.nix')
-rw-r--r-- | hosts/vidhar/dns/default.nix | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/hosts/vidhar/dns/default.nix b/hosts/vidhar/dns/default.nix index ade884e7..f942b3f9 100644 --- a/hosts/vidhar/dns/default.nix +++ b/hosts/vidhar/dns/default.nix | |||
@@ -20,7 +20,7 @@ in { | |||
20 | enableRootTrustAnchor = false; | 20 | enableRootTrustAnchor = false; |
21 | settings = { | 21 | settings = { |
22 | server = { | 22 | server = { |
23 | interface = ["lo" "lan"]; | 23 | interface = ["lo" "lan" "ve-printing"]; |
24 | prefer-ip6 = true; | 24 | prefer-ip6 = true; |
25 | access-control = ["0.0.0.0/0 allow" "::/0 allow"]; | 25 | access-control = ["0.0.0.0/0 allow" "::/0 allow"]; |
26 | root-hints = "${pkgs.dns-root-data}/root.hints"; | 26 | root-hints = "${pkgs.dns-root-data}/root.hints"; |
@@ -79,6 +79,10 @@ in { | |||
79 | }; | 79 | }; |
80 | }; | 80 | }; |
81 | 81 | ||
82 | systemd.services.unbound = { | ||
83 | after = [ "container@printinp.service" ]; | ||
84 | }; | ||
85 | |||
82 | systemd.services.knot = { | 86 | systemd.services.knot = { |
83 | unitConfig.RequiresMountsFor = [ "/var/lib/knot" ]; | 87 | unitConfig.RequiresMountsFor = [ "/var/lib/knot" ]; |
84 | serviceConfig.LoadCredential = map ({name, ...}: "${name}.yaml:${config.sops.secrets.${name}.path}") knotKeys; | 88 | serviceConfig.LoadCredential = map ({name, ...}: "${name}.yaml:${config.sops.secrets.${name}.path}") knotKeys; |