summaryrefslogtreecommitdiffstats
path: root/makefu/2configs/dnscrypt
diff options
context:
space:
mode:
authormakefu <github@syntax-fehler.de>2023-07-28 22:24:15 +0200
committermakefu <github@syntax-fehler.de>2023-07-28 22:24:15 +0200
commit060a8f28fa1fc648bdf66afb31a5d1efac868837 (patch)
tree2b354eacc7897365ee45244fe7a51720e0d0333f /makefu/2configs/dnscrypt
parentcbfcc890e3b76d942b927809bf981a5fa7289e6a (diff)
makefu: move out to own repo, add vacation-note
Diffstat (limited to 'makefu/2configs/dnscrypt')
-rw-r--r--makefu/2configs/dnscrypt/client.nix19
-rw-r--r--makefu/2configs/dnscrypt/server.nix26
2 files changed, 0 insertions, 45 deletions
diff --git a/makefu/2configs/dnscrypt/client.nix b/makefu/2configs/dnscrypt/client.nix
deleted file mode 100644
index 988fb4a7d..000000000
--- a/makefu/2configs/dnscrypt/client.nix
+++ /dev/null
@@ -1,19 +0,0 @@
-{ config, ... }:
-let
- customResolver = {
- # TODO: put this somewhere else
- address = config.krebs.hosts.gum.nets.internet.ip4.addr;
- port = 15251;
- name = "2.dnscrypt-cert.euer.krebsco.de";
- # dnscrypt-wrapper --show-provider-publickey --provider-publickey-file public.key
- key = "1AFC:E58D:F242:0FBB:9EE9:4E51:47F4:5373:D9AE:C2AB:DD96:8448:333D:5D79:272C:A44C";
- };
-in {
- services.dnscrypt-proxy = {
- enable = true;
- inherit customResolver;
- };
- networking.extraResolvconfConf = ''
- name_servers='127.0.0.1'
- '';
-}
diff --git a/makefu/2configs/dnscrypt/server.nix b/makefu/2configs/dnscrypt/server.nix
deleted file mode 100644
index 79305e727..000000000
--- a/makefu/2configs/dnscrypt/server.nix
+++ /dev/null
@@ -1,26 +0,0 @@
-{ config, ... }:
-let
- # TODO: dataDir is currently not provided by upstream
- # data = config.services.dnscrypt-wrapper.dataDir;
- data = "/var/lib/dnscrypt-wrapper";
- sec = toString <secrets>;
- port = 15251;
- user = "dnscrypt-wrapper";
-in {
- services.dnscrypt-wrapper = {
- enable = true;
- address = "0.0.0.0";
- upstream.address = "8.8.8.8";
- providerName = "2.dnscrypt-cert.euer.krebsco.de";
- inherit port;
- };
- networking.firewall.allowedUDPPorts = [ port ];
- systemd.services.prepare-dnscrypt-wrapper-keys = {
- wantedBy = [ "dnscrypt-wrapper.service" ];
- before = [ "dnscrypt-wrapper.service" ];
- script = ''
- install -m700 -o ${user} -v ${sec}/dnscrypt-public.key ${data}/public.key
- install -m700 -o ${user} -v ${sec}/dnscrypt-secret.key ${data}/secret.key
- '';
- };
-}