+56
nixos/doc/manual/release-notes/rl-2103.xml
+56
nixos/doc/manual/release-notes/rl-2103.xml
···All services should use <xref linkend="opt-systemd.services._name_.startLimitIntervalSec" /> or <literal>StartLimitIntervalSec</literal> in <xref linkend="opt-systemd.services._name_.unitConfig" /> instead.+The Unbound DNS resolver service (<literal>services.unbound</literal>) has been refactored to allow reloading, control sockets and to fix startup ordering issues.+It is now possible to enable a local UNIX control socket for unbound by setting the <xref linkend="opt-services.unbound.localControlSocketPath" />+the default of having the <literal>Type</literal> set to <literal>notify</literal>, therefore we are now also+queries. Services depending on <literal>nss-lookup.target</literal> or <literal>unbound.service</literal>+randomly failed during the stop-phase) have been removed as systemd will take care of those for us.+either <literal>pkill -HUP unbound</literal> and <literal>systemctl reload unbound</literal> to reload the+on the file system. We are using the path <literal>/etc/unbound/unbound.conf</literal> as that is the
+104
-33
nixos/modules/services/networking/unbound.nix
+104
-33
nixos/modules/services/networking/unbound.nix
·····················
···············+<citerefentry><refentrytitle>unbound.conf</refentrytitle><manvolnum>8</manvolnum></citerefentry>.······
+1
nixos/tests/all-tests.nix
+1
nixos/tests/all-tests.nix
···
+278
nixos/tests/unbound.nix
+278
nixos/tests/unbound.nix
···
···+* running a recursive DNS resolver on the local machine, forwarding to a local DNS server via UDP/53 & TCP/53+* running a recursive DNS resolver on the local machine, forwarding to a local DNS server via TCP/853 (DoT)+* running a recursive DNS resolver on a machine in the network awaiting input from clients over TCP/53 & UDP/53+* running a recursive DNS resolver on a machine in the network awaiting input from clients over TCP/853 (DoT)+openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -nodes -subj '/CN=dns.example.local'+interfaces = [ "::1" "127.0.0.1" "192.168.0.2" "fd21::2" "192.168.0.2@853" "fd21::2@853" "::1@853" "127.0.0.1@853" ];+forward-addr: ${(lib.head nodes.resolver.config.networking.interfaces.eth1.ipv6.addresses).address}+forward-addr: ${(lib.head nodes.resolver.config.networking.interfaces.eth1.ipv4.addresses).address}+test(client, ["${(lib.head nodes.resolver.config.networking.interfaces.eth1.ipv6.addresses).address}", "${(lib.head nodes.resolver.config.networking.interfaces.eth1.ipv4.addresses).address}"], doh=True)+expected = "example.local. IN forward ${(lib.head nodes.resolver.config.networking.interfaces.eth1.ipv6.addresses).address} ${(lib.head nodes.resolver.config.networking.interfaces.eth1.ipv4.addresses).address}"
+31
-9
pkgs/tools/networking/unbound/default.nix
+31
-9
pkgs/tools/networking/unbound/default.nix
············-preFixup = stdenv.lib.optionalString (stdenv.isLinux && !stdenv.hostPlatform.isMusl) # XXX: revisit···-(pkg: " --replace '-L${pkg.dev}/lib' '-L${pkg.out}/lib' --replace '-R${pkg.dev}/lib' '-R${pkg.out}/lib'")
······+buildInputs = [ openssl nettle expat libevent ] ++ lib.optionals withSystemd [ pkg-config systemd ];·········+(pkg: lib.optionalString (pkg ? dev) " --replace '-L${pkg.dev}/lib' '-L${pkg.out}/lib' --replace '-R${pkg.dev}/lib' '-R${pkg.out}/lib'")
+5
-1
pkgs/top-level/all-packages.nix
+5
-1
pkgs/top-level/all-packages.nix
···