-
Notifications
You must be signed in to change notification settings - Fork 6
/
coredns.nix
49 lines (45 loc) · 1.31 KB
/
coredns.nix
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
{ pkgs, resourcesByRole, self, ... }:
let
inherit (import ../../consts.nix) virtualIP;
inherit (import ../../utils.nix) nodeIP;
in
{
deployment.keys = {
"coredns-kube.pem" = {
keyFile = ../../certs/generated/coredns/coredns-kube.pem;
destDir = "/var/lib/secrets/coredns";
user = "coredns";
};
"coredns-kube-key.pem" = {
keyFile = ../../certs/generated/coredns/coredns-kube-key.pem;
destDir = "/var/lib/secrets/coredns";
user = "coredns";
};
"kube-ca.pem" = {
keyFile = ../../certs/generated/kubernetes/ca.pem;
destDir = "/var/lib/secrets/coredns";
user = "coredns";
};
};
services.coredns = {
enable = true;
config = ''
.:53 {
kubernetes cluster.local {
endpoint https://${virtualIP}
tls /var/lib/secrets/coredns/coredns-kube.pem /var/lib/secrets/coredns/coredns-kube-key.pem /var/lib/secrets/coredns/kube-ca.pem
pods verified
}
forward . 1.1.1.1:53 1.0.0.1:53
}
'';
};
services.kubernetes.kubelet.clusterDns = nodeIP self;
networking.firewall.interfaces.mynet.allowedTCPPorts = [ 53 ];
networking.firewall.interfaces.mynet.allowedUDPPorts = [ 53 ];
users.groups.coredns = { };
users.users.coredns = {
group = "coredns";
isSystemUser = true;
};
}