services: add adblock

This is a self-hosted DNS server with hosts-based adblocking.

I should probably have it update the hosts file more often than I will
probably end up doing myself with a package... We'll see if it ends up
being necessary.
This commit is contained in:
Bruno BELANYI 2021-04-21 19:35:01 +00:00
parent d10f0ed103
commit 5b0d12ad40
2 changed files with 64 additions and 0 deletions

63
services/adblock.nix Normal file
View file

@ -0,0 +1,63 @@
{ config, lib, pkgs, ... }:
let
wgCfg = config.my.services.wireguard;
cfg = config.my.services.adblock;
in
{
options.my.services.adblock = with lib; {
enable = mkEnableOption "Hosts-based adblock using unbound";
forwardAddresses = mkOption {
type = with types; listOf str;
default = [
"1.0.0.1@853#cloudflare-dns.com"
"1.1.1.1@853#cloudflare-dns.com"
];
example = [
"8.8.4.4"
"8.8.8.8"
];
description = "Which DNS servers to forward queries to";
};
interfaces = mkOption {
type = with types; listOf str;
default = [
"0.0.0.0"
"::"
];
example = literalExample ''
[
"127.0.0.1"
]
'';
description = "Which addresses to listen on";
};
};
config = lib.mkIf cfg.enable {
# Needed when connecting from Wireguard clients
networking.firewall.allowedUDPPorts = [ 53 ];
networking.firewall.allowedTCPPorts = [ 53 ];
services.unbound = {
enable = true;
allowedAccess = [
"127.0.0.0/24"
"${wgCfg.net.v4.subnet}.0/${toString wgCfg.net.v4.mask}"
"${wgCfg.net.v6.subnet}::0/${toString wgCfg.net.v6.mask}"
];
inherit (cfg) forwardAddresses interfaces;
extraConfig = ''
so-reuseport: yes
tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt
tls-upstream: yes
include: "${pkgs.ambroisie.unbound-zones-adblock}/hosts"
'';
};
};
}

View file

@ -2,6 +2,7 @@
{ {
imports = [ imports = [
./adblock.nix
./backup.nix ./backup.nix
./blog.nix ./blog.nix
./calibre-web.nix ./calibre-web.nix