feat: created crab-hole service

This commit is contained in:
Leyla Becker 2025-10-19 16:32:10 -05:00
parent 290db94f42
commit 46890110f8
7 changed files with 210 additions and 2 deletions

View file

@ -46,6 +46,10 @@ nix multi user, multi system, configuration with `sops` secret management, `home
# Tasks:
## Chores:
- [ ] test out crab hole service
- [ ] learn how to use actual
## Tech Debt
- [ ] monitor configuration in `~/.config/monitors.xml` should be sym linked to `/run/gdm/.config/monitors.xml` (https://www.reddit.com/r/NixOS/comments/u09cz9/home_manager_create_my_own_symlinks_automatically/)
- [ ] migrate away from flakes and move to npins
@ -72,8 +76,6 @@ nix multi user, multi system, configuration with `sops` secret management, `home
- [ ] move searx, home-assistant, actual, jellyfin, paperless, and immich to only be accessible via vpn
## Services
- [ ] crab-hole for ad block
- [ ] enable and learn actual for budgeting
- [ ] vikunja service for project management
- [ ] Create Tor guard/relay server
- [ ] mastodon instance

View file

@ -342,6 +342,20 @@
openFirewall = true;
};
crab-hole = {
enable = true;
port = 8085;
openFirewall = true;
show_doc = true;
downstreams = {
loopback = {
enable = true;
openFirewall = true;
};
};
upstreams.cloudFlare.enable = true;
};
qbittorrent = {
enable = true;
mediaDir = "/srv/qbittorent";

View file

@ -0,0 +1,144 @@
{
config,
lib,
...
}: let
cfg = config.services.crab-hole;
in {
options.services.crab-hole = {
port = lib.mkOption {
type = lib.types.port;
default = 8080;
description = "Port for the crab-hole API to listen on.";
};
openFirewall = lib.mkOption {
type = lib.types.bool;
default = false;
description = "Whether to open the firewall for the crab-hole API port.";
};
listen = lib.mkOption {
type = lib.types.str;
default = "0.0.0.0";
description = "Address for the crab-hole API to listen on.";
};
show_doc = lib.mkEnableOption "OpenAPI documentation (loads content from third party websites)";
downstreams = {
loopback = {
enable = lib.mkEnableOption "loopback downstream DNS server on localhost:53";
openFirewall = lib.mkEnableOption "automatic port forwarding for the loopback downstream";
};
};
extraDownstreams = lib.mkOption {
type = lib.types.listOf (lib.types.submodule {
options = {
protocol = lib.mkOption {
type = lib.types.enum ["udp" "tcp" "tls" "https" "quic"];
description = "Protocol for the downstream server.";
};
listen = lib.mkOption {
type = lib.types.str;
description = "Address to listen on for downstream connections.";
};
port = lib.mkOption {
type = lib.types.port;
description = "Port to listen on for downstream connections.";
};
};
});
default = [];
description = "List of additional downstream DNS server configurations.";
};
upstreams = {
cloudFlare = {
enable = lib.mkEnableOption "Cloudflare DNS over TLS upstream servers (1.1.1.1 and 1.0.0.1)";
};
};
extraUpstreams = lib.mkOption {
type = lib.types.listOf (lib.types.submodule {
options = {
socket_addr = lib.mkOption {
type = lib.types.str;
description = "Socket address of the upstream DNS server (e.g., \"1.1.1.1:853\" or \"[2606:4700:4700::1111]:853\").";
};
protocol = lib.mkOption {
type = lib.types.enum ["udp" "tcp" "tls" "https" "quic"];
description = "Protocol to use for upstream DNS queries.";
};
};
});
default = [];
description = "List of additional upstream DNS server configurations.";
};
};
config = lib.mkIf cfg.enable {
services.crab-hole.settings = lib.mkMerge [
{
api = {
port = cfg.port;
listen = cfg.listen;
show_doc = cfg.show_doc;
};
downstream = cfg.extraDownstreams;
upstream.name_servers = cfg.extraUpstreams;
}
(lib.mkIf cfg.downstreams.loopback.enable {
downstream = [
{
protocol = "udp";
listen = "localhost";
port = 53;
}
];
})
(lib.mkIf cfg.upstreams.cloudFlare.enable {
upstream.name_servers = [
{
socket_addr = "1.1.1.1:853";
protocol = "tls";
tls_dns_name = "1dot1dot1dot1.cloudflare-dns.com";
trust_nx_responses = false;
}
{
socket_addr = "1.0.0.1:853";
protocol = "tls";
tls_dns_name = "1dot1dot1dot1.cloudflare-dns.com";
trust_nx_responses = false;
}
{
socket_addr = "[2606:4700:4700::1111]:853";
protocol = "tls";
tls_dns_name = "1dot1dot1dot1.cloudflare-dns.com";
trust_nx_responses = false;
}
{
socket_addr = "[2606:4700:4700::1001]:853";
protocol = "tls";
tls_dns_name = "1dot1dot1dot1.cloudflare-dns.com";
trust_nx_responses = false;
}
];
})
];
# Open firewall if requested
networking.firewall = lib.mkMerge [
(lib.mkIf cfg.openFirewall {
allowedTCPPorts = [cfg.port];
})
(lib.mkIf (cfg.downstreams.loopback.enable && cfg.downstreams.loopback.openFirewall) {
allowedUDPPorts = [53];
})
];
};
}

View file

@ -0,0 +1,6 @@
{...}: {
imports = [
./crab-hole.nix
./impermanence.nix
];
}

View file

@ -0,0 +1,26 @@
{
lib,
config,
...
}: let
workingDirectory = "/var/lib/private/crab-hole";
in {
config = lib.mkIf (config.services.immich.enable && config.host.impermanence.enable) {
assertions = [
{
assertion =
config.systemd.services.crab-hole.serviceConfig.WorkingDirectory == (builtins.replaceStrings ["/private"] [""] workingDirectory);
message = "crab-hole working directory does not match persistence";
}
];
environment.persistence."/persist/system/root" = {
directories = [
{
directory = workingDirectory;
user = "crab-hole";
group = "crab-hole";
}
];
};
};
}

View file

@ -8,6 +8,7 @@
./actual
./bazarr
./crab-hole
./flaresolverr
./forgejo
./home-assistant

View file

@ -30,6 +30,7 @@
sonarr = 2015;
bazarr = 2016;
lidarr = 2017;
crab-hole = 2018;
};
gids = {
@ -52,6 +53,7 @@
sonarr = 2015;
bazarr = 2016;
lidarr = 2017;
crab-hole = 2018;
};
users = config.users.users;
@ -229,6 +231,12 @@ in {
isSystemUser = true;
group = config.users.users.lidarr.name;
};
crab-hole = {
uid = lib.mkForce uids.crab-hole;
isSystemUser = true;
group = config.users.users.crab-hole.name;
};
};
groups = {
@ -381,6 +389,13 @@ in {
users.lidarr.name
];
};
crab-hole = {
gid = lib.mkForce gids.crab-hole;
members = [
users.crab-hole.name
];
};
};
};
}