aboutsummaryrefslogtreecommitdiff
path: root/gnu/services/certbot.scm
blob: 8e6784df2b62fc9ebf22fa70edb8b0ad91223df0 (about) (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
;;; GNU Guix --- Functional package management for GNU
;;; Copyright © 2016 Nikita <nikita@n0.is>
;;; Copyright © 2016 Sou Bunnbu <iyzsong@member.fsf.org>
;;; Copyright © 2017, 2018 Clément Lassieur <clement@lassieur.org>
;;; Copyright © 2019 Julien Lepiller <julien@lepiller.eu>
;;; Copyright © 2020 Jack Hill <jackhill@jackhill.us>
;;; Copyright © 2020 Tobias Geerinckx-Rice <me@tobias.gr>
;;; Copyright © 2021 Raghav Gururajan <rg@raghavgururajan.name>
;;;
;;; This file is part of GNU Guix.
;;;
;;; GNU Guix is free software; you can redistribute it and/or modify it
;;; under the terms of the GNU General Public License as published by
;;; the Free Software Foundation; either version 3 of the License, or (at
;;; your option) any later version.
;;;
;;; GNU Guix is distributed in the hope that it will be useful, but
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
;;; GNU General Public License for more details.
;;;
;;; You should have received a copy of the GNU General Public License
;;; along with GNU Guix.  If not, see <http://www.gnu.org/licenses/>.

(define-module (gnu services certbot)
  #:use-module (gnu services)
  #:use-module (gnu services base)
  #:use-module (gnu services shepherd)
  #:use-module (gnu services mcron)
  #:use-module (gnu services web)
  #:use-module (gnu system shadow)
  #:use-module (gnu packages tls)
  #:use-module (guix i18n)
  #:use-module (guix records)
  #:use-module (guix gexp)
  #:use-module (srfi srfi-1)
  #:use-module (ice-9 match)
  #:export (certbot-service-type
            certbot-configuration
            certbot-configuration?
            certificate-configuration))

;;; Commentary:
;;;
;;; Automatically obtaining TLS certificates from Let's Encrypt.
;;;
;;; Code:


(define-record-type* <certificate-configuration>
  certificate-configuration make-certificate-configuration
  certificate-configuration?
  (name                certificate-configuration-name
                       (default #f))
  (domains             certificate-configuration-domains
                       (default '()))
  (challenge           certificate-configuration-challenge
                       (default #f))
  (csr                 certificate-configuration-csr
                       (default #f))
  (authentication-hook certificate-authentication-hook
                       (default #f))
  (cleanup-hook        certificate-cleanup-hook
                       (default #f))
  (deploy-hook         certificate-configuration-deploy-hook
                       (default #f)))

(define-record-type* <certbot-configuration>
  certbot-configuration make-certbot-configuration
  certbot-configuration?
  (package             certbot-configuration-package
                       (default certbot))
  (webroot             certbot-configuration-webroot
                       (default "/var/www"))
  (certificates        certbot-configuration-certificates
                       (default '()))
  (email               certbot-configuration-email
                       (default #f))
  (server              certbot-configuration-server
                       (default #f))
  (rsa-key-size        certbot-configuration-rsa-key-size
                       (default #f))
  (default-location    certbot-configuration-default-location
                       (default
                         (nginx-location-configuration
                          (uri "/")
                          (body
                           (list "return 301 https://$host$request_uri;"))))))

(define certbot-command
  (match-lambda
    (($ <certbot-configuration> package webroot certificates email
                                server rsa-key-size default-location)
     (let* ((certbot (file-append package "/bin/certbot"))
            (rsa-key-size (and rsa-key-size (number->string rsa-key-size)))
            (commands
             (map
              (match-lambda
                (($ <certificate-configuration> custom-name domains challenge
                                                csr authentication-hook
                                                cleanup-hook deploy-hook)
                 (let ((name (or custom-name (car domains))))
                   (if challenge
                     (append
                      (list name certbot "certonly" "-n" "--agree-tos"
                            "--manual"
                            (string-append "--preferred-challenges=" challenge)
                            "--cert-name" name
                            "--manual-public-ip-logging-ok"
                            "-d" (string-join domains ","))
                      (if csr `("--csr" ,csr) '())
                      (if email
                          `("--email" ,email)
                          '("--register-unsafely-without-email"))
                      (if server `("--server" ,server) '())
                      (if rsa-key-size `("--rsa-key-size" ,rsa-key-size) '())
                      (if authentication-hook
                          `("--manual-auth-hook" ,authentication-hook)
                          '())
                      (if cleanup-hook `("--manual-cleanup-hook" ,cleanup-hook) '())
                      (if deploy-hook `("--deploy-hook" ,deploy-hook) '()))
                     (append
                      (list name certbot "certonly" "-n" "--agree-tos"
                            "--webroot" "-w" webroot
                            "--cert-name" name
                            "-d" (string-join domains ","))
                      (if csr `("--csr" ,csr) '())
                      (if email
                          `("--email" ,email)
                          '("--register-unsafely-without-email"))
                      (if server `("--server" ,server) '())
                      (if rsa-key-size `("--rsa-key-size" ,rsa-key-size) '())
                      (if deploy-hook `("--deploy-hook" ,deploy-hook) '()))))))
              certificates)))
       (program-file
        "certbot-command"
        #~(begin
            (use-modules (ice-9 match))
            (let ((code 0))
              (for-each
               (match-lambda
                 ((name . command)
                  (begin
                    (format #t "Acquiring or renewing certificate: ~a~%" name)
                    (set! code (or (apply system* command) code)))))
               '#$commands) code)))))))

(define (certbot-renewal-jobs config)
  (list
   ;; Attempt to renew the certificates twice per day, at a random minute
   ;; within the hour.  See https://eff-certbot.readthedocs.io/.
   #~(job '(next-minute-from (next-hour '(0 12)) (list (random 60)))
          #$(certbot-command config))))

(define (certbot-activation config)
  (let* ((certbot-directory "/var/lib/certbot")
         (certbot-cert-directory "/etc/letsencrypt/live")
         (script (in-vicinity certbot-directory "renew-certificates"))
         (message (format #f (G_ "~a may need to be run~%") script)))
    (match config
      (($ <certbot-configuration> package webroot certificates email
                                  server rsa-key-size default-location)
       (with-imported-modules '((guix build utils))
         #~(begin
             (use-modules (guix build utils))
             (mkdir-p #$webroot)
             (mkdir-p #$certbot-directory)
             (mkdir-p #$certbot-cert-directory)
             (copy-file #$(certbot-command config) #$script)
             (display #$message)))))))

(define certbot-nginx-server-configurations
  (match-lambda
    (($ <certbot-configuration> package webroot certificates email
                                server rsa-key-size default-location)
     (list
      (nginx-server-configuration
       (listen '("80" "[::]:80"))
       (ssl-certificate #f)
       (ssl-certificate-key #f)
       (server-name
        (apply append (map certificate-configuration-domains certificates)))
       (locations
        (filter identity
                (list
                 (nginx-location-configuration
                  (uri "/.well-known")
                  (body (list (list "root " webroot ";"))))
                 default-location))))))))

(define certbot-service-type
  (service-type (name 'certbot)
                (extensions
                 (list (service-extension nginx-service-type
                                          certbot-nginx-server-configurations)
                       (service-extension activation-service-type
                                          certbot-activation)
                       (service-extension mcron-service-type
                                          certbot-renewal-jobs)))
                (compose concatenate)
                (extend (lambda (config additional-certificates)
                          (certbot-configuration
                           (inherit config)
                           (certificates
                            (append
                             (certbot-configuration-certificates config)
                             additional-certificates)))))
                (description
                 "Automatically renew @url{https://letsencrypt.org, Let's
Encrypt} HTTPS certificates by adjusting the nginx web server configuration
and periodically invoking @command{certbot}.")))
(link src target) (delete-file src))) '("/bin/dig" "/bin/delv" "/bin/nslookup" "/bin/host" "/bin/nsupdate" "/share/man/man1/dig.1" "/share/man/man1/host.1" "/share/man/man1/nslookup.1" "/share/man/man1/nsupdate.1")) #t)) ;; When and if guix provides user namespaces for the build process, ;; then the following can be uncommented and the subsequent "force-test" ;; will not be necessary. ;; ;; (add-before 'check 'set-up-loopback ;; (lambda _ ;; (system "bin/tests/system/ifconfig.sh up"))) (replace 'check (lambda _ ;; XXX Even ‘make force-test’ tries to create network interfaces ;; and fails. The only working target is the (trivial) fuzz test. (with-directory-excursion "fuzz" (invoke "make" "check")) #t))))) (synopsis "@acronym{DNS, Domain Name System} implementation") (description "BIND implements the @acronym{DNS, Domain Name System} protocols for the Internet. It is both a reference implementation of those protocols and production-grade software, suitable for use in high-volume and high-reliability applications. The name stands for \"Berkeley Internet Name Domain\" because the software originated in the early 1980s at the University of California at Berkeley. The @code{utils} output of this package contains the following command line utilities related to DNS name servers: @table @code @item delv DNS lookup and validation utility @item dig DNS lookup utility @item host DNS lookup utility @item nslookup Internet name servers interactive query utility @item nsupdate Dynamic DNS update utility @end table") (home-page "https://www.isc.org/bind/") (license (list license:mpl2.0)))) (define-public dnscrypt-proxy (package (name "dnscrypt-proxy") (version "1.9.5") (source (origin (method url-fetch) (uri (string-append "https://download.dnscrypt.org/dnscrypt-proxy/" "dnscrypt-proxy-" version ".tar.bz2")) (sha256 (base32 "1dhvklr4dg2vlw108n11xbamacaryyg3dbrg629b76lp7685p7z8")) (modules '((guix build utils))) (snippet ;; Delete bundled libltdl. XXX: This package also bundles ;; a modified libevent that cannot currently be removed. '(begin (delete-file-recursively "libltdl") #t)))) (build-system gnu-build-system) (arguments `(#:phases (modify-phases %standard-phases (add-after 'unpack 'autoreconf (lambda _ ;; Re-generate build files due to unbundling ltdl. ;; TODO: Prevent generating new libltdl and building it. ;; The system version is still favored and referenced. (invoke "autoreconf" "-vif")))))) (native-inputs (list pkg-config automake autoconf libtool)) (inputs (list libltdl libsodium)) (home-page "https://www.dnscrypt.org/") (synopsis "Securely send DNS requests to a remote server") (description "@command{dnscrypt-proxy} is a tool for securing communications between a client and a DNS resolver. It verifies that responses you get from a DNS provider was actually sent by that provider, and haven't been tampered with. For optimal performance it is recommended to use this as a forwarder for a caching DNS resolver such as @command{dnsmasq}, but it can also be used as a normal DNS \"server\". A list of public dnscrypt servers is included, and an up-to-date version is available at @url{https://download.dnscrypt.org/dnscrypt-proxy/dnscrypt-resolvers.csv}.") (license (list license:isc ;; Libevent and src/ext/queue.h is 3-clause BSD. license:bsd-3)))) (define-public dnscrypt-wrapper (package (name "dnscrypt-wrapper") (version "0.2.2") (source (origin (method url-fetch) (uri (string-append "https://github.com/cofyc/dnscrypt-wrapper/releases" "/download/v" version "/" name "-v" version ".tar.bz2")) (sha256 (base32 "1vhg4g0r687f51wcdn7z9w1hxapazx6vyh5rsr8wa48sljzd583g")))) (build-system gnu-build-system) (arguments `(#:make-flags '("CC=gcc") ;; TODO: Tests require ruby-cucumber and ruby-aruba. #:tests? #f #:phases (modify-phases %standard-phases (add-after 'unpack 'create-configure (lambda _ (invoke "make" "configure")))))) (native-inputs (list autoconf)) (inputs (list libevent libsodium)) (home-page "https://github.com/Cofyc/dnscrypt-wrapper") (synopsis "Server-side dnscrypt proxy") (description "@command{dnscrypt-wrapper} is a tool to expose a name server over the @code{dnscrypt} protocol. It can be used as an endpoint for the @command{dnscrypt-proxy} client to securely tunnel DNS requests between the two.") (license (list license:isc ;; Bundled argparse is MIT. TODO: package and unbundle. license:expat ;; dns-protocol.h and rfc1035.{c,h} is gpl2 or gpl3 (either). license:gpl2 license:gpl3)))) (define-public nsd (package (name "nsd") (version "4.7.0") (source (origin (method url-fetch) (uri (string-append "https://www.nlnetlabs.nl/downloads/nsd/nsd-" version ".tar.gz")) (sha256 (base32 "057jxhhyggqhy4swwqlwf1lflc96cfqpm200l1gr3lls557a9b4g")))) (build-system gnu-build-system) (arguments (list #:configure-flags #~(list "--enable-pie" ; fully benefit from tasty ASLR "--enable-ratelimit" "--enable-recvmmsg" "--enable-relro-now" ; protect GOT and .dtor areas "--disable-radix-tree" (string-append "--with-libevent=" #$(this-package-input "libevent")) (string-append "--with-ssl=" #$(this-package-input "openssl")) "--with-configdir=/etc" "--with-nsd_conf_file=/etc/nsd/nsd.conf" "--with-logfile=/var/log/nsd.log" "--with-pidfile=/var/db/nsd/nsd.pid" "--with-dbfile=/var/db/nsd/nsd.db" "--with-zonesdir=/etc/nsd" "--with-xfrdfile=/var/db/nsd/xfrd.state" "--with-zonelistfile=/var/db/nsd/zone.list") #:phases #~(modify-phases %standard-phases (add-before 'configure 'patch-installation-paths (lambda _ (let ((doc (string-append #$output "/share/doc/" #$name "-" #$version))) ;; The ‘make install’ target tries to create the parent ;; directories of run-time things like ‘pidfile’ above, and ;; useless empty directories like 'configdir'. Remove such ;; '$(INSTALL)' lines and install the example configuration file ;; in an appropriate location. (substitute* "Makefile.in" ((".*INSTALL.*\\$\\((config|pid|xfr|db)dir" command) (string-append "#" command)) (("\\$\\(nsdconfigfile\\)\\.sample" file-name) (string-append doc "/examples/" file-name))))))) #:tests? #f)) ; no tests (inputs (list libevent openssl)) (home-page "https://www.nlnetlabs.nl/projects/nsd/about/") (synopsis "Authoritative DNS name server") (description "@dfn{NSD}, short for Name Server Daemon, is an authoritative name server for the Domain Name System (@dfn{DNS}). It aims to be a fast and RFC-compliant nameserver. NSD uses zone information compiled via @command{zonec} into a binary database file (@file{nsd.db}). This allows fast startup of the name service daemon and allows syntax-structural errors in zone files to be flagged at compile time, before being made available to NSD service itself. However, most traditional BIND-style zone files can be directly imported into NSD without modification. The collection of programs and processes that make up NSD are designed so that the daemon itself runs as a non-privileged user and can be easily configured to run in a @code{chroot} jail, thus making any security flaws in NSD less likely to result in system-wide compromise.") (license (list license:bsd-3)))) (define-public rbldnsd (package (name "rbldnsd") (version "0.998b") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/spamhaus/rbldnsd") (commit version))) (file-name (git-file-name name version)) (sha256 (base32 "0jj3kyir43qnjgd9rk0wz13iggf3p4p1779v0wgmx3ci0ypnglcr")))) (build-system gnu-build-system) (arguments `(#:phases (modify-phases %standard-phases (replace 'configure ;; The ./configure is hand-written and doesn't ignore unknown ;; standard autotools options like CONFIG_SHELL. (lambda _ (invoke "./configure"))) (replace 'install ;; There is no Makefile ‘install’ target. contrib/debian/rules has ;; one but relies on Debian-specific helpers, so install manually. (lambda* (#:key outputs #:allow-other-keys) (let* ((out (assoc-ref outputs "out")) (sbin (string-append out "/sbin")) (man8 (string-append out "/share/man/man8"))) (install-file "rbldnsd" sbin) (install-file "rbldnsd.8" man8))))))) (inputs (list zlib)) (native-inputs ;; For running the test suite. Python 3 is not yet supported by a release: ;; see <https://github.com/spamhaus/rbldnsd/issues/16>. `(("python" ,python-2))) (home-page "https://rbldnsd.io/") (synopsis "Small nameserver to efficiently serve @acronym{DNSBL, DNS blocklists}") (description "This package contains a small DNS daemon especially made to handle queries of @acronym{DNSBL, DNS blocklists}, a simple way to publish IP addresses and/or (domain) names which are somehow notable. Such lists are frequently used to refuse e-mail service to clients known to send unwanted (spam) messages. @command{rbldnsd} is not a general-purpose nameserver. It answers to a limited variety of queries. This makes it extremely fast---greatly outperforming both BIND and djbdns---whilst using relatively little memory.") (license (list license:bsd-3 ; btrie.[ch] license:lgpl2.1+ ; qsort.c license:gpl2+)))) ; the rest (define-public unbound (package (name "unbound") (version "1.21.0") (source (origin (method url-fetch) (uri (string-append "https://www.unbound.net/downloads/unbound-" version ".tar.gz")) (sha256 (base32 "08a5l5z0c99433pqg2i7x5d9m6as7c2z3sv4zakdy6zqn3bagp77")))) (build-system gnu-build-system) (outputs '("out" "python")) (native-inputs (list flex swig python-wrapper)) (inputs (list expat libevent `(,nghttp2 "lib") protobuf python-wrapper openssl)) (arguments `(#:configure-flags (list "--disable-static" ; save space and non-determinism in libunbound.a (string-append "--with-libnghttp2=" (assoc-ref %build-inputs "nghttp2")) (string-append "--with-ssl=" (assoc-ref %build-inputs "openssl")) (string-append "--with-libevent=" (assoc-ref %build-inputs "libevent")) (string-append "--with-libexpat=" (assoc-ref %build-inputs "expat")) "--with-pythonmodule" "--with-pyunbound") #:phases (modify-phases %standard-phases (add-after 'configure 'fix-python-site-package-path ;; Move python modules into their own output. (lambda* (#:key outputs #:allow-other-keys) (let ((pyout (assoc-ref outputs "python")) (ver ,(version-major+minor (package-version python)))) (substitute* "Makefile" (("^PYTHON_SITE_PKG=.*$") (string-append "PYTHON_SITE_PKG=" pyout "/lib/python-" ver "/site-packages\n")))))) (add-before 'check 'fix-missing-nss-for-tests ;; Unfortunately, the package's unittests involve some checks ;; looking up protocols and services which are not provided ;; by the minimalistic build environment, in particular, ;; /etc/protocols and /etc/services are missing. ;; Also, after plain substitution of protocol and service names ;; in the test data, the tests still fail because the ;; corresponding Resource Records have been signed by ;; RRSIG records. ;; The following LD_PRELOAD library overwrites the glibc ;; functions ‘get{proto,serv}byname’, ‘getprotobynumber’ and ;; ‘getservbyport’ providing the few records required for the ;; unit tests to pass. (lambda* (#:key inputs outputs #:allow-other-keys) (let* ((source (assoc-ref %build-inputs "source")) (gcc (assoc-ref %build-inputs "gcc"))) (call-with-output-file "/tmp/nss_preload.c" (lambda (port) (display "#include <stdlib.h> #include <string.h> #include <strings.h> #include <netdb.h> struct protoent *getprotobyname(const char *name) { struct protoent *p = malloc(sizeof(struct protoent)); p->p_aliases = malloc(sizeof(char*)); if (strcasecmp(name, \"tcp\") == 0) { p->p_name = \"tcp\"; p->p_proto = 6; p->p_aliases[0] = \"TCP\"; } else if (strcasecmp(name, \"udp\") == 0) { p->p_name = \"udp\"; p->p_proto = 17; p->p_aliases[0] = \"UDP\"; } else p = NULL; return p; } struct protoent *getprotobynumber(int proto) { struct protoent *p = malloc(sizeof(struct protoent)); p->p_aliases = malloc(sizeof(char*)); switch(proto) { case 6: p->p_name = \"tcp\"; p->p_proto = 6; p->p_aliases[0] = \"TCP\"; break; case 17: p->p_name = \"udp\"; p->p_proto = 17; p->p_aliases[0] = \"UDP\"; break; default: p = NULL; break; } return p; } struct servent *getservbyname(const char *name, const char *proto) { struct servent *s = malloc(sizeof(struct servent)); char* buf = malloc((strlen(proto)+1)*sizeof(char)); strcpy(buf, proto); s->s_aliases = malloc(sizeof(char*)); s->s_aliases[0] = NULL; if (strcasecmp(name, \"domain\") == 0) { s->s_name = \"domain\"; s->s_port = htons(53); s->s_proto = buf; } else s = NULL; return s; } struct servent *getservbyport(int port, const char *proto) { char buf[32]; struct servent *s = malloc(sizeof(struct servent)); strcpy(buf, proto); s->s_aliases = malloc(sizeof(char*)); s->s_aliases[0] = NULL; switch(port) { case 53: s->s_name = \"domain\"; s->s_port = 53; s->s_proto = \"udp\"; break; default: s = NULL; break; } return s; }" port))) (invoke (string-append gcc "/bin/gcc") "-shared" "-fPIC" "-o" "/tmp/nss_preload.so" "/tmp/nss_preload.c") ;; The preload library only affects the unittests. (substitute* "Makefile" (("./unittest") "LD_PRELOAD=/tmp/nss_preload.so ./unittest")))))))) (home-page "https://www.unbound.net") (synopsis "Validating, recursive, and caching DNS resolver") (description "Unbound is a recursive-only caching DNS server which can perform DNSSEC validation of results. It implements only a minimal amount of authoritative service to prevent leakage to the root nameservers: forward lookups for localhost, reverse for @code{127.0.0.1} and @code{::1}, and NXDOMAIN for zones served by AS112. Stub and forward zones are supported.") (license license:bsd-4))) (define-public yadifa (package (name "yadifa") (version "2.6.4") (source (let ((build "10892")) (origin (method url-fetch) (uri (string-append "https://www.yadifa.eu/sites/default/files/releases/" "yadifa-" version "-" build ".tar.gz")) (sha256 (base32 "0wdm0gc01bhd04p3jqxy3y8lgx5v8wlm8saiy35llna5ssi77fyq"))))) (build-system gnu-build-system) (native-inputs (list which)) (inputs (list openssl)) (arguments `(#:phases (modify-phases %standard-phases (add-after 'unpack 'unhard-code (lambda _ (substitute* (list "lib/dnslg/Makefile.in" "lib/dnsdb/Makefile.in" "lib/dnscore/Makefile.in") (("/usr/bin/(install)" _ command) command)))) (add-before 'configure 'omit-example-configurations (lambda _ (substitute* "Makefile.in" ((" (etc|var)") "")))) (add-after 'configure 'omit-spurious-references (lambda _ ;; The many Makefile.in grep this(!) to #define BUILD_OPTIONS. (substitute* "config.log" (("(=/gnu/store/)[^-]*" _ match) (string-append match "...")))))) #:configure-flags (list "--sysconfdir=/etc" "--localstatedir=/var" "--enable-shared" "--disable-static" "--disable-build-timestamp" ; build reproducibly "--enable-tcp-manager"))) (home-page "https://www.yadifa.eu/") (synopsis "Authoritative DNS name server") (description "YADIFA is an authoritative name server for the @dfn{Domain Name System} (DNS). It aims for both higher performance and a smaller memory footprint than other implementations, while remaining fully RFC-compliant. YADIFA supports dynamic record updates and the @dfn{Domain Name System Security Extensions} (DNSSEC).") (license license:bsd-3))) (define-public knot (package (name "knot") (version "3.3.8") (source (origin (method git-fetch) (uri (git-reference (url "https://gitlab.nic.cz/knot/knot-dns") (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 (base32 "0iaardlmvcp6f0vccs81f202bb53y7fkcw5n12ahgqymqzhafpmq")) (modules '((guix build utils))) (snippet '(begin ;; Remove Ragel-generated C files. We'll recreate them below. (for-each delete-file (find-files "." "\\.c\\.[gt].")) (delete-file "src/libknot/yparser/ypbody.c") ;; Remove bundled libraries to ensure we always use the system's. (with-directory-excursion "src/contrib" (for-each delete-file-recursively ;; TODO: package libngtcp2 for DoQ (‘QUIC’) support. '("libngtcp2"))))))) (build-system gnu-build-system) (outputs (list "out" "doc" "lib" "tools")) (arguments (list #:configure-flags #~(list (string-append "--docdir=" #$output:doc "/share/" #$name "-" #$version) (string-append "--infodir=" #$output:doc "/share/info") (string-append "--libdir=" #$output:lib "/lib") "--sysconfdir=/etc" "--localstatedir=/var" "--disable-static" ; static libraries are built by default "--enable-dnstap" ; let tools read/write capture files "--enable-fastparser" ; disabled by default when .git/ exists "--enable-xdp=yes" "--with-module-dnstap=yes") ; detailed query capturing & logging #:phases #~(modify-phases %standard-phases (add-after 'unpack 'link-missing-libbpf-dependency ;; Linking against -lbpf later would fail to find -lz: libbpf.pc has ;; zlib in its Requires.private (not Requires) field. Add it here. (lambda _ (substitute* "configure.ac" (("enable_xdp=yes" match) (string-append match "\nlibbpf_LIBS=\"$libbpf_LIBS -lz\""))))) (add-before 'bootstrap 'update-parser (lambda _ (with-directory-excursion "src" (invoke "sh" "../scripts/update-parser.sh")))) (add-before 'configure 'disable-directory-pre-creation (lambda _ ;; Don't install empty directories like ‘/etc’ outside the store. ;; This is needed even when using ‘make config_dir=... install’. (substitute* "src/Makefile.in" (("\\$\\(INSTALL\\) -d") "true")))) (add-after 'build 'build-info (lambda* (#:key make-flags parallel-build? #:allow-other-keys) (apply invoke "make" "info" `(,@(if parallel-build? `("-j" ,(number->string (parallel-job-count))) '()) ,@make-flags)))) (replace 'install (lambda* (#:key make-flags parallel-build? #:allow-other-keys) (let* ((doc (string-append #$output "/share/doc/" #$name "-" #$version)) (etc (string-append doc "/examples/etc"))) (apply invoke "make" "install" (string-append "config_dir=" etc) `(,@(if parallel-build? `("-j" ,(number->string (parallel-job-count))) '()) ,@make-flags))))) (add-after 'install 'install-info (lambda* (#:key make-flags parallel-build? #:allow-other-keys) (apply invoke "make" "install-info" `(,@(if parallel-build? `("-j" ,(number->string (parallel-job-count))) '()) ,@make-flags)))) (add-after 'install 'break-circular-:lib->:out-reference (lambda _ (for-each (lambda (file) (substitute* file (("(prefix=).*" _ assign) (string-append assign #$output:lib "\n")))) (find-files #$output:lib "\\.pc$")))) (add-after 'install 'split:tools (lambda _ (define (move source target file) (mkdir-p (dirname (string-append target "/" file))) (rename-file (string-append source "/" file) (string-append target "/" file))) (move #$output #$output:tools "bin") (move #$output #$output:tools "share/man/man1")))))) (native-inputs (list autoconf automake libtool pkg-config python-sphinx ragel texinfo)) (inputs (list fstrm gnutls jansson libbpf-0.8 libcap-ng libedit libelf libidn libmnl `(,nghttp2 "lib") liburcu lmdb ncurses protobuf-c)) (home-page "https://www.knot-dns.cz/") (synopsis "Authoritative DNS name server") (description "Knot DNS is an authoritative name server for the @dfn{Domain Name System} (DNS), designed to meet the needs of root and @dfn{top-level domain} (TLD) name servers. It is implemented as a threaded daemon and uses a number of programming techniques to improve speed. For example, the responder is completely lock-free, resulting in a very high response rate. Other features include automatic @dfn{DNS Security Extensions} (DNSSEC) signing, dynamic record synthesis, and on-the-fly re-configuration.") (license (list ;; src/contrib/{hat-trie,murmurhash3,openbsd}, ;; src/dnssec/contrib/vpool.[ch], and parts of libtap/ are ‘MIT’ (expat). license:expat license:lgpl2.0+ ; parts of scr/contrib/ucw license:public-domain ; src/contrib/fnv and possibly murmurhash3 license:gpl3+)))) ; everything else (define-public knot-resolver (package (name "knot-resolver") (version "5.7.4") (source (origin (method url-fetch) (uri (string-append "https://secure.nic.cz/files/knot-resolver/" "knot-resolver-" version ".tar.xz")) (sha256 (base32 "1j6rig8mb4sh11q6cfhqmlsaxw41fwiglkflz8d08a38y3nacvbb")))) (build-system meson-build-system) (outputs '("out" "doc")) (arguments '(#:configure-flags '("-Ddoc=enabled") #:phases (modify-phases %standard-phases (add-before 'configure 'disable-default-ta (lambda _ ;; Disable the default managed root TA, since we don't have ;; write access to the keyfile and its directory in store. (substitute* "daemon/lua/sandbox.lua.in" (("^trust_anchors\\.add_file.*") "")))) (add-after 'build 'build-doc (lambda _ (invoke "ninja" "doc"))) (add-after 'install 'move-doc (lambda* (#:key outputs #:allow-other-keys) ;; Move the manual and the example configuration files to the ;; "doc" output. (let ((out (assoc-ref outputs "out")) (doc (assoc-ref outputs "doc"))) (mkdir-p (string-append doc "/share/doc/knot-resolver")) (for-each (lambda (dir) (rename-file (string-append out "/share/" dir) (string-append doc "/share/" dir))) '("doc/knot-resolver/examples" "doc/knot-resolver/html" "info"))))) (add-after 'install 'wrap-binary (lambda* (#:key inputs outputs #:allow-other-keys) (let* ((out (assoc-ref outputs "out")) (lua-* (map cdr (filter (lambda (input) (string-prefix? "lua-" (car input))) inputs))) (lua-path (lambda (p) (string-append p "/share/lua/5.1/?.lua"))) (lua-cpath (lambda (p) (string-append p "/lib/lua/5.1/?.so")))) (wrap-program (string-append out "/sbin/kresd") `("LUA_PATH" ";" prefix ,(map lua-path lua-*)) `("LUA_CPATH" ";" prefix ,(map lua-cpath lua-*))))))))) (native-inputs (list cmocka ; for unit tests doxygen protobuf-c pkg-config python-breathe python-sphinx python-sphinx-rtd-theme texinfo)) (inputs `(("bash" ,bash-minimal) ;for wrap-program ("fstrm" ,fstrm) ("gnutls" ,gnutls) ("knot:lib" ,knot "lib") ("libuv" ,libuv) ("lmdb" ,lmdb) ("luajit" ,luajit) ;; TODO: Add optional lua modules: basexx and psl. ("lua-bitop" ,lua5.1-bitop) ("nghttp2" ,nghttp2 "lib") ("python" ,python))) (home-page "https://www.knot-resolver.cz/") (synopsis "Caching validating DNS resolver") (description "Knot Resolver is a caching full resolver implementation written in C and LuaJIT, both a resolver library and a daemon.") (license (list license:gpl3+ ;; Some 'contrib' files are under MIT, CC0 and LGPL2. license:expat license:cc0 license:lgpl2.0)))) (define-public hnsd (package (name "hnsd") (version "1.0.0") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/handshake-org/hnsd") (commit (string-append "v" version)))) (sha256 (base32 "1kdgff8rf8gmvwz2p758ilbjxpvz4xm6z41pa5353asg6xb853bb")) (file-name (git-file-name name version)) (modules '((guix build utils))) (snippet '(begin ;; Delete the bundled copy of libuv. (delete-file-recursively "uv") (substitute* "configure.ac" (("AC_CONFIG_SUBDIRS\\(\\[uv\\]\\)") "")) (substitute* "Makefile.am" (("SUBDIRS = uv") "\n") (("\\$\\(top_builddir\\)/uv/libuv.la") "-luv") ;; Make sure the 'hnsd' binary is installed and ;; dynamically-linked. (("noinst_PROGRAMS") "bin_PROGRAMS") (("hnsd_LDFLAGS = -static") "")) ;; This script tries to chdir to "uv" and doesn't do more ;; than "autoreconf" so remove it. (delete-file "autogen.sh") #t)))) (build-system gnu-build-system) (arguments '(#:configure-flags '("--disable-static"))) ;no need for libhsk.a (native-inputs (list autoconf automake libtool)) (inputs (list unbound libuv)) (home-page "https://www.handshake.org/") (synopsis "Resolver daemon for the Handshake naming protocol") (description "@command{hnsd} is a @dfn{host name resolver} for the Handshake Naming System (HNS) peer-to-peer network.") (license license:expat))) (define-public libmicrodns (package (name "libmicrodns") (version "0.1.2") (source (origin (method url-fetch) (uri (string-append "https://github.com/videolabs/libmicrodns/" "releases/download/" version "/microdns-" version ".tar.xz")) (sha256 (base32 "0p4va18zxgmzcdwhlbg2mmjwswlbgqy4ay5vaxrw7cxmhsflnv36")))) (build-system meson-build-system) (home-page "https://github.com/videolabs/libmicrodns") (synopsis "Minimal mDNS resolver library") (description "@code{libmicrodns} provides a minimal implementation of a mDNS resolver as well as an announcer. mDNS (Multicast Domain Name System) is a zero-config service that allows one to resolve host names to IP addresses in local networks.") (license license:lgpl2.1))) (define-public public-suffix-list ;; Mozilla releases the official list here: ;; ;; https://publicsuffix.org/list/public_suffix_list.dat ;; ;; However, Mozilla syncs that file from the GitHub repository periodically, ;; so its contents will change over time. If you update this commit, please ;; make sure that the new commit refers to a list which is identical to the ;; officially published list available from the URL above. (let ((commit "d2d3e2e36a8f2b68c4f09e8c87f4f1d685cbf5e7")) (package (name "public-suffix-list") (version (git-version "0" "2" commit)) (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/publicsuffix/list") (commit commit))) (file-name (git-file-name name version)) (sha256 (base32 "1f6rydx4hdd6lja376f4sdp7iv64vqlmhmnlkg0rb17279dc9483")))) (build-system copy-build-system) (arguments (list #:install-plan ;; Install to /share because that is where "read-only ;; architecture-independent data files" should go (see: (standards) ;; Directory Variables). Include the version in the directory name ;; so that if multiple versions are ever installed in the same ;; profile, they will not conflict. #~'(("public_suffix_list.dat" #$(string-append "/share/public-suffix-list-" version "/"))))) (home-page "https://publicsuffix.org/") (synopsis "Database of current and historical DNS suffixes") (description "This is the Public Suffix List maintained by Mozilla. A \"public suffix\" is one under which Internet users can (or historically could) directly register names in the Domain Name System (DNS). Some examples of public suffixes are .com, .co.uk and pvt.k12.ma.us. This is a list of all known public suffixes.") (license license:mpl2.0)))) (define-public maradns (package (name "maradns") (version "3.5.0022") (source (origin (method url-fetch) (uri (string-append "https://maradns.samiam.org/download/" (version-major+minor version) "/" version "/maradns-" version ".tar.xz")) (sha256 (base32 "1sw267jxxxngjcar8cj3jpxnpiz0szgkhlz5l46c67qs690w9kdi")))) (build-system gnu-build-system) (arguments `(#:tests? #f ; need to be root to run tests #:make-flags (list ,(string-append "CC=" (cc-for-target)) (string-append "PREFIX=" %output) (string-append "RPM_BUILD_ROOT=" %output)) #:phases (modify-phases %standard-phases (replace 'configure (lambda* (#:key native-inputs target #:allow-other-keys) ;; make_32bit_tables generates a header file that is used during ;; compilation. Hence, during cross compilation, it should be ;; built for the host system. (when target (substitute* "rng/Makefile" (("\\$\\(CC\\) -o make_32bit_tables") (string-append (assoc-ref native-inputs "gcc") "/bin/gcc -o make_32bit_tables")))) (invoke "./configure"))) (add-before 'install 'create-install-directories (lambda* (#:key outputs #:allow-other-keys) (let ((out (assoc-ref outputs "out"))) (for-each (lambda (dir) (mkdir-p (string-append out dir))) (list "/bin" "/sbin" "/etc" "/share/man/man1" "/share/man/man5" "/share/man/man8")) #t)))))) (home-page "https://maradns.samiam.org") (synopsis "Small lightweight DNS server") (description "MaraDNS is a small and lightweight DNS server. MaraDNS consists of a UDP-only authoritative DNS server for hosting domains, and a UDP and TCP-capable recursive DNS server for finding domains on the internet.") (license license:bsd-2))) (define-public openresolv (package (name "openresolv") (version "3.13.2") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/NetworkConfiguration/openresolv") (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 (base32 "03m8n0j0kxxm5kpl66gz4lxr1qqgrp8zlkaq9j8fz27fih0g75xf")) (patches (search-patches "openresolv-restartcmd-guix.patch")))) (build-system gnu-build-system) (arguments (list #:tests? #f ; No test suite #:configure-flags #~(list (string-append "--prefix=" #$output:out) "--sysconfdir=/etc" "--rundir=/run") #:phases #~(modify-phases %standard-phases (replace 'install (lambda* (#:key make-flags #:allow-other-keys) (apply invoke "make" "install" (string-append "SYSCONFDIR=" #$output "/etc") make-flags))) (add-after 'install 'wrap-program (lambda* (#:key inputs #:allow-other-keys) (substitute* (string-append #$output "/sbin/resolvconf") (("RESOLVCONF=\"\\$0\"") (format #f "RESOLVCONF=\"$0\"\nPATH=~a/bin:$PATH" (assoc-ref inputs "coreutils-minimal"))))))))) (inputs (list coreutils-minimal)) (home-page "https://roy.marples.name/projects/openresolv/") (synopsis "Resolvconf POSIX compliant implementation, a middleman for resolv.conf") (description "openresolv is an implementation of @command{resolvconf}, the middleman between the network configuration services and @file{/etc/resolv.conf}. @command{resolvconf} itself is just a script that stores, removes and lists a full @file{resolv.conf} generated for the interface. It then calls all the helper scripts it knows about so it can configure the real @file{/etc/resolv.conf} and optionally any local nameservers other than libc.") (license license:bsd-2))) (define-public smartdns (package (name "smartdns") (version "45") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/pymumu/smartdns") (commit (string-append "Release" version)))) (file-name (git-file-name name version)) (modules '((guix build utils))) (snippet '(substitute* "Makefile" ((".*SYSTEMDSYSTEMUNITDIR.*") ""))) (sha256 (base32 "1f0j6d8vz1x2f4nr2w3q7azkjh8hlkj81v61a8sw1kq5160qhlb9")))) (build-system gnu-build-system) (arguments (list #:test-target "test" #:make-flags #~(list (string-append "CC=" #$(cc-for-target)) (string-append "DESTDIR=" #$output) "PREFIX=''" (string-append "VER=" #$(package-version this-package))) #:phases #~(modify-phases %standard-phases (delete 'configure) (add-after 'unpack 'skip-unavailable-tests (lambda _ (with-directory-excursion "test/cases" ;; Tests try to open /etc/resolv.conf (substitute* "test-bind.cc" ;; Bind.tls (("smartdns::Server server_wrap;" all) (string-append "GTEST_SKIP();" all))) ;; Tests use ICMP ping. (substitute* (find-files ".") ((".*PING_TYPE_ICMP.*" all) (string-append "GTEST_SKIP();" all))) (delete-file "test-speed-check.cc")))) ;; Compiled .o files in build phase can't be used for tests. (add-after 'skip-unavailable-tests 'prepare-test-dir (lambda _ (copy-recursively "." "../test"))) (add-before 'check 'enter-test-dir (lambda _ (chdir "../test/test"))) (add-after 'check 'leave-test-dir (lambda _ (chdir "../../source")))))) (inputs (list openssl)) (native-inputs (list googletest `(,isc-bind "utils") which)) (home-page "https://github.com/pymumu/smartdns") (synopsis "Local DNS server") (description "SmartDNS is a DNS server that accepts DNS query requests from local clients, obtains DNS query results from multiple upstream DNS servers, and returns the fastest access results to clients.") (license license:gpl3+)))