configuration.nix/hosts/rico0/services/apps/blocky.nix

87 lines
2.1 KiB
Nix
Raw Normal View History

2024-07-06 22:41:07 +05:30
_: {
networking = {
firewall = {
allowedTCPPorts = [
53 #DNS
];
allowedUDPPorts = [
53 #DNS
];
};
};
systemd.services.blocky.unitConfig.After = [ "network-online.target" "wireguard-wg0.service" ];
2024-07-06 22:41:07 +05:30
services.blocky = {
enable = true;
settings = {
bootstrapDns = [ "tcp+udp:1.1.1.1" ];
upstreams = {
init.strategy = "blocking";
2024-07-06 22:41:07 +05:30
groups = {
default = [
2024-07-14 18:17:39 +05:30
# Cloudflare
"tcp+udp:1.1.1.1"
2024-07-06 22:41:07 +05:30
# Google
"tcp+udp:8.8.8.8"
"tcp+udp:8.8.4.4"
# Quad9
"tcp+udp:9.9.9.9"
"tcp+udp:149.112.112.112"
"tcp-tls:dns.quad9.net:853"
"https://dns.quad9.net/dns-query"
];
};
strategy = "parallel_best";
timeout = "2s";
userAgent = "Praise the DNS overlords!";
};
2024-07-14 18:17:24 +05:30
connectIPVersion = "v4";
2024-07-06 22:41:07 +05:30
customDNS = {
customTTL = "1h";
filterUnmappedTypes = true;
mapping = {
2024-07-16 22:39:42 +05:30
"frp.labs.adtya.xyz" = "10.10.10.10,fd7c:585c:c4ae::10";
2024-07-06 22:41:07 +05:30
};
};
conditional = {
fallbackUpstream = false;
mapping = {
"local.adtya.xyz" = "192.168.1.1";
"1.168.192.in-addr.arpa" = "192.168.1.1";
};
};
blocking = {
denylists = {
ads = [
"https://raw.githubusercontent.com/blocklistproject/Lists/master/ads.txt"
];
};
clientGroupsBlock = {
default = [ "ads" ];
};
};
clientLookup = {
upstream = "192.168.1.1";
singleNameOrder = [ 2 1 ];
};
2024-07-16 22:59:07 +05:30
prometheus = {
enable = true;
path = "/metrics";
};
2024-07-06 22:41:07 +05:30
ports = {
dns = "192.168.1.10:53,10.10.10.10:53";
tls = "192.168.1.10:853,10.10.10.10:853";
https = "192.168.1.10:8443,10.10.10.10:8443";
http = "192.168.1.10:8080,10.10.10.10:8080";
};
2024-07-14 18:17:01 +05:30
log = {
level = "warn";
format = "json";
timestamp = true;
privacy = true;
};
2024-07-06 22:41:07 +05:30
};
};
}