Have a DNS service running to allow users to tie services to their own domain #104
Labels
No labels
api service
blocked
bug
component: fediversity panel
component: nixops4
documentation
estimation high: >3d
estimation low: <2h
estimation mid: <8h
productisation
project-management
question
role: application developer
role: application operator
role: hosting provider
role: maintainer
security
technical debt
testing
type unclear
type: key result
type: objective
type: task
type: user story
user experience
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Blocks
Depends on
#110 desired subdomains are assigned to deployed services}
fediversity/fediversity
#228 brought into production}
fediversity/fediversity
#200 reproduce DNS VM
fediversity/fediversity
Reference: fediversity/fediversity#104
Loading…
Add table
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
implementation notes
powerdns
akapdns
(GPL-2.0, C++, stringly module), front-end powerdns-admin - procolix currently has most experience operating thishickory-dns
(MIT/Apache, rust, structured module)acme-dns
(MIT, go, semi-stringly module)bind
(Apache, C, structured module, wiki)technitium-dns-server
(GPL-3.0, python, simple module)core-dns
(stringly? module)tinydns
(stringly module)clan dyndns module: tied to their servicegodns
(module, providers)dns.nix
: zone filesif we may put off related front-ends until #350, we should be able to handle DNS using Nix options such as
NixOS-DNS
, including for the purpose of migration (#100).|godns
| | | | | |given this compatibility matrix, the path of least resistance to automating DNS would seem server
bind
(optionally with client octodns (thru TF / NixOS-DNS)).c.f.: