nixos/services/adguard.nix
ediblerope 79d7d3f88e adguard: explicitly enable LAN rewrites (schema change on stable)
AdGuard's recent config schema added an enabled flag on each rewrite
that defaults to false. Without it, the *.nordhammer.it -> 10.0.0.1
rules were silently disabled, so LAN clients resolved their own
domains to the public DDNS IP and tripped over NAT loopback.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-04-29 18:56:11 +01:00

52 lines
2 KiB
Nix

# services/adguard.nix — AdGuard Home network-wide DNS ad blocker
{ config, lib, pkgs, ... }:
{
config = lib.mkIf (config.networking.hostName == "FredOS-Mediaserver") {
services.adguardhome = {
enable = true;
# Web UI bound to localhost; nginx reverse-proxies at adguard.nordhammer.it
host = "127.0.0.1";
port = 3000;
# Nix is authoritative: settings below overwrite UI-made changes on rebuild
mutableSettings = false;
settings = {
dns = {
bind_hosts = [ "0.0.0.0" ];
port = 53;
# Query all upstreams in parallel; take the fastest response
upstream_mode = "parallel";
# Mix of DoH (encrypted) and plain UDP (low-latency) upstreams
upstream_dns = [
"https://dns.cloudflare.com/dns-query"
"https://dns.quad9.net/dns-query"
"1.1.1.1"
"9.9.9.9"
];
bootstrap_dns = [ "1.1.1.1" "9.9.9.9" ];
cache_size = 4194304;
cache_ttl_min = 60;
};
filters = [
{ enabled = true; id = 1; name = "AdGuard DNS filter";
url = "https://adguardteam.github.io/AdGuardSDNSFilter/Filters/filter.txt"; }
{ enabled = true; id = 2; name = "AdAway Default Blocklist";
url = "https://adaway.org/hosts.txt"; }
{ enabled = true; id = 3; name = "OISD Big";
url = "https://big.oisd.nl/"; }
];
# Resolve our own hostnames to the router's LAN IP so LAN clients
# bypass any NAT reflection. `enabled` was added in AdGuard's recent
# schema and defaults to false — must be set explicitly.
filtering.rewrites = [
{ domain = "nordhammer.it"; answer = "10.0.0.1"; enabled = true; }
{ domain = "*.nordhammer.it"; answer = "10.0.0.1"; enabled = true; }
];
};
};
# LAN DNS — router blocks WAN:53 so this is effectively LAN-only
networking.firewall.allowedTCPPorts = [ 53 ];
networking.firewall.allowedUDPPorts = [ 53 ];
};
}