cleanup arachnide server configuration
This commit is contained in:
parent
a7df2c8aa1
commit
0700b75f3e
1 changed files with 20 additions and 57 deletions
|
@ -14,20 +14,20 @@
|
||||||
|
|
||||||
networking = {
|
networking = {
|
||||||
hostName = "arachnide"; # Define your hostname.
|
hostName = "arachnide"; # Define your hostname.
|
||||||
# Pick only one of the below networking options.
|
# primary network interface, connected to WAN through a router
|
||||||
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
|
|
||||||
# networking.networkmanager.enable = true; # Easiest to use and most distros use this by default.
|
|
||||||
interfaces.enp1s0.ipv4.addresses = [ {
|
interfaces.enp1s0.ipv4.addresses = [ {
|
||||||
address = "192.168.36.9";
|
address = "192.168.36.9";
|
||||||
prefixLength = 24;
|
prefixLength = 24;
|
||||||
} ];
|
} ];
|
||||||
|
defaultGateway = "192.168.36.1";
|
||||||
|
# secondary network interface connected to a private local network
|
||||||
interfaces.enp3s0.ipv4.addresses = [ {
|
interfaces.enp3s0.ipv4.addresses = [ {
|
||||||
address = "10.0.0.1";
|
address = "10.0.0.1";
|
||||||
prefixLength = 24;
|
prefixLength = 24;
|
||||||
} ];
|
} ];
|
||||||
defaultGateway = "192.168.36.1";
|
|
||||||
nameservers = [ "80.67.169.12" "80.67.169.40" "2001:910:800::12" "2001:910:800::40" ];
|
nameservers = [ "80.67.169.12" "80.67.169.40" "2001:910:800::12" "2001:910:800::40" ];
|
||||||
enableIPv6 = true;
|
enableIPv6 = true;
|
||||||
|
# wireguard VPN to be reachable from internet
|
||||||
wg-quick.interfaces = {
|
wg-quick.interfaces = {
|
||||||
wg0 = {
|
wg0 = {
|
||||||
address = [ "192.168.12.2/32" "2a01:4f9:1a:9a05::2/128" ];
|
address = [ "192.168.12.2/32" "2a01:4f9:1a:9a05::2/128" ];
|
||||||
|
@ -46,6 +46,22 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# Enable ip forwarding to route packets for the local network connected to enp3s0
|
||||||
|
boot.kernel.sysctl = {
|
||||||
|
"net.ipv4.ip_forward" = 1;
|
||||||
|
"net.ipv6.conf.all.forwarding" = 1;
|
||||||
|
};
|
||||||
|
|
||||||
|
# Open ports in the firewall.
|
||||||
|
# Or disable the firewall altogether.
|
||||||
|
# networking.firewall.enable = false;
|
||||||
|
networking.firewall.allowedTCPPorts = [ 80 144 443 ];
|
||||||
|
#networking.firewall.allowedUDPPorts = [ 53 ];
|
||||||
|
# allow UDP port range for mosh
|
||||||
|
networking.firewall.allowedUDPPortRanges = [
|
||||||
|
{ from = 60000; to = 61000; }
|
||||||
|
];
|
||||||
|
|
||||||
# Set your time zone.
|
# Set your time zone.
|
||||||
time.timeZone = "Etc/UTC";
|
time.timeZone = "Etc/UTC";
|
||||||
|
|
||||||
|
@ -78,13 +94,6 @@
|
||||||
wget
|
wget
|
||||||
tmux
|
tmux
|
||||||
htop
|
htop
|
||||||
memtester
|
|
||||||
# Useful podman development tools
|
|
||||||
#dive # look into docker image layers
|
|
||||||
podman-tui # status of containers in the terminal
|
|
||||||
#aardvark-dns
|
|
||||||
#docker-compose # start group of containers for dev
|
|
||||||
#podman-compose # start group of containers for dev
|
|
||||||
mosh
|
mosh
|
||||||
dig
|
dig
|
||||||
mtr
|
mtr
|
||||||
|
@ -96,51 +105,6 @@
|
||||||
vimAlias = true;
|
vimAlias = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
# Some programs need SUID wrappers, can be configured further or are
|
|
||||||
# started in user sessions.
|
|
||||||
# programs.mtr.enable = true;
|
|
||||||
# programs.gnupg.agent = {
|
|
||||||
# enable = true;
|
|
||||||
# enableSSHSupport = true;
|
|
||||||
# };
|
|
||||||
|
|
||||||
# List services that you want to enable:
|
|
||||||
|
|
||||||
boot.kernel.sysctl = {
|
|
||||||
"net.ipv4.ip_forward" = 1;
|
|
||||||
"net.ipv6.conf.all.forwarding" = 1;
|
|
||||||
};
|
|
||||||
|
|
||||||
# Open ports in the firewall.
|
|
||||||
# networking.firewall.allowedTCPPorts = [ ... ];
|
|
||||||
# networking.firewall.allowedUDPPorts = [ ... ];
|
|
||||||
# Or disable the firewall altogether.
|
|
||||||
# networking.firewall.enable = false;
|
|
||||||
networking.firewall.allowedTCPPorts = [ 80 144 443 ];
|
|
||||||
networking.firewall.allowedUDPPorts = [ 53 ];
|
|
||||||
networking.firewall.allowedUDPPortRanges = [
|
|
||||||
{ from = 60000; to = 61000; }
|
|
||||||
];
|
|
||||||
|
|
||||||
virtualisation.containers.enable = true;
|
|
||||||
virtualisation.podman = {
|
|
||||||
enable = true;
|
|
||||||
|
|
||||||
# Create a `docker` alias for podman, to use it as a drop-in replacement
|
|
||||||
dockerCompat = true;
|
|
||||||
|
|
||||||
# Required for containers under podman-compose to be able to talk to each other.
|
|
||||||
defaultNetwork.settings.dns_enabled = true;
|
|
||||||
};
|
|
||||||
#virtualisation.oci-containers.containers = {
|
|
||||||
# nixos = {
|
|
||||||
# image = "nix:latest"
|
|
||||||
# extraOptions = [ "--network=host" ];
|
|
||||||
# };
|
|
||||||
#};
|
|
||||||
|
|
||||||
|
|
||||||
# This value determines the NixOS release from which the default
|
# This value determines the NixOS release from which the default
|
||||||
# settings for stateful data, like file locations and database versions
|
# settings for stateful data, like file locations and database versions
|
||||||
# on your system were taken. It's perfectly fine and recommended to leave
|
# on your system were taken. It's perfectly fine and recommended to leave
|
||||||
|
@ -148,5 +112,4 @@
|
||||||
# Before changing this value read the documentation for this option
|
# Before changing this value read the documentation for this option
|
||||||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||||||
system.stateVersion = "24.05"; # Did you read the comment?
|
system.stateVersion = "24.05"; # Did you read the comment?
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue