panacea/modules/networking.nix

73 lines
1.7 KiB
Nix
Raw Normal View History

{ config, lib, pkgs, ... }:
{
# Set hostname, hostid and enable WiFi
networking = {
hostName = "panacea";
2020-05-08 21:53:52 +02:00
hostId = "8feb0bb8";
wireless.iwd.enable = true;
};
2022-03-28 18:08:23 +02:00
# Enable systemd-networkd
networking = {
useDHCP = false;
interfaces = {
enp0s31f6.useDHCP = true;
wlan0.useDHCP = true;
};
useNetworkd = true;
dhcpcd.enable = false;
};
systemd.services."systemd-networkd-wait-online".enable = false;
2022-08-16 13:12:34 +02:00
# Disable DNSSEC
services.resolved.dnssec = "false";
2022-04-29 18:12:46 +02:00
# Prioritize ethernet over WiFi
systemd.network.networks."40-enp0s31f6".dhcpV4Config.RouteMetric = 10;
systemd.network.networks."40-wlan0".dhcpV4Config.RouteMetric = 20;
2022-03-28 18:08:23 +02:00
# Static IP for home network
systemd.network.networks."24-home" = {
name = "wlan0";
matchConfig = {
Name = "wlan0";
SSID = "WiFi-5.0-CE42";
};
2022-07-12 20:49:08 +02:00
address = [ "192.168.13.131/24" ];
gateway = [ "192.168.13.1" ];
dns = [ "192.168.13.2" ];
2022-03-28 18:08:23 +02:00
networkConfig.DNSSEC = "no";
};
# Enable zeroconf
services.avahi = {
enable = true;
nssmdns = true;
};
2022-08-03 13:52:02 +02:00
# VPN setup
systemd.network.netdevs."wg0" = {
netdevConfig = {
Kind = "wireguard";
Name = "wg0";
};
wireguardConfig.PrivateKeyFile = config.age.secrets.wireguard.path;
wireguardPeers = [{
wireguardPeerConfig = {
PublicKey = "GN8lqPBZYOulh6xD4GhkoEWI65HMMCpSxJSH5871YnU=";
AllowedIPs = [ "0.0.0.0/0" ];
Endpoint = "coolneng.duckdns.org:443";
};
}];
};
systemd.network.networks."wg0" = {
matchConfig.Name = "wg0";
networkConfig = {
Address = "10.8.0.2/32";
DNS = "10.8.0.1";
};
routes = [{ routeConfig.Destination = "10.8.0.1"; }];
};
}