1
0
Fork 0
mirror of https://github.com/mdlayher/homelab.git synced 2024-12-14 11:47:32 +00:00
mdlayher-homelab/nixos/routnerr-2/configuration.nix
Matt Layher 63dde90aa3
nixos/routnerr-2: allow NM/MM to coexist with dhcpcd
Signed-off-by: Matt Layher <mdlayher@gmail.com>
2020-07-05 10:12:59 -04:00

143 lines
3.5 KiB
Nix
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Edit this configuration file to define what should be installed on
# your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running nixos-help).
{ pkgs, ... }:
let
vars = import ./lib/vars.nix;
unstable = import <nixos-unstable-small> { };
in {
disabledModules = [
# Allow the use of additional exporters.
"services/monitoring/prometheus/exporters.nix"
# Allow the use of the settings Nix attribute set.
"services/networking/corerad.nix"
];
imports = [
# Hardware configuration and quirks.
<nixos-hardware/pcengines/apu>
./hardware-configuration.nix
# Base system configuration.
./lib/nix.nix
./lib/system.nix
./lib/users.nix
./lib/node_exporter.nix
# Base router networking.
./networking.nix
./nftables.nix
# Networking daemons.
./coredns.nix
./corerad.nix
./dhcpd4.nix
./dhcpd6.nix
./traefik.nix
./wgipamd.nix
# Unstable or out-of-tree modules.
<nixos-unstable-small/nixos/modules/services/monitoring/prometheus/exporters.nix>
<nixos-unstable-small/nixos/modules/services/networking/corerad.nix>
./lib/modules/wireguard_exporter.nix
./lib/modules/wgipamd.nix
];
# Overlays for unstable and out-of-tree packages.
nixpkgs.overlays = [
(self: super: {
go-toml = unstable.go-toml;
prometheus-apcupsd-exporter = unstable.prometheus-apcupsd-exporter;
wireguard_exporter =
super.callPackage ./lib/pkgs/wireguard_exporter.nix { };
})
];
# Use the GRUB 2 boot loader with MBR.
boot = {
kernel = {
sysctl = with vars.interfaces.wan0; {
# Forward on all interfaces.
"net.ipv4.conf.all.forwarding" = true;
"net.ipv6.conf.all.forwarding" = true;
# By default, not automatically configure any IPv6 addresses.
"net.ipv6.conf.all.accept_ra" = 0;
"net.ipv6.conf.all.autoconf" = 0;
"net.ipv6.conf.all.use_tempaddr" = 0;
# On WAN, allow IPv6 autoconfiguration and tempory address use.
"net.ipv6.conf.${name}.accept_ra" = 2;
"net.ipv6.conf.${name}.autoconf" = 1;
};
};
# Use GRUB in MBR mode.
loader.grub = {
enable = true;
version = 2;
device = "/dev/sda";
};
};
# Packages specific to this machine. The base package set is defined in
# lib/system.nix.
environment.systemPackages = with pkgs; [
# Stable packages.
bind
cbfstool
cmatrix
flashrom
libmbim
libqmi
# Unstable and out-of-tree packages.
wireguard_exporter
];
# Use server as a remote builder.
nix = {
distributedBuilds = true;
buildMachines = [{
hostName = "servnerr-3";
system = "x86_64-linux";
maxJobs = 8;
cores = 2;
speedFactor = 2;
supportedFeatures = [ "nixos-test" "benchmark" "big-parallel" "kvm" ];
}];
};
services = {
# Allow mDNS to reflect between VLANs where necessary for devices such as
# Google Home and Chromecast.
avahi = {
enable = true;
interfaces = with vars.interfaces; [ "${lan0.name}" "${iot0.name}" ];
ipv4 = true;
ipv6 = true;
reflector = true;
};
apcupsd.enable = true;
lldpd.enable = true;
# Enable the OpenSSH daemon.
openssh = {
enable = true;
passwordAuthentication = false;
permitRootLogin = "no";
};
prometheus.exporters.apcupsd.enable = true;
tftpd = {
enable = true;
path = "/var/lib/tftp";
};
};
}