1
0
Fork 0
mirror of https://github.com/mdlayher/homelab.git synced 2024-12-14 11:47:32 +00:00
mdlayher-homelab/nixos/routnerr-2/networking.nix
Matt Layher 9746f3547b
nixos/routnerr-2: add tengb0 on VLAN 100
Signed-off-by: Matt Layher <mdlayher@gmail.com>
2020-05-24 12:30:08 -04:00

134 lines
3.4 KiB
Nix

{ ... }:
let
vars = import ./lib/vars.nix;
# Produces the configuration for a LAN interface.
mkInterface = (ifi: {
ipv4.addresses = [{
address = "${ifi.ipv4}";
prefixLength = 24;
}];
ipv6.addresses = [
{
address = "${ifi.ipv6.lla}";
prefixLength = 64;
}
{
address = "${ifi.ipv6.ula}";
prefixLength = 64;
}
];
tempAddress = "disabled";
});
in {
# LAN interface.
networking = {
hostName = "routnerr-2";
nameservers = with vars.localhost; [ "${ipv4}" "${ipv6}" ];
dhcpcd = {
enable = true;
# Do not remove interface configuration on shutdown.
persistent = true;
allowInterfaces = [ "${vars.interfaces.wan0.name}" ];
extraConfig = with vars.interfaces; ''
noipv6rs
interface ${wan0.name}
ipv6rs
# DHCPv6-PD.
ia_na 0
ia_pd 1/::/56 ${enp2s0.name}/0/64 ${lab0.name}/2/64 ${guest0.name}/9/64 ${lan0.name}/10/64 ${iot0.name}/102/64 ${tengb0.name}/160/64
# IPv4 DHCP ISP settings overrides.
static domain_name_servers=${vars.localhost.ipv4}
static domain_search=
static domain_name=
'';
};
interfaces = with vars.interfaces; {
${enp2s0.name} = mkInterface enp2s0;
${lan0.name} = mkInterface lan0;
${lab0.name} = mkInterface lab0;
${guest0.name} = mkInterface guest0;
${iot0.name} = mkInterface iot0;
${tengb0.name} = mkInterface tengb0;
};
vlans = with vars.interfaces; {
${lab0.name} = {
id = 2;
interface = "${enp2s0.name}";
};
${guest0.name} = {
id = 9;
interface = "${enp2s0.name}";
};
${lan0.name} = {
id = 10;
interface = "${enp2s0.name}";
};
${iot0.name} = {
id = 66;
interface = "${enp2s0.name}";
};
${tengb0.name} = {
id = 100;
interface = "${enp2s0.name}";
};
};
wireguard = with vars.interfaces.wg0; {
enable = true;
interfaces = {
${name} = {
listenPort = 51820;
ips =
[ "${ipv4}/24" "${ipv6.gua}/64" "${ipv6.ula}/64" "${ipv6.lla}/64" ];
privateKeyFile = "/var/lib/wireguard/${name}.key";
peers = [
# mdlayher-fastly
{
publicKey = "VWRsPtbdGtcNyaQ+cFAZfZnYL05uj+XINQS6yQY5gQ8=";
allowedIPs = [
"192.168.20.0/24"
"2600:6c4a:7880:3220::/64"
"fd9e:1a04:f01d:20::/64"
"fe80::10/128"
];
}
# nerr-3
{
publicKey = "UvwWyMQ1ckLEG82Qdooyr0UzJhqOlzzcx90DXuwMTDA=";
allowedIPs = [
"192.168.20.0/24"
"2600:6c4a:7880:3220::/64"
"fd9e:1a04:f01d:20::/64"
];
}
];
};
};
};
nat.enable = false;
firewall.enable = false;
};
# Enable Prometheus exporter and set up peer key/name mappings.
# TODO: nixify the configuration.
services.wireguard_exporter = {
enable = true;
config = ''
[[peer]]
public_key = "VWRsPtbdGtcNyaQ+cFAZfZnYL05uj+XINQS6yQY5gQ8="
name = "mdlayher-fastly"
[[peer]]
public_key = "UvwWyMQ1ckLEG82Qdooyr0UzJhqOlzzcx90DXuwMTDA="
name = "nerr-3"
'';
};
}