hackens-org-configurations/machines/agb01/networking.nix

99 lines
2 KiB
Nix
Raw Normal View History

2024-10-10 01:00:01 +02:00
{
config,
lib,
pkgs,
...
}: {
2024-10-11 12:56:05 +02:00
boot.kernel.sysctl."net.ipv4.ip_forward" = true;
2024-10-10 01:00:01 +02:00
systemd.network = {
enable = true;
2024-10-11 12:56:05 +02:00
wait-online.anyInterface = true;
2024-10-10 01:00:01 +02:00
networks = {
"10-uplink" = {
name = "enu1u1";
DHCP = "yes";
};
"50-wg0" = {
name = "wg0";
address = [
"10.10.10.5/24"
];
};
"10-wifi" = {
name = "wlan0";
2024-10-11 12:56:05 +02:00
networkConfig.DHCPServer = "yes";
address = [
"192.168.55.1/24"
];
2024-10-10 01:00:01 +02:00
};
};
netdevs = {
"50-wg0" = {
netdevConfig = {
Name = "wg0";
Kind = "wireguard";
};
2024-10-11 12:56:05 +02:00
wireguardConfig.PrivateKeyFile = config.age.secrets."wg".path;
2024-10-10 01:00:01 +02:00
wireguardPeers = [
{
2024-10-11 12:56:05 +02:00
AllowedIPs = [
"10.10.10.0/24"
];
PublicKey = lib.trim (builtins.readFile ../../wg-keys/hackens-org.pub);
Endpoint = "129.199.129.76:1194";
PersistentKeepalive = 5;
2024-10-10 01:00:01 +02:00
}
];
};
};
};
2024-10-11 12:56:05 +02:00
networking = {
useDHCP = false;
nameservers = [
"2620:fe::fe"
"2620:fe::9"
"9.9.9.9"
"149.112.112.112"
];
nftables = {
enable = true;
tables.nat = {
family = "ip";
content = ''
chain postrouting {
type nat hook postrouting priority 100;
ip saddr 192.168.55.0/24 masquerade
}
'';
};
};
firewall.allowedUDPPorts = [ 67 ];
};
2024-10-10 01:00:01 +02:00
2024-10-11 12:56:05 +02:00
services.hostapd = {
enable = true;
radios.wlan0 = {
# countryCode = "FR";
wifi4.enable = false;
wifi5.enable = false;
channel = 7; # ACS doesn't work
networks.wlan0 = {
settings = {
ieee80211w = 0;
wmm_enabled = false;
};
ssid = "agb - wifi";
logLevel = 0;
authentication = {
mode = "wpa2-sha1";
wpaPasswordFile = pkgs.writeText "psk" "azertyuiop"; # TODO : secret
};
};
};
};
2024-10-10 01:00:01 +02:00
}