summaryrefslogtreecommitdiff
path: root/hosts/vidhar/network/default.nix
blob: e961c17e56830b58307ca370197db5e5c22fabac (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
{ pkgs, lib, ... }:

with lib;

{
  imports = [ ./dsl.nix ./bifrost ./dhcp ];

  config = {
    networking = {
      hostName = "vidhar";
      domain = "yggdrasil";
      search = [ "yggdrasil" ];

      useDHCP = false;
      useNetworkd = true;

      interfaces."lan" = {
        ipv4.addresses = [
          { address = "10.141.0.1"; prefixLength = 24; }
        ];
      };
      interfaces."mgmt" = {
        ipv4.addresses = [
          { address = "10.141.1.1"; prefixLength = 24; }
        ];
      };
      interfaces."wifibh" = {
        ipv4.addresses = [
          { address = "10.141.2.1"; prefixLength = 24; }
        ];
      };
      interfaces."modem" = {
        ipv4.addresses = [
          { address = "10.10.1.2"; prefixLength = 24; }
        ];
      };

      vlans = {
        mgmt = {
          id = 2;
          interface = "eno2";
        };
        lan = {
          id = 3;
          interface = "eno2";
        };
        wifibh = {
          id = 4;
          interface = "eno2";
        };
        printer = {
          id = 5;
          interface = "eno2";
        };
        modem = {
          id = 6;
          interface = "eno2";
        };
      };

      firewall.enable = false;
      nftables = {
        enable = true;
        rulesetFile = ./ruleset.nft;
      };

      resolvconf = {
        enable = true;
        useLocalResolver = true;
      };
    };

    services.resolved.enable = false;

    systemd.services."systemd-networkd-wait-online".enable = mkForce false;

    environment.etc."dnssec-trust-anchors.d/root.positive".source = "${pkgs.dns-root-data}/root.ds";

    systemd.network.networks = {
      "eno1" = {
        matchConfig.Name = "eno1";
        linkConfig = {
          ActivationPolicy = "down";
        };
      };
      "eno2" = {
        matchConfig.Name = "eno2";
        networkConfig.LinkLocalAddressing = "no";
      };
    };

    services.nfs.server = {
      enable = true;
      createMountPoints = true;

      statdPort = 4000;
      lockdPort = 4001;
      mountdPort = 4002;

      extraNfsdConfig = ''
        vers3=off
      '';

      exports = ''
        /srv/nfs 10.141.0.0/24(ro,async,root_squash,fsid=0) 2a03:4000:52:ada:1::/80(ro,async,root_squash,fsid=0)
        /srv/nfs/nix-store 10.141.0.0/24(ro,async,root_squash) 2a03:4000:52:ada:1::/80(ro,async,root_squash)
      '';
    };

    fileSystems = {
      "/srv/nfs/nix-store" = {
        device = "/nix/store";
        options = [ "bind" ];
      };
    };
  };
}