quitte: network fixes

This commit is contained in:
Rouven Seifert 2024-03-21 15:47:32 +01:00
parent ddd2514cdb
commit 3be5380c58
Signed by: rouven.seifert
GPG key ID: B95E8FE6B11C4D09

View file

@ -34,18 +34,12 @@ in
services.resolved = { services.resolved = {
enable = true; enable = true;
#dnssec = "false"; fallbackDns = [ "9.9.9.9" ];
fallbackDns = [ "1.1.1.1" ];
}; };
# workaround for networkd waiting for shit
systemd.services.systemd-networkd-wait-online.serviceConfig.ExecStart = [
"" # clear old command
"${config.systemd.package}/lib/systemd/systemd-networkd-wait-online --any"
];
systemd.network = { systemd.network = {
enable = true; enable = true;
wait-online.anyInterface = true;
# Interfaces on the machine # Interfaces on the machine
networks."10-wired-default" = { networks."10-wired-default" = {
@ -59,39 +53,6 @@ in
]; ];
networkConfig = { networkConfig = {
DNS = "141.30.1.1"; DNS = "141.30.1.1";
#IPv6AcceptRA = true;
};
};
# defining network device for wireguard connections
netdevs."fsr-wg" = {
netdevConfig = {
Kind = "wireguard";
Name = "fsr-wg";
Description = "fsr enterprise wireguard";
};
wireguardConfig = {
PrivateKeyFile = config.sops.secrets."wg-fsr".path;
ListenPort = wireguard_port;
};
wireguardPeers = [
{
# tassilo
wireguardPeerConfig = {
PublicKey = "vgo3le9xrFsIbbDZsAhQZpIlX+TuWjfEyUcwkoqUl2Y=";
AllowedIPs = [ "10.66.66.100/32" ];
PersistentKeepalive = 25;
};
}
];
};
# fsr wireguard server
networks."fsr-wg" = {
matchConfig.Name = "fsr-wg";
networkConfig = {
Address = "10.66.66.1/24";
IPForward = "ipv4";
}; };
}; };
}; };