2025-01-11 03:55:19 +01:00
|
|
|
{ lib, config, ... }:
|
|
|
|
{
|
2025-01-03 19:06:42 +01:00
|
|
|
imports = [
|
|
|
|
./mullvad.nix
|
|
|
|
./dumpdvb.nix
|
|
|
|
./zw.nix
|
|
|
|
];
|
|
|
|
|
2025-01-10 22:28:05 +01:00
|
|
|
# Networkmanager shouldn't interfere with systemd managed interfaces
|
|
|
|
networking.networkmanager.unmanaged =
|
|
|
|
let
|
2025-01-11 03:55:19 +01:00
|
|
|
systemd_netdevs = lib.attrsets.attrValues (
|
|
|
|
lib.attrsets.mapAttrs (_name: value: value.netdevConfig.Name) config.systemd.network.netdevs
|
|
|
|
);
|
2025-01-10 22:28:05 +01:00
|
|
|
in
|
|
|
|
systemd_netdevs;
|
2025-01-03 19:06:42 +01:00
|
|
|
|
2025-01-11 03:55:19 +01:00
|
|
|
systemd.network = {
|
|
|
|
enable = true;
|
|
|
|
wait-online.enable = false; # uplink is managed by networkmanager
|
|
|
|
};
|
2025-01-05 22:39:06 +01:00
|
|
|
|
2025-01-11 03:55:19 +01:00
|
|
|
users.users."0xa".extraGroups = [ "networkmanager" ];
|
2025-01-03 19:06:42 +01:00
|
|
|
|
2025-01-11 03:55:19 +01:00
|
|
|
networking = {
|
|
|
|
hostName = "toaster";
|
|
|
|
firewall.enable = true;
|
|
|
|
wireguard.enable = true;
|
|
|
|
};
|
2025-01-10 22:28:05 +01:00
|
|
|
|
2025-01-11 03:55:19 +01:00
|
|
|
services.resolved = {
|
|
|
|
enable = true;
|
|
|
|
dnssec = "false";
|
|
|
|
fallbackDns = [
|
|
|
|
"9.9.9.9"
|
|
|
|
"2620:fe::fe"
|
|
|
|
"149.112.112.112"
|
|
|
|
"2620:fe::9"
|
|
|
|
];
|
|
|
|
};
|
2025-01-03 19:06:42 +01:00
|
|
|
|
2025-01-11 03:55:19 +01:00
|
|
|
}
|