nixpkgs-fmt

This commit is contained in:
Grigory Shipunov 2022-07-13 15:52:14 +02:00
parent 9bdeafe7f0
commit 428a122acd
Signed by: 0xa
GPG key ID: 91FA5E5BF9AA901C

View file

@ -22,7 +22,7 @@
"${config.systemd.package}/lib/systemd/systemd-networkd-wait-online --any"
];
systemd.network = {
systemd.network = {
enable = true;
# wait-online.ignoredInterfaces = [ "wlan0" "enp53s0" ];
@ -40,20 +40,20 @@ systemd.network = {
};
};
networks."10-ether-bond" = {
matchConfig = { Name = "enp53s0"; };
matchConfig.Name = "enp53s0";
networkConfig = {
Bond = "james";
PrimarySlave = true;
};
};
networks."10-wlan-bond" = {
matchConfig = { Name = "wlan0"; };
matchConfig.Name = "wlan0";
networkConfig = {
Bond = "james";
};
};
networks."10-james-bond" = {
matchConfig = { Name = "james"; };
matchConfig.Name = "james";
networkConfig = {
DHCP = "yes";
IPv6AcceptRA = true;
@ -83,7 +83,7 @@ systemd.network = {
];
};
networks."30-wg-dumpdvb" = {
matchConfig = { Name = "wg-dumpdvb"; };
matchConfig.Name = "wg-dumpdvb";
networkConfig = {
Address = "10.13.37.3/24";
IPv6AcceptRA = true;
@ -115,7 +115,7 @@ systemd.network = {
];
};
networks."10-wg-oxalab" = {
matchConfig = { Name = "wg-oxalab"; };
matchConfig.Name = "wg-oxalab";
networkConfig = {
Address = "10.66.66.10/24";
IPv6AcceptRA = true;
@ -148,7 +148,7 @@ systemd.network = {
];
};
networks."10-wg-zentralwerk" = {
matchConfig = { Name = "wg-zentralwerk"; };
matchConfig.Name = "wg-zentralwerk";
networkConfig = {
Address = "172.20.76.226/21";
IPv6AcceptRA = true;
@ -196,19 +196,23 @@ systemd.network = {
];
};
networks."10-wg-mullvad" = {
address = [ "10.65.79.164/32" "fc00:bbbb:bbbb:bb01::2:4fa3/128" ];
matchConfig.Name = "wg-mullvad";
address = [ "10.65.79.164/32" "fc00:bbbb:bbbb:bb01::2:4fa3/128" ];
networkConfig = {
DNS = "10.64.0.1";
DNSDefaultRoute = true;
Domains = [ "~." ];
};
routes = map (gate: {
routes = map
(gate: {
routeConfig = {
Gateway = gate;
Table = 1000;
};
}) [ "0.0.0.0" "::" ];
}) [
"0.0.0.0"
"::"
];
routingPolicyRules = [
{
@ -228,7 +232,9 @@ systemd.network = {
Priority = 9;
};
}
] ++ map (net: { # only route global addresses over VPN
] ++ map
(net: {
# only route global addresses over VPN
routingPolicyRuleConfig = {
Priority = 8;
To = net;