DNS shenanigans

This commit is contained in:
Adithya 2024-12-08 14:57:43 +05:30
parent 7e34c66f3d
commit 172c42963e
Signed by: adtya
GPG key ID: B8857BFBA2C47B9C
2 changed files with 5 additions and 23 deletions

View file

@ -1,12 +1,6 @@
{ lib, ... }: { { lib, ... }: {
imports = [ ./wireguard.nix ]; imports = [ ./wireguard.nix ];
services.resolved = {
enable = true;
domains = [ "~." ];
fallbackDns = [ ];
};
systemd = { systemd = {
network = { network = {
enable = true; enable = true;
@ -58,6 +52,7 @@
}; };
networkConfig = { networkConfig = {
DHCP = "yes"; DHCP = "yes";
Domains = [ "~." ];
}; };
dhcpV4Config = { dhcpV4Config = {
UseDomains = true; UseDomains = true;
@ -75,6 +70,7 @@
networkConfig = { networkConfig = {
DHCP = "yes"; DHCP = "yes";
IgnoreCarrierLoss = "3s"; IgnoreCarrierLoss = "3s";
Domains = [ "~." ];
}; };
dhcpV4Config = { dhcpV4Config = {
UseDomains = true; UseDomains = true;
@ -91,20 +87,9 @@
}; };
}; };
services.resolved.enable = true;
networking = { networking = {
nameservers = [
"10.10.10.1"
];
useDHCP = lib.mkDefault false; useDHCP = lib.mkDefault false;
extraHosts = ''
10.10.10.1 Bifrost
10.10.10.2 Skipper
10.10.10.10 Rico0
10.10.10.11 Rico1
10.10.10.12 Rico2
10.10.10.13 Wynne
10.10.10.14 Layne
'';
firewall = { firewall = {
allowedTCPPorts = [ allowedTCPPorts = [

View file

@ -7,11 +7,7 @@ let wireguard-peers = import ../../shared/wireguard-peers.nix { }; in {
group = config.users.users.systemd-network.group; group = config.users.users.systemd-network.group;
}; };
}; };
networking = { networking.firewall.trustedInterfaces = [ "Homelab" ];
firewall = {
trustedInterfaces = [ "Homelab" ];
};
};
systemd.network = { systemd.network = {
enable = true; enable = true;
netdevs."99-Homelab" = { netdevs."99-Homelab" = {
@ -33,6 +29,7 @@ let wireguard-peers = import ../../shared/wireguard-peers.nix { }; in {
}; };
networkConfig = { networkConfig = {
DNS = "10.10.10.1"; DNS = "10.10.10.1";
Domains = [ "labs.adtya.xyz" ];
Address = [ Address = [
"${config.nodeconfig.facts.wireguard-ip}/24" "${config.nodeconfig.facts.wireguard-ip}/24"
]; ];