nixos-config/systems/LoutreOS/configuration.nix

196 lines
5.4 KiB
Nix
Raw Normal View History

2018-03-31 22:16:38 +02:00
# Edit this configuration file to define what should be installed on
# your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running nixos-help).
{ config, pkgs, ... }:
{
2018-09-04 14:05:06 +02:00
imports = [
2019-10-04 22:01:49 +02:00
../common-cli.nix
2018-09-04 14:05:06 +02:00
./hardware-configuration.nix
./users.nix
./services.nix
];
2018-03-31 22:16:38 +02:00
2022-12-30 15:08:20 +01:00
nix.settings.trusted-users = [ "root" "paul" ];
2021-12-16 19:07:52 +01:00
2018-09-04 14:05:06 +02:00
boot = {
loader = {
systemd-boot.enable = true;
efi.canTouchEfiVariables = true;
};
2018-03-31 22:16:38 +02:00
2018-09-04 14:05:06 +02:00
supportedFilesystems = [ "zfs" ];
2018-03-31 22:16:38 +02:00
tmp.useTmpfs = true;
2018-09-04 14:05:06 +02:00
};
2018-04-05 19:22:09 +02:00
2021-01-06 02:06:34 +01:00
documentation.nixos.enable = false;
nixpkgs.config.allowUnfree = false;
2021-07-28 23:03:34 +02:00
nixpkgs.config.allowUnfreePredicate = (pkg: builtins.elem pkg.pname or (builtins.parseDrvName pkg.name).name [ "factorio-headless" "perl5.32.1-slimserver" "minecraft-server" ]);
2018-09-04 14:05:06 +02:00
services.zfs = {
autoSnapshot.enable = true;
2022-06-30 18:58:34 +02:00
autoScrub = {
enable = true;
interval = "monthly";
};
2018-09-04 14:05:06 +02:00
};
2018-03-31 22:16:38 +02:00
2020-08-30 16:25:51 +02:00
hardware.usbWwan.enable = true;
2019-04-04 23:47:24 +02:00
# eno1 -> VLAN100 -> Internet
# eno2 -> LAN
2019-04-21 11:05:45 +02:00
# eno3 -> Legacy client DHCP
# eno4 -> Pas utilisé
2019-04-04 23:47:24 +02:00
2018-09-04 14:05:06 +02:00
networking = {
hostName = "loutreos"; # Define your hostname.
hostId = "7e66e347";
2019-04-04 23:47:24 +02:00
2021-12-16 20:17:40 +01:00
useNetworkd = true;
useDHCP = false;
2019-04-27 10:36:01 +02:00
2020-08-30 21:10:48 +02:00
vlans = {
2021-12-20 08:33:43 +01:00
bouygues = {
2020-08-30 21:10:48 +02:00
id = 100;
interface = "eno1";
};
chinoiseries = {
id = 20;
interface = "eno2";
};
2019-04-04 23:47:24 +02:00
};
interfaces = {
2021-12-20 08:33:43 +01:00
bouygues = {
2019-04-04 23:47:24 +02:00
# Adresse MAC BBox ? https://lafibre.info/remplacer-bbox/informations-de-connexion-ftth/msg598303/#msg598303
2019-04-27 10:36:01 +02:00
macAddress = "E8:AD:A6:21:73:68";
2021-12-16 20:17:40 +01:00
useDHCP = true;
2019-04-04 23:47:24 +02:00
};
eno2 = {
ipv4.addresses = [
{ address = "10.30.0.1"; prefixLength = 16; }
];
};
2020-08-30 21:10:48 +02:00
chinoiseries = {
ipv4.addresses = [
{ address = "10.40.0.1"; prefixLength = 16; }
];
};
2021-12-20 08:34:21 +01:00
enp0s21u2.useDHCP = true;
2019-04-04 23:47:24 +02:00
};
2021-12-20 08:33:43 +01:00
# NAT bouygues <-> eno2
2019-04-04 23:47:24 +02:00
nat = {
enable = true;
2021-12-20 08:33:43 +01:00
externalInterface = "bouygues";
2019-04-04 23:47:24 +02:00
# Permet d'utiliser le SNAT plus rapide au lieu de MASQUERADE
# externalIP = "0.0.0.0";
2020-08-30 21:10:48 +02:00
internalIPs = [ "10.30.0.0/16" "10.40.0.0/16" ];
internalInterfaces = [ "eno2" "chinoiseries" ];
2019-06-07 10:28:24 +02:00
forwardPorts = [
{ destination = "10.30.0.1:22"; proto = "tcp"; sourcePort = 8443;}
2019-10-22 00:34:08 +02:00
{ destination = "10.30.135.35:25565"; proto = "tcp"; sourcePort = 25565; loopbackIPs=[ "195.36.180.44" ];}
2019-06-07 10:28:24 +02:00
];
2019-04-04 23:47:24 +02:00
};
firewall = {
2020-04-08 12:45:36 +02:00
allowedTCPPorts = [ 80 443 ];
allowedUDPPorts = [ ];
interfaces.eno2 = {
allowedTCPPorts = [
111 2049 4000 4001 4002 # NFS
3483 9000 9090 # Slimserver
2020-04-08 12:48:42 +02:00
1935 # RTMP
];
allowedUDPPorts = [
111 2049 4000 4001 4002 # NFS
3483 # Slimserver
];
};
enable = true;
};
2019-04-04 23:47:24 +02:00
};
2021-12-20 08:34:21 +01:00
systemd.network.networks = {
"40-bouygues" = {
dhcpV4Config.RouteMetric = 1;
dhcpV6Config = {
DUIDRawData = "00:03:00:01:E8:AD:A6:21:73:68";
WithoutRA = "solicit";
};
ipv6AcceptRAConfig.DHCPv6Client = "yes";
networkConfig = {
KeepConfiguration = "dhcp-on-stop";
IPv6AcceptRA = "yes";
};
};
2021-12-20 08:34:21 +01:00
"40-enp0s21u2".dhcpV4Config.RouteMetric = 1024;
};
2019-04-04 23:47:24 +02:00
services.dhcpd4 = {
enable = true;
2020-08-30 21:10:48 +02:00
interfaces = [ "eno2" "chinoiseries" ];
2019-05-01 23:06:17 +02:00
machines = [
{ ethernetAddress = "50:c7:bf:b6:b8:ef"; hostName = "HS110"; ipAddress = "10.30.50.7"; }
{ ethernetAddress = "ac:1f:6b:4b:01:15"; hostName = "IPMI"; ipAddress = "10.30.1.1"; }
2021-12-20 08:34:45 +01:00
{ ethernetAddress = "b4:2e:99:ed:24:26"; hostName = "paul-fixe"; ipAddress = "10.30.50.1"; }
2020-08-30 21:10:48 +02:00
2020-09-11 01:59:02 +02:00
#ESPHome
{ ethernetAddress = "e0:98:06:85:e9:ce"; hostName = "salonled"; ipAddress = "10.30.40.1"; }
{ ethernetAddress = "e0:98:06:86:38:fc"; hostName = "bureauled"; ipAddress = "10.30.40.2"; }
2021-11-22 11:59:07 +01:00
{ ethernetAddress = "50:02:91:78:be:be"; hostName = "guirlande"; ipAddress = "10.30.40.3"; }
2020-09-11 01:59:02 +02:00
2020-08-30 21:10:48 +02:00
# YeeLights
{ ethernetAddress = "04:cf:8c:b5:7e:18"; hostName = "yeelink-light-color3_miap7e18"; ipAddress = "10.40.249.0"; }
{ ethernetAddress = "04:cf:8c:b5:2d:28"; hostName = "yeelink-light-color3_miap2d28"; ipAddress = "10.40.249.1"; }
{ ethernetAddress = "04:cf:8c:b5:71:04"; hostName = "yeelink-light-color3_miap7104"; ipAddress = "10.40.249.2"; }
2019-05-01 23:06:17 +02:00
];
2019-04-04 23:47:24 +02:00
extraConfig = ''
option domain-name-servers 89.234.141.66, 80.67.169.12, 80.67.169.40;
option subnet-mask 255.255.0.0;
subnet 10.30.0.0 netmask 255.255.0.0 {
2020-08-30 21:10:48 +02:00
option routers 10.30.0.1;
2021-12-20 08:34:45 +01:00
range 10.30.100.0 10.30.200.0;
2019-04-04 23:47:24 +02:00
}
2020-08-30 21:10:48 +02:00
subnet 10.40.0.0 netmask 255.255.0.0 {
option routers 10.40.0.1;
2021-12-20 08:34:45 +01:00
range 10.40.100.0 10.40.200.0;
2020-08-30 21:10:48 +02:00
}
2019-04-04 23:47:24 +02:00
'';
2018-09-04 14:05:06 +02:00
};
2018-03-31 22:16:38 +02:00
2018-05-04 15:25:24 +02:00
nixpkgs.overlays = [
(import ../../overlays/transmission.nix)
2018-05-04 15:25:24 +02:00
];
2018-05-07 11:35:57 +02:00
2018-09-04 14:05:06 +02:00
services.openssh = {
enable = true;
settings = {
PermitRootLogin = "no";
PasswordAuthentication = false;
X11Forwarding = true;
};
2018-09-04 14:05:06 +02:00
};
2018-03-31 22:16:38 +02:00
2020-08-30 16:25:51 +02:00
users = {
groups.autossh = { };
users.autossh = {
home = "/home/autossh";
createHome = true;
group = "autossh";
2021-10-11 10:49:30 +02:00
isSystemUser = true;
2020-08-30 16:25:51 +02:00
};
};
services.autossh.sessions = [ { extraArguments = "-N -R 0.0.0.0:2222:127.0.0.1:22 loutre@vps772619.ovh.net"; monitoringPort = 20000; name = "backup-ssh-reverse"; user = "autossh"; } ];
2021-10-11 10:48:26 +02:00
virtualisation.podman.enable = true;
2018-03-31 22:16:38 +02:00
security.sudo.wheelNeedsPassword = false;
system.stateVersion = "18.03";
2018-03-31 22:16:38 +02:00
}