1
1
Fork 1
mirror of https://github.com/oddlama/nix-config.git synced 2025-10-11 07:10:39 +02:00

chore: format everything

This commit is contained in:
oddlama 2024-11-26 13:34:55 +01:00
parent deca311c68
commit 7ccd7856ee
No known key found for this signature in database
GPG key ID: 14EFE510775FE39A
162 changed files with 4750 additions and 3718 deletions

View file

@ -3,7 +3,8 @@
globals,
lib,
...
}: {
}:
{
boot.kernel.sysctl."net.ipv4.ip_forward" = 1;
networking.hostId = config.repo.secrets.local.networking.hostId;
@ -17,8 +18,8 @@
enable = true;
networks = {
"10-wan" = {
address = [globals.net.home-wan.hosts.ward.cidrv4];
gateway = [globals.net.home-wan.hosts.fritzbox.ipv4];
address = [ globals.net.home-wan.hosts.ward.cidrv4 ];
gateway = [ globals.net.home-wan.hosts.fritzbox.ipv4 ];
matchConfig.MACAddress = config.repo.secrets.local.networking.interfaces.wan.mac;
networkConfig.IPv6PrivacyExtensions = "yes";
linkConfig.RequiredForOnline = "routable";
@ -70,8 +71,8 @@
#dhcpV4Config.UseDNS = false;
#dhcpV6Config.UseDNS = false;
#ipv6AcceptRAConfig.UseDNS = false;
address = [globals.net.home-wan.hosts.ward.cidrv4];
gateway = [globals.net.home-wan.hosts.fritzbox.ipv4];
address = [ globals.net.home-wan.hosts.ward.cidrv4 ];
gateway = [ globals.net.home-wan.hosts.fritzbox.ipv4 ];
matchConfig.MACAddress = config.repo.secrets.local.networking.interfaces.wan.mac;
networkConfig.IPv6PrivacyExtensions = "yes";
dhcpV6Config.PrefixDelegationHint = "::/64";
@ -99,7 +100,7 @@
dhcpPrefixDelegationConfig.Token = "::ff";
# Announce a static prefix
ipv6Prefixes = [
{Prefix = globals.net.home-lan.cidrv6;}
{ Prefix = globals.net.home-lan.cidrv6; }
];
# Delegate prefix
dhcpPrefixDelegationConfig = {
@ -123,39 +124,45 @@
};
networking.nftables.firewall = {
snippets.nnf-icmp.ipv6Types = ["mld-listener-query" "nd-router-solicit"];
snippets.nnf-icmp.ipv6Types = [
"mld-listener-query"
"nd-router-solicit"
];
zones = {
untrusted.interfaces = ["wan"];
lan.interfaces = ["lan-self"];
proxy-home.interfaces = ["proxy-home"];
untrusted.interfaces = [ "wan" ];
lan.interfaces = [ "lan-self" ];
proxy-home.interfaces = [ "proxy-home" ];
};
rules = {
masquerade = {
from = ["lan"];
to = ["untrusted"];
from = [ "lan" ];
to = [ "untrusted" ];
masquerade = true;
};
outbound = {
from = ["lan"];
to = ["lan" "untrusted"];
from = [ "lan" ];
to = [
"lan"
"untrusted"
];
late = true; # Only accept after any rejects have been processed
verdict = "accept";
};
lan-to-local = {
from = ["lan"];
to = ["local"];
from = [ "lan" ];
to = [ "local" ];
allowedUDPPorts = [config.wireguard.proxy-home.server.port];
allowedUDPPorts = [ config.wireguard.proxy-home.server.port ];
};
# Forward traffic between participants
forward-proxy-home-vpn-traffic = {
from = ["proxy-home"];
to = ["proxy-home"];
from = [ "proxy-home" ];
to = [ "proxy-home" ];
verdict = "accept";
};