1
1
Fork 1
mirror of https://github.com/oddlama/nix-config.git synced 2025-10-10 23:00:39 +02:00

chore: dont use adguardhome for servers

This commit is contained in:
oddlama 2023-07-06 14:49:37 +02:00
parent 13d9baedc1
commit 836cd7c6c2
No known key found for this signature in database
GPG key ID: 14EFE510775FE39A
9 changed files with 25 additions and 9 deletions

View file

@ -49,7 +49,6 @@ in {
bind_host = config.meta.wireguard.proxy-sentinel.ipv4;
bind_port = 3000;
dns = {
edns_client_subnet.enabled = false;
bind_hosts = [
# This dummy address passes the configuration check and will
# later be replaced by the actual interface address.
@ -60,15 +59,15 @@ in {
#trusted_proxied = [];
ratelimit = 60;
upstream_dns = [
"1.1.1.1"
"2606:4700:4700::1111"
"8.8.8.8"
"8.8.4.4"
"2001:4860:4860::8888"
"2001:4860:4860::8844"
];
bootstrap_dns = [
"1.1.1.1"
"2606:4700:4700::1111"
"8.8.8.8"
"8.8.4.4"
"2001:4860:4860::8888"
"2001:4860:4860::8844"
];
dhcp.enabled = false;
@ -82,5 +81,6 @@ in {
INTERFACE_ADDR=$(${pkgs.iproute2}/bin/ip -family inet -brief addr show wan | grep -o "[0-9]\+\.[0-9]\+\.[0-9]\+\.[0-9]\+")
sed -i -e "s/123.123.123.123/$INTERFACE_ADDR/" "$STATE_DIRECTORY/AdGuardHome.yaml"
'';
serviceConfig.RestartSec = lib.mkForce "600"; # Retry every 10 minutes
};
}

View file

@ -129,5 +129,8 @@ in {
};
};
systemd.services.grafana.after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
systemd.services.grafana = {
after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
serviceConfig.RestartSec = "600"; # Retry every 10 minutes
};
}

View file

@ -59,5 +59,8 @@ in {
};
};
systemd.services.influxdb2.after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
systemd.services.influxdb2 = {
after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
serviceConfig.RestartSec = "600"; # Retry every 10 minutes
};
}

View file

@ -72,5 +72,8 @@ in {
};
};
systemd.services.kanidm.after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
systemd.services.kanidm = {
after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
serviceConfig.RestartSec = "600"; # Retry every 10 minutes
};
}

View file

@ -127,5 +127,8 @@ in {
};
};
systemd.services.loki.after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
systemd.services.loki = {
after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
serviceConfig.RestartSec = "600"; # Retry every 10 minutes
};
}

View file

@ -90,5 +90,6 @@ in {
systemd.services.vaultwarden = {
after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
serviceConfig.StateDirectory = lib.mkForce "vaultwarden";
serviceConfig.RestartSec = "600"; # Retry every 10 minutes
};
}

View file

@ -41,6 +41,7 @@ in {
};
"10-wan" = {
DHCP = "yes";
dhcpConfig.UseDNS = false;
#address = [
# "192.168.178.2/24"
# "fdee::1/64"

View file

@ -16,6 +16,7 @@ in {
systemd.network.networks = {
"10-lan1" = {
DHCP = "yes";
dhcpConfig.UseDNS = false;
matchConfig.MACAddress = config.repo.secrets.local.networking.interfaces.lan1.mac;
networkConfig = {
IPv6PrivacyExtensions = "yes";

View file

@ -174,6 +174,7 @@
"10-${vmCfg.networking.mainLinkName}" = {
matchConfig.MACAddress = mac;
DHCP = "yes";
dhcpConfig.UseDNS = false;
networkConfig = {
IPv6PrivacyExtensions = "yes";
MulticastDNS = true;