mirror of
https://github.com/oddlama/nix-config.git
synced 2025-10-11 07:10:39 +02:00
chore: put real MAC addresses in repo secrets
This commit is contained in:
parent
6f8f74cc69
commit
f2f8ca71bb
13 changed files with 47 additions and 27 deletions
24
flake.lock
generated
24
flake.lock
generated
|
@ -28,11 +28,11 @@
|
|||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1678494029,
|
||||
"narHash": "sha256-2DV9aeUsFuczk4olt4WtlRVuQwIjF8OFK4EzfJ5JFJA=",
|
||||
"lastModified": 1678898163,
|
||||
"narHash": "sha256-Cn35A08nzi+S9+RfFyAD4yMBGFerlk9ESMhAm/CJqRE=",
|
||||
"owner": "oddlama",
|
||||
"repo": "agenix-rekey",
|
||||
"rev": "7eaf151db39f62c9fbde5c19778e3cce3be243ad",
|
||||
"rev": "653dcdbeba427b0c88137683055b8033c987b137",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
@ -166,11 +166,11 @@
|
|||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1678464939,
|
||||
"narHash": "sha256-pRMlwOUkO1OwSi7qF6XR/zcocWy/ZYxXgbYWvnZQO9k=",
|
||||
"lastModified": 1678886248,
|
||||
"narHash": "sha256-ff81NJtc+AgQhUlTCkx8t8hda0o72vSxDeHVGrfxH70=",
|
||||
"owner": "nix-community",
|
||||
"repo": "home-manager",
|
||||
"rev": "7224d7c54c5fc74cdf60b208af6148ed3295aa32",
|
||||
"rev": "2bd74d92bc7345f323ebcbfeb631d5cf4067ed8e",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
@ -211,11 +211,11 @@
|
|||
},
|
||||
"nixpkgs": {
|
||||
"locked": {
|
||||
"lastModified": 1678380223,
|
||||
"narHash": "sha256-HUxnK38iqrX84QdQxbFcosRKV3/koj1Zzp5b5aP4lIo=",
|
||||
"lastModified": 1678819893,
|
||||
"narHash": "sha256-lfA6WGdxPsPkBK5Y19ltr5Sn7v7MlT+jpZ4nUgco0Xs=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "1e2590679d0ed2cee2736e8b80373178d085d263",
|
||||
"rev": "7067edc68c035e21780259ed2d26e1f164addaa2",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
@ -299,11 +299,11 @@
|
|||
},
|
||||
"templates": {
|
||||
"locked": {
|
||||
"lastModified": 1676551231,
|
||||
"narHash": "sha256-JS1o31ew90UiccpoQHxP84Wn0n7ClgyVpAsJV20Ep5E=",
|
||||
"lastModified": 1678524284,
|
||||
"narHash": "sha256-3tk4RHKrIbz2tNVyW2WOrgZBe26jhfBiz7bzb7b8p5I=",
|
||||
"owner": "NixOS",
|
||||
"repo": "templates",
|
||||
"rev": "3ac7e8ba52feb2b89e943a6ce0f7a30d6faf81c6",
|
||||
"rev": "0edaa0637331e9d8acca5c8ec67936a2c8b8749b",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{
|
||||
{ nodeSecrets, ... }: {
|
||||
networking = {
|
||||
hostId = "4313abca";
|
||||
wireless.iwd.enable = true;
|
||||
|
@ -7,14 +7,14 @@
|
|||
systemd.network.networks = {
|
||||
"10-lan1" = {
|
||||
DHCP = "yes";
|
||||
matchConfig.MACAddress = "00:00:00:00:00:00";
|
||||
matchConfig.MACAddress = nodeSecrets.networking.interfaces.lan1.mac;
|
||||
networkConfig.IPv6PrivacyExtensions = "kernel";
|
||||
dhcpV4Config.RouteMetric = 10;
|
||||
dhcpV6Config.RouteMetric = 10;
|
||||
};
|
||||
"10-wlan1" = {
|
||||
DHCP = "yes";
|
||||
matchConfig.MACAddress = "00:00:00:00:00:00";
|
||||
matchConfig.MACAddress = nodeSecrets.networking.interfaces.wlan1.mac;
|
||||
networkConfig.IPv6PrivacyExtensions = "kernel";
|
||||
dhcpV4Config.RouteMetric = 40;
|
||||
dhcpV6Config.RouteMetric = 40;
|
||||
|
|
BIN
hosts/nom/secrets/secrets.nix.age
Normal file
BIN
hosts/nom/secrets/secrets.nix.age
Normal file
Binary file not shown.
|
@ -1,19 +1,17 @@
|
|||
{
|
||||
networking = {
|
||||
hostId = "49ce3b71";
|
||||
};
|
||||
{ nodeSecrets, ... }: {
|
||||
networking.hostId = "49ce3b71";
|
||||
|
||||
systemd.network.networks = {
|
||||
"10-lan1" = {
|
||||
DHCP = "yes";
|
||||
matchConfig.MACAddress = "00:00:00:00:00:00";
|
||||
matchConfig.MACAddress = nodeSecrets.networking.interfaces.lan1.mac;
|
||||
networkConfig.IPv6PrivacyExtensions = "kernel";
|
||||
dhcpV4Config.RouteMetric = 10;
|
||||
dhcpV6Config.RouteMetric = 10;
|
||||
};
|
||||
"10-lan2" = {
|
||||
DHCP = "yes";
|
||||
matchConfig.MACAddress = "00:00:00:00:00:00";
|
||||
matchConfig.MACAddress = nodeSecrets.networking.interfaces.lan2.mac;
|
||||
networkConfig.IPv6PrivacyExtensions = "kernel";
|
||||
dhcpV4Config.RouteMetric = 20;
|
||||
dhcpV6Config.RouteMetric = 20;
|
||||
|
|
10
hosts/ward/secrets/secrets.nix.age
Normal file
10
hosts/ward/secrets/secrets.nix.age
Normal file
|
@ -0,0 +1,10 @@
|
|||
age-encryption.org/v1
|
||||
-> X25519 fJutn5YCebczN3xQLTDNPKQlNj4p47h1sUgkyVfRARw
|
||||
V61YLy8oXTJZUFhpxYCM7glt1u3LKtVgkp0XDdYwlaE
|
||||
-> piv-p256 xqSe8Q AzOVI4DKP7g7Rzr7NbH6olY/T57R9BbO5gNpeXrCn+xZ
|
||||
cmD4KdE3CIbKp36azm7fuL5V1EVvgcuaLE8/cEzE7x0
|
||||
-> @Zm-grease )8>fIDi YH{ Qp_) VJs.7
|
||||
jkMFKrAANRssnB6n0Cr6cxVc5g
|
||||
--- eNSoD5B33WIgF5M26POfs5rUjqVNb6BqiMedIMS7/H8
|
||||
&ûë^ÑÓ”3˜œÞÌsˆ $mÃ"‚eºk·Ù¦~BŠõ”ad°šeì^é9’š/Š�aI/½�šyJí‚F'œIÐ^Ã�WåPÁÎ/0uŽ;ãææ—ä‘bn
|
||||
TXró·/,è¹Û‘æ%ÀSɃ}娵`ɃϞº {–¤æµ$˜š�Ûý”O
|
|
@ -21,6 +21,7 @@
|
|||
./zigbee2mqtt.nix
|
||||
./esphome.nix
|
||||
./nginx.nix
|
||||
./hostapd.nix
|
||||
];
|
||||
|
||||
boot.loader.grub.enable = false;
|
||||
|
|
6
hosts/zackbiene/hostapd.nix
Normal file
6
hosts/zackbiene/hostapd.nix
Normal file
|
@ -0,0 +1,6 @@
|
|||
{
|
||||
lib,
|
||||
config,
|
||||
...
|
||||
}: {
|
||||
}
|
|
@ -1,15 +1,20 @@
|
|||
{
|
||||
networking = {
|
||||
hostId = "f7e6acdc";
|
||||
};
|
||||
{ nodeSecrets, ... }: {
|
||||
networking.hostId = "f7e6acdc";
|
||||
|
||||
systemd.network.networks = {
|
||||
"10-lan1" = {
|
||||
DHCP = "yes";
|
||||
matchConfig.MACAddress = "00:00:00:00:00:00";
|
||||
matchConfig.MACAddress = nodeSecrets.networking.interfaces.lan1.mac;
|
||||
networkConfig.IPv6PrivacyExtensions = "kernel";
|
||||
dhcpV4Config.RouteMetric = 10;
|
||||
dhcpV6Config.RouteMetric = 10;
|
||||
};
|
||||
#"10-wlan1" = {
|
||||
# DHCP = "yes";
|
||||
# matchConfig.MACAddress = nodeSecrets.networking.interfaces.wlan1.mac;
|
||||
# networkConfig.IPv6PrivacyExtensions = "kernel";
|
||||
# dhcpV4Config.RouteMetric = 40;
|
||||
# dhcpV6Config.RouteMetric = 40;
|
||||
#};
|
||||
};
|
||||
}
|
||||
|
|
Binary file not shown.
|
@ -3,7 +3,7 @@
|
|||
name,
|
||||
...
|
||||
}: {
|
||||
rekey.secrets.initrd_host_ed25519_key.file = ../hosts/${name}/initrd_host_ed25519_key.age;
|
||||
rekey.secrets.initrd_host_ed25519_key.file = ../hosts/${name}/secrets/initrd_host_ed25519_key.age;
|
||||
|
||||
boot.initrd.network.enable = true;
|
||||
boot.initrd.network.ssh = {
|
||||
|
|
Binary file not shown.
Loading…
Add table
Add a link
Reference in a new issue