diff options
author | Franck Cuny <franck@fcuny.net> | 2022-04-05 17:27:04 -0700 |
---|---|---|
committer | Franck Cuny <franck@fcuny.net> | 2022-04-05 17:27:04 -0700 |
commit | 35e8b8b78d4ad3b8002b922bc0a9f9dcbcf47351 (patch) | |
tree | 532c717f6a83d19c84d05c0cecd4e90c693bef58 /hosts/tahoe | |
parent | ssh: refactor to a module (diff) | |
download | world-35e8b8b78d4ad3b8002b922bc0a9f9dcbcf47351.tar.gz |
network: move tailscale in modules
Move the networking configuration for the hosts to its own file.
Diffstat (limited to '')
-rw-r--r-- | hosts/tahoe/default.nix | 21 | ||||
-rw-r--r-- | hosts/tahoe/networking.nix | 22 |
2 files changed, 23 insertions, 20 deletions
diff --git a/hosts/tahoe/default.nix b/hosts/tahoe/default.nix index 5a746dd..9d11720 100644 --- a/hosts/tahoe/default.nix +++ b/hosts/tahoe/default.nix @@ -3,31 +3,12 @@ { imports = [ # Include the results of the hardware scan. ./hardware-configuration.nix + ./networking.nix ../profiles/nas.nix - ../common/system/tailscale.nix ]; boot = { initrd = { luks.devices."system".allowDiscards = true; }; }; - # Use systemd-networkd for networking - systemd.network = { - enable = true; - networks = { - enp42s0 = { - matchConfig.Name = "enp42s0"; - networkConfig = { DHCP = "yes"; }; - extraConfig = '' - [DHCPv4] - UseDNS=yes - UseDomains=yes - ''; - }; - }; - }; - - networking.private-wireguard.enable = true; - networking.firewall.enable = false; - # This value determines the NixOS release from which the default # settings for stateful data, like file locations and database versions # on your system were taken. It‘s perfectly fine and recommended to leave diff --git a/hosts/tahoe/networking.nix b/hosts/tahoe/networking.nix new file mode 100644 index 0000000..1b0568e --- /dev/null +++ b/hosts/tahoe/networking.nix @@ -0,0 +1,22 @@ +{ ... }: { + # Use systemd-networkd for networking + systemd.network = { + enable = true; + networks = { + enp42s0 = { + matchConfig.Name = "enp42s0"; + networkConfig = { DHCP = "yes"; }; + extraConfig = '' + [DHCPv4] + UseDNS=yes + UseDomains=yes + ''; + }; + }; + }; + + networking.private-wireguard.enable = true; + networking.firewall.enable = false; + + my.services.tailscale.enable = true; +} |