1
0
mirror of https://github.com/kmein/niveum synced 2026-03-19 03:21:10 +01:00
Files
niveum/configs/networks.nix

73 lines
1.8 KiB
Nix
Raw Normal View History

2019-01-27 11:16:11 +01:00
{ pkgs, config, lib, ... }:
2019-01-08 18:22:54 +01:00
{
2019-01-27 11:16:11 +01:00
networking.hosts = lib.mapAttrs (_: value: [ (value + ".local") ]) {
"192.168.178.21" = "scardanelli";
"192.168.178.27" = "printer";
"192.168.178.1" = "router";
"192.168.178.24" = "lestrade";
"192.168.178.22" = "homeros";
};
2018-12-18 23:40:58 +01:00
networking.wireless = {
enable = true;
userControlled.enable = true;
networks = {
Aether = { pskRaw = "e1b18af54036c5c9a747fe681c6a694636d60a5f8450f7dec0d76bc93e2ec85a"; };
2019-01-08 18:24:32 +01:00
EasyBox-927376 = { pskRaw = "dbd490ab69b39bd67cfa06daf70fc3ef3ee90f482972a668ed758f90f5577c22"; };
2018-12-18 23:40:58 +01:00
"Asoziales Netzwerk" = { pskRaw = "8e234041ec5f0cd1b6a14e9adeee9840ed51b2f18856a52137485523e46b0cb6"; };
2019-01-08 18:24:32 +01:00
c-base-public = {};
};
};
# for kdeconnect
networking.firewall = {
allowedTCPPortRanges = [ { from = 1714; to = 1764; } ];
allowedUDPPortRanges = [ { from = 1714; to = 1764; } ];
};
home-manager.users.kfm = {
services.kdeconnect = {
enable = true;
indicator = true;
2018-12-18 23:40:58 +01:00
};
2019-01-14 15:20:30 +01:00
programs.ssh = {
enable = true;
2019-01-27 11:16:11 +01:00
matchBlocks = {
"lestrade" = {
hostname = "lestrade.local";
user = "pi";
};
};
2019-01-14 15:20:30 +01:00
};
};
programs.ssh = {
startAgent = true;
knownHosts = [];
2019-01-27 11:16:11 +01:00
forwardX11 = true;
};
services.openssh = {
ports = [ 10022 ];
enable = true;
forwardX11 = true;
};
2018-12-04 21:08:12 +01:00
networking.retiolum = {
scardanelli = {
ipv4 = "10.243.2.2";
ipv6 = "42:0:3c46:4007:5bce:f1bc:606b:2b18";
2018-12-04 21:08:12 +01:00
};
homeros = {
ipv4 = "10.243.2.1";
ipv6 = "42:0:3c46:53e:e63d:e62a:56ea:c705";
2018-12-04 21:08:12 +01:00
};
}.${config.networking.hostName};
environment.etc."tinc/retiolum/rsa_key.priv" = {
2018-12-30 20:47:09 +01:00
text = (import ../secrets.nix).retiolum.${config.networking.hostName}.privateKey;
mode = "400";
};
}