1

Add systemd-networkd system module

This commit is contained in:
2023-05-24 14:43:16 +02:00
parent 308dac2d02
commit ea8769ffdc
3 changed files with 149 additions and 0 deletions

View File

@ -0,0 +1,77 @@
{
inputs,
config,
lib,
mylib,
pkgs,
...
}:
with lib;
with mylib.networking;
with mylib.modules; let
cfg = config.modules.network;
in {
options.modules.network = import ./options.nix {inherit lib mylib;};
config = mkIf cfg.enable {
services.resolved.enable = true;
services.resolved.llmnr = "false";
# Main Networks
systemd.network = {
enable = true;
networks = cfg.networks;
};
# Wireguard VPNs
systemd.services = cfg.wireguard-tunnels;
# General Networking Settings
networking = {
# Gets inherited from flake in nixos mylib and passed through the module option
hostName = cfg.hostname; # Define your hostname.
enableIPv6 = true;
# Disable a lot of stuff not needed for systemd-networkd
networkmanager.enable = false;
useDHCP = false; # Default: true, don't use with networkd
dhcpcd.enable = false; # Don't use with networkd
useNetworkd = false; # Only use this if the configuration can't be written in systemd.network completely. It translates some of the networking... options to systemd
# resolvconf.enable = true;
# TODO: Either IWD or WiFi through systemd-networkd
wireless = {
enable = false; # Enables wireless support via wpa_supplicant.
iwd.enable = false; # Use iwd instead of NetworkManager
};
# Open Ports
firewall = {
enable = true;
# networking.firewall.checkReversePath = "loose";
trustedInterfaces = [
"podman0"
"docker0"
];
allowedTCPPorts = cfg.allowedTCPPorts;
# allowedTCPPorts = [
# 22 # SSH
# 80 # HTTP
# 443 # HTTPS
# ];
# allowedTCPPortRanges = [];
allowedUDPPorts = cfg.allowedUDPPorts;
# allowedUDPPorts = [
# 9918 # Wireguard
# 18000 # Anno 1800
# 24727 # AusweisApp2, alternative: programs.ausweisapp.openFirewall
# ];
# allowedUDPPortRanges = [];
};
};
};
}