49 lines
1.1 KiB
Nix
49 lines
1.1 KiB
Nix
{ config, pkgs, lib, ... }:
|
|
|
|
{
|
|
imports = [
|
|
./hardware-configuration.nix
|
|
../../modules/common/default.nix
|
|
../../modules/rpi/rpi4.nix
|
|
];
|
|
|
|
config = {
|
|
system.stateVersion = "22.05";
|
|
|
|
networking.hostName = "microserver";
|
|
networking.domain = "home.ts.hillion.co.uk";
|
|
|
|
# Networking
|
|
## Tailscale
|
|
age.secrets."tailscale/microserver.home.ts.hillion.co.uk".file = ../../secrets/tailscale/microserver.home.ts.hillion.co.uk.age;
|
|
custom.tailscale = {
|
|
enable = true;
|
|
preAuthKeyFile = config.age.secrets."tailscale/microserver.home.ts.hillion.co.uk".path;
|
|
advertiseRoutes = [ "10.64.50.0/24" "10.239.19.0/24" ];
|
|
advertiseExitNode = true;
|
|
};
|
|
|
|
## Enable IoT VLAN
|
|
networking.vlans = {
|
|
vlan2 = {
|
|
id = 2;
|
|
interface = "eth0";
|
|
};
|
|
};
|
|
|
|
## Enable IP forwarding for Tailscale
|
|
boot.kernel.sysctl = {
|
|
"net.ipv4.ip_forward" = true;
|
|
};
|
|
|
|
## Run a persistent iperf3 server
|
|
services.iperf3.enable = true;
|
|
services.iperf3.openFirewall = true;
|
|
|
|
networking.firewall.interfaces."tailscale0".allowedTCPPorts = [
|
|
1883 # MQTT server
|
|
];
|
|
};
|
|
}
|
|
|