Files
flocon/machines/crocus/configuration.nix
Romain Paquet 09f57a1e6f clan: migrate internal DNS to coredns service
Currently using a patched version of the upstream
coredns service, with hard-coded IPs until
wireguard exports are supported.

Zerotier connections were flaky and wireguard
seems more stable (although it seems to have a bit
less throughput).
2025-11-27 14:52:45 +01:00

81 lines
1.5 KiB
Nix

{
self,
...
}:
{
imports = [
./radicle.nix
self.nixosModules.nix-defaults
../../modules/remote-builder.nix
self.inputs.srvos.nixosModules.server
self.inputs.srvos.nixosModules.hardware-hetzner-cloud
];
disabledModules = [
self.inputs.srvos.nixosModules.mixins-cloud-init
];
nixpkgs.hostPlatform = "x86_64-linux";
networking.hostName = "crocus";
networking.useDHCP = false;
systemd.network.enable = true;
systemd.network.networks."10-wan" = {
matchConfig.Name = "enp1s0";
networkConfig.DHCP = "ipv4";
address = [
"2a01:4f8:1c1e:e415::1/64"
];
routes = [
{ Gateway = "fe80::1"; }
];
};
fileSystems."/data1" = {
device = "/dev/disk/by-id/scsi-0HC_Volume_103766469";
};
services.garage.settings.data_dir = [
{
path = "/var/lib/garage/data";
capacity = "20G";
}
{
path = "/data1/garage";
capacity = "20G";
}
];
clan.core.settings.state-version.enable = true;
clan.core.networking.buildHost = "root@haze";
services.avahi.allowInterfaces = [
"zts7mq7onf"
];
boot.loader.grub = {
efiSupport = true;
efiInstallAsRemovable = true;
};
services.nginx = {
enable = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
};
networking.firewall.allowedTCPPorts = [
80
443
];
security.acme = {
acceptTerms = true;
defaults.email = "admin@rpqt.fr";
};
services.tailscale.useRoutingFeatures = "server";
}