diff --git a/hosts/nord/default.nix b/hosts/nord/default.nix index cfce1cb..e6c30b4 100644 --- a/hosts/nord/default.nix +++ b/hosts/nord/default.nix @@ -24,6 +24,7 @@ ../../profiles/mounts/freon-nfs.nix ../../profiles/mounts/reidun-nfs.nix ../../profiles/mounts/meconium-nfs.nix + ../../profiles/mounts/fridge-nfs.nix ../../profiles/shell/base.nix ../../profiles/shell/archives.nix diff --git a/hosts/noximilien/default.nix b/hosts/noximilien/default.nix index 9fb4c4f..a6489d9 100644 --- a/hosts/noximilien/default.nix +++ b/hosts/noximilien/default.nix @@ -19,6 +19,7 @@ ../../profiles/mounts/freon-nfs.nix ../../profiles/mounts/reidun-nfs.nix ../../profiles/mounts/meconium-zfs.nix + ../../profiles/mounts/fridge-nfs.nix ../../profiles/shell/base.nix ../../profiles/shell/archives.nix diff --git a/profiles/mounts/common-zfs.nix b/profiles/mounts/common-zfs.nix index 225c81a..61fe5fa 100644 --- a/profiles/mounts/common-zfs.nix +++ b/profiles/mounts/common-zfs.nix @@ -28,7 +28,8 @@ #services.zfs.trim.enable = true; # the `sharenfs` property generates /etc/exports.d/zfs.exports file, automatically processed by NFS - # # zfs set sharenfs="-maproot=0:0 -network=192.168.1.0/24" Meconium + # # zfs set sharenfs="-maproot=0:0 -network=192.168.1.0/24" Reidun # # zfs set sharenfs="ro=192.168.1.0/24,all_squash,anonuid=70,anongid=70" Meconium + # # zfs set sharenfs="rw=192.168.1.0/24" Meconium services.nfs.server.enable = lib.mkDefault true; } diff --git a/profiles/mounts/fridge-nfs.nix b/profiles/mounts/fridge-nfs.nix new file mode 100644 index 0000000..7d61c67 --- /dev/null +++ b/profiles/mounts/fridge-nfs.nix @@ -0,0 +1,119 @@ +{ config, pkgs, lib, ... }: +{ + #boot.kernelParams = [ "nfs.nfs4_disable_idmapping=0" "nfsd.nfs4_disable_idmapping=0" ]; + + # TODO: wg-common.nix + + #wireguard fyrkat client + # https://nixos.wiki/wiki/WireGuard + networking.firewall.allowedUDPPorts = [ config.networking.wireguard.interfaces."wg0".listenPort ]; + networking.wireguard.interfaces."wg0" = { + ips = [ "172.22.48.3/24" ]; + listenPort = 51820; # (random is default) + generatePrivateKeyFile = true; + privateKeyFile = "/var/lib/wg/wireguard_key"; + + peers = [ + { + # get your pubkey to give to fyrkat with `wg pubkey