set dns servers for wheatley to adguard
This commit is contained in:
parent
dd559197f1
commit
b81f2902a5
|
@ -50,6 +50,24 @@
|
||||||
|
|
||||||
networking.hostName = "wheatley";
|
networking.hostName = "wheatley";
|
||||||
|
|
||||||
|
networking.networkmanager.enable = true;
|
||||||
|
|
||||||
|
# Disable NetworkManager's internal DNS resolution
|
||||||
|
networking.networkmanager.dns = "none";
|
||||||
|
|
||||||
|
# These options are unnecessary when managing DNS ourselves
|
||||||
|
networking.useDHCP = false;
|
||||||
|
networking.dhcpcd.enable = false;
|
||||||
|
|
||||||
|
# Configure DNS servers manually (this example uses Cloudflare and Google DNS)
|
||||||
|
# IPv6 DNS servers can be used here as well.
|
||||||
|
networking.nameservers = [
|
||||||
|
"94.140.14.49"
|
||||||
|
"94.140.14.59"
|
||||||
|
"2a10:50c0:0:0:0:0:ded:ff"
|
||||||
|
"2a10:50c0:0:0:0:0:dad:ff"
|
||||||
|
];
|
||||||
|
|
||||||
services.openssh = {
|
services.openssh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
# require public key authentication for better security
|
# require public key authentication for better security
|
||||||
|
@ -93,8 +111,8 @@
|
||||||
wants = ["network-online.target"];
|
wants = ["network-online.target"];
|
||||||
|
|
||||||
what = "https://nextcloud.gladtherescake.eu/remote.php/dav/files/GLaDTheresCake";
|
what = "https://nextcloud.gladtherescake.eu/remote.php/dav/files/GLaDTheresCake";
|
||||||
where = "/home/kodi/nextcloud";
|
where = "/home/jellyfinmediaplayer/nextcloud";
|
||||||
options = "uid=1002,gid=100,file_mode=0664,dir_mode=2775";
|
options = "uid=1003,gid=100,file_mode=0664,dir_mode=2775";
|
||||||
type = "davfs";
|
type = "davfs";
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
|
@ -105,11 +123,12 @@
|
||||||
# users.users.jellyfinmediaplayer.group = "jellyfinmediaplayer";
|
# users.users.jellyfinmediaplayer.group = "jellyfinmediaplayer";
|
||||||
# users.users.jellyfin.extraGroups = ["jellyfinmediaplayer"];
|
# users.users.jellyfin.extraGroups = ["jellyfinmediaplayer"];
|
||||||
|
|
||||||
users.extraUsers.kodi.isNormalUser = true;
|
# # Add stremio kiosk on wayland :)
|
||||||
|
# users.extraUsers.jellyfinmediaplayer.isNormalUser = true;
|
||||||
services.cage.user = "kodi";
|
# services.cage.user = "jellyfinmediaplayer";
|
||||||
services.cage.program = "${pkgs.kodi-wayland}/bin/kodi-standalone";
|
# services.cage.program = "${pkgs.jellyfin-media-player}/bin/jellyfinmediaplayer";
|
||||||
services.cage.enable = true;
|
# services.cage.enable = true;
|
||||||
|
# services.cage.extraArguments = ["-f"];
|
||||||
|
|
||||||
users.users.aria2.group = "aria2";
|
users.users.aria2.group = "aria2";
|
||||||
users.groups.aria2 = {};
|
users.groups.aria2 = {};
|
||||||
|
@ -219,12 +238,12 @@
|
||||||
{
|
{
|
||||||
#Shodan public key
|
#Shodan public key
|
||||||
publicKey = "Zah2nZDaHF8jpP5AtMA5bhE7t38fMB2UHzbXAc96/jw=";
|
publicKey = "Zah2nZDaHF8jpP5AtMA5bhE7t38fMB2UHzbXAc96/jw=";
|
||||||
allowedIPs = ["10.0.0.4/32" "fdc9:281f:04d7:9ee9::4/128"];
|
allowedIPs = ["10.0.0.4/32" "fdc9:281f:04d7:9ee9::3/128"];
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
#ADA public key
|
#ADA public key
|
||||||
publicKey = "SHu7xxRVWuqp4U4uipMoITKrFPWZATGsJevUeqBSzWo=";
|
publicKey = "SHu7xxRVWuqp4U4uipMoITKrFPWZATGsJevUeqBSzWo=";
|
||||||
allowedIPs = ["10.0.0.5/32" "fdc9:281f:04d7:9ee9::5/128"];
|
allowedIPs = ["10.0.0.5/32" "fdc9:281f:04d7:9ee9::3/128"];
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
@ -241,8 +260,6 @@
|
||||||
"net.ipv4.ip_forward" = 1;
|
"net.ipv4.ip_forward" = 1;
|
||||||
"net.ipv6.conf.all.forwarding" = 1;
|
"net.ipv6.conf.all.forwarding" = 1;
|
||||||
};
|
};
|
||||||
# Enable audio devices
|
|
||||||
boot.kernelParams = ["snd_bcm2835.enable_hdmi=1" "snd_bcm2835.enable_headphones=1"];
|
|
||||||
|
|
||||||
# enable NAT
|
# enable NAT
|
||||||
networking.nat.enable = true;
|
networking.nat.enable = true;
|
||||||
|
|
Loading…
Reference in a new issue