fixed pihole config
This commit is contained in:
parent
ac580d8e51
commit
53301d0e45
|
@ -87,13 +87,13 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
podman = {
|
# podman = {
|
||||||
macvlan = {
|
# macvlan = {
|
||||||
subnet = "192.168.1.0/24";
|
# subnet = "192.168.1.0/24";
|
||||||
gateway = "192.168.1.1";
|
# gateway = "192.168.1.1";
|
||||||
networkInterface = "bond0";
|
# networkInterface = "bond0";
|
||||||
};
|
# };
|
||||||
};
|
# };
|
||||||
jellyfin = {
|
jellyfin = {
|
||||||
enable = true;
|
enable = true;
|
||||||
subdomain = "media";
|
subdomain = "media";
|
||||||
|
@ -112,7 +112,7 @@
|
||||||
};
|
};
|
||||||
pihole = {
|
pihole = {
|
||||||
enable = true;
|
enable = true;
|
||||||
ip = "192.168.1.201";
|
# ip = "192.168.1.201";
|
||||||
};
|
};
|
||||||
nextcloud = {
|
nextcloud = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -178,10 +178,12 @@
|
||||||
extraUpFlags = [
|
extraUpFlags = [
|
||||||
"--advertise-exit-node"
|
"--advertise-exit-node"
|
||||||
"--advertise-routes=192.168.1.0/24"
|
"--advertise-routes=192.168.1.0/24"
|
||||||
|
"--accept-dns=false"
|
||||||
];
|
];
|
||||||
extraSetFlags = [
|
extraSetFlags = [
|
||||||
"--advertise-exit-node"
|
"--advertise-exit-node"
|
||||||
"--advertise-routes=192.168.1.0/24"
|
"--advertise-routes=192.168.1.0/24"
|
||||||
|
"--accept-dns=false"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -5,6 +5,7 @@
|
||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
dnsPort = 53;
|
dnsPort = 53;
|
||||||
|
webPort = 8090;
|
||||||
in {
|
in {
|
||||||
options.host.pihole = {
|
options.host.pihole = {
|
||||||
enable = lib.mkEnableOption "should home-assistant be enabled on this computer";
|
enable = lib.mkEnableOption "should home-assistant be enabled on this computer";
|
||||||
|
@ -14,9 +15,27 @@ in {
|
||||||
};
|
};
|
||||||
image = lib.mkOption {
|
image = lib.mkOption {
|
||||||
type = lib.types.str;
|
type = lib.types.str;
|
||||||
default = "pihole/pihole:2024.07.0";
|
default = "pihole/pihole:latest";
|
||||||
description = "container image to use for pi-hole";
|
description = "container image to use for pi-hole";
|
||||||
};
|
};
|
||||||
|
# piholeStateDirectory = {
|
||||||
|
# type = lib.types.str;
|
||||||
|
# default = "${config.host.pihole.directory}/pihole";
|
||||||
|
# };
|
||||||
|
# tailscaleStateDirectory = {
|
||||||
|
# type = lib.types.str;
|
||||||
|
# default = "${config.host.pihole.directory}/tailscale";
|
||||||
|
# };
|
||||||
|
# piholeImage = lib.mkOption {
|
||||||
|
# type = lib.types.str;
|
||||||
|
# default = "pihole/pihole:2024.07.0";
|
||||||
|
# description = "container image to use for pi-hole";
|
||||||
|
# };
|
||||||
|
# tailscaleImage = lib.mkOption {
|
||||||
|
# type = lib.types.str;
|
||||||
|
# default = "tailscale/tailscale:latest";
|
||||||
|
# description = "container image to use for pi-holes tail scale";
|
||||||
|
# };
|
||||||
ip = lib.mkOption {
|
ip = lib.mkOption {
|
||||||
type = lib.types.str;
|
type = lib.types.str;
|
||||||
description = "ip address to use for pi-hole";
|
description = "ip address to use for pi-hole";
|
||||||
|
@ -25,14 +44,24 @@ in {
|
||||||
config = lib.mkIf config.host.pihole.enable (lib.mkMerge [
|
config = lib.mkIf config.host.pihole.enable (lib.mkMerge [
|
||||||
{
|
{
|
||||||
host.podman.enable = true;
|
host.podman.enable = true;
|
||||||
sops.secrets = {
|
sops = {
|
||||||
|
secrets = {
|
||||||
"services/pi-hole" = {
|
"services/pi-hole" = {
|
||||||
sopsFile = "${inputs.secrets}/defiant-services.yaml";
|
sopsFile = "${inputs.secrets}/defiant-services.yaml";
|
||||||
};
|
};
|
||||||
|
# "wireguard-keys/tailscale-authkey/pihole" = {
|
||||||
|
# sopsFile = "${inputs.secrets}/wireguard-keys.yaml";
|
||||||
|
# };
|
||||||
|
};
|
||||||
|
templates."pihole.env".content = ''
|
||||||
|
FTLCONF_webserver_api_password=${config.sops.placeholder."services/pi-hole"}
|
||||||
|
'';
|
||||||
};
|
};
|
||||||
systemd = {
|
systemd = {
|
||||||
tmpfiles.rules = [
|
tmpfiles.rules = [
|
||||||
"d ${config.host.pihole.directory} 755 pihole pihole -" # is /home/docker/pihole on old system
|
"d ${config.host.pihole.directory} 755 pihole pihole -" # is /home/docker/pihole on old system
|
||||||
|
# "d ${config.host.pihole.piholeStateDirectory} 755 pihole pihole -"
|
||||||
|
# "d ${config.host.pihole.tailscaleStateDirectory} 755 pihole pihole -"
|
||||||
];
|
];
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
|
@ -40,12 +69,12 @@ in {
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
Restart = lib.mkOverride 500 "always";
|
Restart = lib.mkOverride 500 "always";
|
||||||
};
|
};
|
||||||
after = [
|
# after = [
|
||||||
"podman-network-macvlan.service"
|
# "podman-network-macvlan.service"
|
||||||
];
|
# ];
|
||||||
requires = [
|
# requires = [
|
||||||
"podman-network-macvlan.service"
|
# "podman-network-macvlan.service"
|
||||||
];
|
# ];
|
||||||
partOf = [
|
partOf = [
|
||||||
"podman-compose-root.target"
|
"podman-compose-root.target"
|
||||||
];
|
];
|
||||||
|
@ -56,13 +85,8 @@ in {
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# TODO: we need to have a tailscale container here and use that to define the network_mode of pihole container
|
services.resolved.enable = false;
|
||||||
# TS_ACCEPT_DNS = "false";
|
|
||||||
# TS_AUTHKEY = ${something from a secrets file???}
|
|
||||||
# TS_HOSTNAME = "pihole";
|
|
||||||
# TS_USERSPACE = "false";
|
|
||||||
# TODO: volumes for tailnet container with impermanence config
|
|
||||||
# https://tailscale.com/kb/1282/docker
|
|
||||||
virtualisation = {
|
virtualisation = {
|
||||||
oci-containers = {
|
oci-containers = {
|
||||||
containers = {
|
containers = {
|
||||||
|
@ -76,16 +100,40 @@ in {
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
TZ = "America/Chicago";
|
TZ = "America/Chicago";
|
||||||
WEBPASSWORD_FILE = passwordFileLocation;
|
FTLCONF_webserver_port = toString webPort;
|
||||||
PIHOLE_UID = toString config.users.users.pihole.uid;
|
PIHOLE_UID = toString config.users.users.pihole.uid;
|
||||||
PIHOLE_GID = toString config.users.groups.pihole.gid;
|
PIHOLE_GID = toString config.users.groups.pihole.gid;
|
||||||
};
|
};
|
||||||
|
environmentFiles = [
|
||||||
|
config.sops.templates."pihole.env".path
|
||||||
|
];
|
||||||
log-driver = "journald";
|
log-driver = "journald";
|
||||||
extraOptions = [
|
extraOptions = [
|
||||||
"--ip=${config.host.pihole.ip}"
|
"--network=host"
|
||||||
"--network=macvlan"
|
# "--network=container:${tailscale container id}"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
# ts-pihole = {
|
||||||
|
# image = config.host.pihole.tailscaleImage;
|
||||||
|
# volumes = "${config.host.pihole.tailscaleStateDirectory}:/var/lib/tailscale";
|
||||||
|
# environment = {
|
||||||
|
# TS_ACCEPT_DNS = "false";
|
||||||
|
# TS_HOSTNAME = "pihole";
|
||||||
|
# TS_STATE_DIR = "/var/lib/tailscale";
|
||||||
|
# TS_USERSPACE = "false";
|
||||||
|
# TS_EXTRA_ARGS = "--advertise-tags=tag:container";
|
||||||
|
# };
|
||||||
|
# environmentFiles = [
|
||||||
|
# config.sops.templates."tailscale-pihole.env".path
|
||||||
|
# ];
|
||||||
|
# devices = [
|
||||||
|
# "/dev/net/tun:/dev/net/tun"
|
||||||
|
# ];
|
||||||
|
# extraOptions = [
|
||||||
|
# "--ip=${config.host.pihole.ip}"
|
||||||
|
# "--network=macvlan"
|
||||||
|
# ];
|
||||||
|
# };
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,6 +1,5 @@
|
||||||
{
|
{
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
|
||||||
config,
|
config,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
|
@ -26,19 +25,19 @@
|
||||||
config = lib.mkIf config.host.podman.enable {
|
config = lib.mkIf config.host.podman.enable {
|
||||||
systemd = {
|
systemd = {
|
||||||
services = {
|
services = {
|
||||||
"podman-network-macvlan" = {
|
# "podman-network-macvlan" = {
|
||||||
path = [pkgs.podman];
|
# path = [pkgs.podman];
|
||||||
serviceConfig = {
|
# serviceConfig = {
|
||||||
Type = "oneshot";
|
# Type = "oneshot";
|
||||||
RemainAfterExit = true;
|
# RemainAfterExit = true;
|
||||||
ExecStop = "podman network rm -f macvlan";
|
# ExecStop = "podman network rm -f macvlan";
|
||||||
};
|
# };
|
||||||
script = ''
|
# script = ''
|
||||||
podman network inspect macvlan || podman network create --driver macvlan --subnet ${config.host.podman.macvlan.subnet} --gateway ${config.host.podman.macvlan.gateway} --opt parent=${config.host.podman.macvlan.networkInterface} macvlan
|
# podman network inspect macvlan || podman network create --driver macvlan --subnet ${config.host.podman.macvlan.subnet} --gateway ${config.host.podman.macvlan.gateway} --opt parent=${config.host.podman.macvlan.networkInterface} macvlan
|
||||||
'';
|
# '';
|
||||||
partOf = ["podman-compose-root.target"];
|
# partOf = ["podman-compose-root.target"];
|
||||||
wantedBy = ["podman-compose-root.target"];
|
# wantedBy = ["podman-compose-root.target"];
|
||||||
};
|
# };
|
||||||
};
|
};
|
||||||
# disable computer sleeping
|
# disable computer sleeping
|
||||||
targets = {
|
targets = {
|
||||||
|
|
Loading…
Reference in a new issue