Commit graph

89 commits

Author SHA1 Message Date
bd83a33608 swann: swap to 192.168.2.x for the EE interface 2024-10-13 20:04:00 +01:00
adc5d0fb05 ops/nixos: try to make some things more robust by trying Harder 2024-10-13 14:03:05 +01:00
52a0d29396 nixos/bgp: fixup 2024-07-13 16:57:05 +00:00
398cadaac3 swann: correct kea configs 2024-06-10 08:43:44 +01:00
4db9ef0543 ops/nixos: change shape of systemd-networkd
some repeated things have moved up
2024-06-09 00:53:59 +01:00
761465b393 swann: add peering to cofractal-ams01/rexxar 2024-04-04 22:51:27 +00:00
6f11983d75 swann: add wg-eta 2023-11-17 10:59:16 +00:00
20490c0853 swann: enable TFTP and HTTP for phone booting 2023-10-28 20:32:40 +00:00
ac0d2c58ed swann: switch to v6 2023-10-13 01:40:35 +00:00
dab5bd9c5b swann: add minicom and screen 2023-10-12 20:22:17 +00:00
7b585fab0d swann: add conntrack-tools 2023-10-10 23:29:39 +00:00
0eab7d1802 swann: disable multicast snooping and vlan filtering 2023-10-02 17:08:30 +00:00
f51c993198 swann: correct the path to the bird socket 2023-09-30 21:22:50 +00:00
acb3f9c849 swann: fix en-ee routes so they belong to the ee route table 2023-09-30 21:22:36 +00:00
bb084d5aab swann: kea/radvd if erbium is off 2023-08-19 23:54:48 +01:00
2e6ef07a23 swann: disable erbium again 2023-08-14 01:07:39 +01:00
eaa2538389 swann: fix IP for en-ee interface 2023-08-13 21:38:47 +01:00
f1f295f027 swann: switch to IPv4 for wireguard as well
I'm having trouble getting a properly delegated prefix for tethering on the
Quectel modem inside kerrigan. One day I'll figure it out I guess.
2023-08-19 22:37:13 +00:00
7a8614d2f7 swann: switch to erbium (this is broken) 2023-08-08 23:29:58 +01:00
e93f012772 swann: migrate to erbium 2023-08-06 17:06:18 +01:00
5d47f75c2f swann: don't add mopup rules for wg-intfs, since we'll get that via BGP 2023-07-19 23:28:58 +01:00
528ed1debc swann: add qvmpc6552 2023-07-11 12:01:00 +01:00
1c9b9e9fcd swann: boot.tmpOnTmpfs -> boot.tmp.useTmpfs 2023-05-28 01:32:25 +01:00
4faf4a4630 swann: disable unifi 2023-04-15 02:45:10 +00:00
ed03e709c5 euw1.api.riotgames.com is on AWS and isn't useful 2023-01-14 22:17:36 +00:00
40ed8549b8 resolve some warnings 2022-12-29 14:15:58 +00:00
9dee33f3dc swann: reenable unifi controller 2022-10-09 18:15:47 +01:00
c16856f8ab treewide: add my.ip.tailscale6 2022-09-02 00:22:16 +01:00
784324fd20 ops/nixos: decommission virgin media 2022-04-15 23:42:05 +01:00
b40f3435f4 swann: switch to SFP 2022-03-30 16:42:37 +00:00
b8acd6e31b swann: re-enable vault-agent 2022-03-20 19:10:24 +00:00
262620f177 swann: also put v6 RA routes into the correct route table
(fixes ee)
2022-03-13 20:35:11 +00:00
615c30ed54 swann: reduce write activity on disk 2022-03-13 17:34:23 +00:00
5283ee4fee swann: migrate fully to using networkd
networkd appears to have gotten very aggressive about clearing routing rules it didn't insert itself
2022-03-12 19:38:54 +00:00
9099ee2a45 swann: only rename physical interfaces 2022-03-12 07:25:48 +00:00
6353ce6603 swann: make systemd-networkd-wait-online wait for _any_ NIC 2022-03-11 22:57:08 +00:00
0c458988de ops/nixos: misc cleanups 2022-03-11 03:27:58 +00:00
f0e645fccb swann: add lukegb01.ring.nlnog.net to smokeping prober 2022-03-03 18:44:56 +00:00
080577e0f3 swann: fix tailscale outbound
Tailscale adds a policy-based routing rule at priority 5200-ish, which is
before all the rules that we add. This avoids any Tailscale traffic going
out... over Tailscale, which would be bad.

Anyway, this breaks us because our main table is empty, so there's nowhere
for the Tailscale traffic to actually go. Oops.

Instead, use policy-based routing to send things over our WG tunnel, or over
any of our upstream connections depending on what's available.
2022-03-02 00:32:31 +00:00
cbabb6f211 ops/nixos: migrate nix.maxJobs/binaryCaches/trustedBinaryCaches to the nix.settings equivalents 2022-01-30 20:30:20 +00:00
4b14ea5b4d ops/nixos: remove rebuilder
It's in the common profile, we don't need it everywhere.
2022-01-23 16:57:20 +00:00
eb3b306439 Backed out changeset 073cf55ed346
Mischief managed
2022-01-15 13:32:47 +00:00
687d72cfdc ops/nixos: experiment with ECMP 2022-01-15 13:32:41 +00:00
9be6bcaf2d ops/nixos: set up gnetwork link 2022-01-14 19:42:06 +00:00
ad95bffd3d ops/nixos: tidy up networking.useDHCP 2022-01-08 21:45:18 +00:00
6cfcd10e06 swann: use the router's public IP when making connections
For v6, the link is on an unrouted subnet so there's no way to address it from
outside. We don't want Linux to use the v6 subnet for connections it makes, so
we ask politely that the source on the route is actually an IP address that we
Like.
2022-01-01 02:11:59 +00:00
3458c7766e swann: switch from prod.euw1.riotgames.com to euw1.api.riotgames.com
The former appears to resolve, but no longer respond to ICMP ping (even from a
different network).  Switch to the documented API endpoint, which still
responds to ICMP ping.
2022-01-01 01:31:56 +00:00
8b3e77de1e swann: coredns shouldn't bind to 127.0.0.53 because systemd-resolved wants it 2021-12-31 23:52:57 +00:00
ca6de1910d swann: services.unifi.openPorts -> openFirewall 2021-12-24 02:03:36 +00:00
d99fe8b153 depot: fixups 2021-12-08 02:37:12 +00:00