commit 2b907ec1a3101b97c833862e498bf9bdf09fac65
parent 4514d81608ac361cc945ef5254fc501c0c5c8430
Author: Katja (zaphyra) <git@ctu.cx>
Date: Fri, 13 Jun 2025 21:59:35 +0200
parent 4514d81608ac361cc945ef5254fc501c0c5c8430
Author: Katja (zaphyra) <git@ctu.cx>
Date: Fri, 13 Jun 2025 21:59:35 +0200
config/nixos/modules/presets/zaphyra/dnsServer: add `zaphyra.dn42`
3 files changed, 24 insertions(+), 0 deletions(-)
diff --git a/config/nixos/modules/presets/zaphyra/dnsServer.nix b/config/nixos/modules/presets/zaphyra/dnsServer.nix @@ -65,6 +65,20 @@ in "zaphyra.de" = { inherit SOA NS CAA; }; + "zaphyra.dn42" = { + NS = [ + "ns1.zaphyra.dn42." + ]; + SOA = { + nameServer = "ns1.zaphyra.dn42."; + adminEmail = "dns@zaphyra.eu"; # Email address with a real `@`! + serial = 0; + }; + subdomains = { + ns1.AAAA = [ "fd6b:6174:6a61:53::1" ]; + ns2.AAAA = [ "fd6b:6174:6a61:53::2" ]; + }; + }; "katja.wtf" = { inherit SOA NS CAA;
diff --git a/hosts/morio/dn42.nix b/hosts/morio/dn42.nix @@ -7,6 +7,10 @@ group = "systemd-network"; }; + services.knot.settings.server.listen = [ + "fd6b:6174:6a61:53::2" + ]; + systemd.network = { netdevs."20-dn42" = { netdevConfig = { @@ -37,6 +41,7 @@ routes = [{ Destination = "fd00::/8"; }]; address = [ "fd6b:6174:6a61::2/128" + "fd6b:6174:6a61:53::2/128" ]; networkConfig = { DNSDefaultRoute = false;
diff --git a/hosts/novus/dn42.nix b/hosts/novus/dn42.nix @@ -4,6 +4,10 @@ dns.zones."zaphyra.eu".subdomains."router-a.dn42".AAAA = [ hostConfig.networking.ip6Address ]; + services.knot.settings.server.listen = [ + "fd6b:6174:6a61:53::1" + ]; + sops.secrets."dn42/wgPrivateKey" = { owner = "systemd-network"; group = "systemd-network"; @@ -132,6 +136,7 @@ linkConfig.RequiredForOnline = false; address = [ "fd6b:6174:6a61::1/48" + "fd6b:6174:6a61:53::1/128" ]; networkConfig = { DNSDefaultRoute = false;