Compare commits

..

2 commits

Author SHA1 Message Date
350c745cf1
Enable adguard-home on sisko
Some checks failed
EVAL x86_64-linux.picard
BUILD x86_64-linux.picard
UPLOAD x86_64-linux.picard
DOWNLOAD x86_64-linux.picard
CACHIX x86_64-linux.picard
ATTIC x86_64-linux.picard
/ test (push) Successful in 14m20s
2025-04-28 22:22:17 +02:00
af7de46bf5
Fix adguard-home and use both for DNS and DHCP 2025-04-28 22:22:02 +02:00
2 changed files with 29 additions and 6 deletions

View file

@ -34,6 +34,7 @@
"zerotier" "zerotier"
"mosh" "mosh"
"amule" "amule"
"adguard-home"
] ]
++ [ ++ [
./disko.nix ./disko.nix

View file

@ -1,18 +1,40 @@
{ config, ... }: { config, lib, ... }:
{ {
services.adguardhome = { services.adguardhome = {
enable = true; enable = true;
port = 3000;
mutableSettings = true; mutableSettings = true;
settings = { settings = {
openFirewall = true; dhcp = {
enabled = true;
interface_name = "enP4p65s0";
dhcpv4 = {
gateway_ip = "10.1.1.1";
range_start = "10.1.1.2";
range_end = "10.1.1.255";
subnet_mask = "255.255.255.0";
};
};
dns = {
upstream_dns = [
"https://dns10.quad9.net/dns-query"
];
bind_hosts = [
"127.0.0.1"
"10.1.1.2"
];
};
}; };
}; };
networking.firewall.allowedTCPPorts = [
3000 systemd.services.adguardhome.serviceConfig.DynamicUser = lib.mkForce false;
networking.firewall.allowedUDPPorts = [
53 53
67
]; ];
networking.firewall.allowedUDPPorts = [ 53 ]; networking.firewall.allowedTCPPorts = [ 53 ];
environment.persistence."/persist".directories = [ environment.persistence."/persist".directories = [
"/var/lib/AdGuardHome" "/var/lib/AdGuardHome"
]; ];