l sync-containers3: configure NAT more directly
This commit is contained in:
parent
4d64e17557
commit
d9d0fbd040
@ -282,14 +282,19 @@ in {
|
||||
})
|
||||
(lib.mkIf (cfg.containers != {}) {
|
||||
# networking
|
||||
|
||||
# needed because otherwise we lose local dns
|
||||
environment.etc."resolv.conf".source = lib.mkForce "/run/systemd/resolve/resolv.conf";
|
||||
|
||||
boot.kernel.sysctl."net.ipv4.ip_forward" = lib.mkDefault 1;
|
||||
systemd.network.networks.ctr0 = {
|
||||
name = "ctr0";
|
||||
address = [
|
||||
"10.233.0.1/24"
|
||||
];
|
||||
networkConfig = {
|
||||
IPForward = "yes";
|
||||
IPMasquerade = "both";
|
||||
# IPForward = "yes";
|
||||
# IPMasquerade = "both";
|
||||
ConfigureWithoutCarrier = true;
|
||||
DHCPServer = "yes";
|
||||
};
|
||||
@ -306,6 +311,9 @@ in {
|
||||
{ predicate = "-i ctr0"; target = "ACCEPT"; }
|
||||
{ predicate = "-o ctr0"; target = "ACCEPT"; }
|
||||
];
|
||||
krebs.iptables.tables.nat.POSTROUTING.rules = [
|
||||
{ v6 = false; predicate = "-s 10.233.0.0/24"; target = "MASQUERADE"; }
|
||||
];
|
||||
})
|
||||
(lib.mkIf cfg.inContainer.enable {
|
||||
users.groups.container_sync = {};
|
||||
|
Loading…
Reference in New Issue
Block a user