From 836033ef1f8d5cf0f195d0e749c4c2badcb1d4d1 Mon Sep 17 00:00:00 2001 From: stubbfelnewpc Date: Thu, 29 Oct 2020 00:01:15 +0100 Subject: [PATCH] enable wireguard --- services/enabled.nix | 2 +- services/wireguard.nix | 39 ++++++++++++++++----------------------- 2 files changed, 17 insertions(+), 24 deletions(-) diff --git a/services/enabled.nix b/services/enabled.nix index bb1965c..1149b12 100644 --- a/services/enabled.nix +++ b/services/enabled.nix @@ -14,7 +14,7 @@ ./sks.nix ./gitea.nix ./nexus.nix - #./wireguard.nix + ./wireguard.nix #./mqtt.nix ]; } diff --git a/services/wireguard.nix b/services/wireguard.nix index 6cf17f6..3510a6a 100644 --- a/services/wireguard.nix +++ b/services/wireguard.nix @@ -1,27 +1,20 @@ { config, pkgs, ... }: { - boot.extraModulePackages = [ config.boot.kernelPackages.wireguard ]; - environment.systemPackages = [ pkgs.wireguard ]; - networking.firewall.allowedTCPPorts = [ 51820 ]; - networking.firewall.allowedUDPPorts = [ 51820 ]; - networking.wireguard.interfaces.wg0 = { - listenPort = 51820; - privateKeyFile = "/etc/nixos/services/wg0.key"; - ips = [ "192.168.43.1/24" ]; - peers = [ - { - allowedIPs = ["192.168.43.2"]; - publicKey = "vGuxJHw7I1gSQd7SThDu758ynR3AKVXjgqtNIUnMBEg="; - persistentKeepalive = 25; - } - - { - allowedIPs = ["192.168.43.3"]; - publicKey = "YQ/SN8ZauuvWKJp+cT2JPP7sUUJai4ujubAZNZkZAAU="; - persistentKeepalive = 25; - } - - ]; - }; + boot.extraModulePackages = [ config.boot.kernelPackages.wireguard ]; + environment.systemPackages = [ pkgs.wireguard ]; + networking.firewall.allowedTCPPorts = [ 51820 ]; + networking.firewall.allowedUDPPorts = [ 51820 ]; + networking.wireguard.interfaces.wg0 = { + listenPort = 51820; + privateKeyFile = "/etc/nixos/services/wg0.key"; + ips = [ "192.168.43.1/24" ]; + peers = [ + { + allowedIPs = ["192.168.43.2"]; + publicKey = "wbeCSyurE/kiXooaqieRgoDHJiDBiw/CHvF5e+LCPlw="; + persistentKeepalive = 25; + } + ]; + }; }