enable wireguard
This commit is contained in:
@@ -14,7 +14,7 @@
|
||||
./sks.nix
|
||||
./gitea.nix
|
||||
./nexus.nix
|
||||
#./wireguard.nix
|
||||
./wireguard.nix
|
||||
#./mqtt.nix
|
||||
];
|
||||
}
|
||||
|
||||
@@ -1,27 +1,20 @@
|
||||
{ config, pkgs, ... }:
|
||||
|
||||
{
|
||||
boot.extraModulePackages = [ config.boot.kernelPackages.wireguard ];
|
||||
environment.systemPackages = [ pkgs.wireguard ];
|
||||
networking.firewall.allowedTCPPorts = [ 51820 ];
|
||||
networking.firewall.allowedUDPPorts = [ 51820 ];
|
||||
networking.wireguard.interfaces.wg0 = {
|
||||
listenPort = 51820;
|
||||
privateKeyFile = "/etc/nixos/services/wg0.key";
|
||||
ips = [ "192.168.43.1/24" ];
|
||||
peers = [
|
||||
{
|
||||
allowedIPs = ["192.168.43.2"];
|
||||
publicKey = "vGuxJHw7I1gSQd7SThDu758ynR3AKVXjgqtNIUnMBEg=";
|
||||
persistentKeepalive = 25;
|
||||
}
|
||||
|
||||
{
|
||||
allowedIPs = ["192.168.43.3"];
|
||||
publicKey = "YQ/SN8ZauuvWKJp+cT2JPP7sUUJai4ujubAZNZkZAAU=";
|
||||
persistentKeepalive = 25;
|
||||
}
|
||||
|
||||
];
|
||||
};
|
||||
boot.extraModulePackages = [ config.boot.kernelPackages.wireguard ];
|
||||
environment.systemPackages = [ pkgs.wireguard ];
|
||||
networking.firewall.allowedTCPPorts = [ 51820 ];
|
||||
networking.firewall.allowedUDPPorts = [ 51820 ];
|
||||
networking.wireguard.interfaces.wg0 = {
|
||||
listenPort = 51820;
|
||||
privateKeyFile = "/etc/nixos/services/wg0.key";
|
||||
ips = [ "192.168.43.1/24" ];
|
||||
peers = [
|
||||
{
|
||||
allowedIPs = ["192.168.43.2"];
|
||||
publicKey = "wbeCSyurE/kiXooaqieRgoDHJiDBiw/CHvF5e+LCPlw=";
|
||||
persistentKeepalive = 25;
|
||||
}
|
||||
];
|
||||
};
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user