Feature: Remove wireguard. We'll just set up headscale...
This commit is contained in:
parent
2fa6ad05a6
commit
4de2db6ae7
@ -73,7 +73,6 @@
|
||||
./modules/smb.nix
|
||||
./modules/iscsi.nix
|
||||
./modules/networking.nix
|
||||
./modules/wireguard.nix
|
||||
./modules/services/minecraft-server.nix
|
||||
./modules/programs/spotify.nix
|
||||
./modules/services/flatpak.nix
|
||||
@ -130,9 +129,6 @@
|
||||
gatewayIP = "192.168.1.1";
|
||||
dns = [ "10.0.0.1" ];
|
||||
};
|
||||
wireguard = {
|
||||
secretsFile = ./systems/desktop/wireguard.token;
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -1,22 +0,0 @@
|
||||
{ wireguard, sys, ... }: {
|
||||
networking.firewall.allowedUDPPorts = [ 51820 ];
|
||||
networking.wireguard = {
|
||||
enable = true;
|
||||
interfaces = {
|
||||
wg0 = {
|
||||
ips = [ "192.168.100.1/24" ];
|
||||
listenPort = 51820;
|
||||
privateKeyFile = "/run/secrets/wireguard";
|
||||
};
|
||||
};
|
||||
};
|
||||
sops.secrets."wireguard" = {
|
||||
sopsFile = wireguard.secretsFile;
|
||||
format = "binary";
|
||||
key = "";
|
||||
mode = "0440";
|
||||
owner = sys.username;
|
||||
};
|
||||
}
|
||||
|
||||
# j+rBgqdGz5PKvowDJrYkP2JRqFUCQnlFPQgwjAH+4zo= # pubkey for desktop
|
Loading…
x
Reference in New Issue
Block a user