moved wireguard to extra
This commit is contained in:
parent
c5675a751c
commit
92298b4bd7
3
boot.nix
3
boot.nix
|
@ -32,7 +32,6 @@
|
|||
# extra enabled kernel modules
|
||||
boot.kernelModules = [
|
||||
"sg" # for generic SCSI devices such as /dev/sg0
|
||||
"wireguard"
|
||||
];
|
||||
|
||||
# Kernel parameter on boot
|
||||
|
@ -47,4 +46,4 @@
|
|||
boot.initrd.secrets = {
|
||||
"/crypto_keyfile.bin" = null;
|
||||
};
|
||||
}
|
||||
}
|
||||
|
|
|
@ -38,8 +38,6 @@ in
|
|||
# networking.proxy.default = "http://user:password@proxy:port/";
|
||||
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
|
||||
|
||||
networking.wireguard.enable = true;
|
||||
|
||||
# Enable networking
|
||||
networking.networkmanager.enable = true;
|
||||
|
||||
|
@ -235,12 +233,6 @@ in
|
|||
# Enable the OpenSSH daemon.
|
||||
# services.openssh.enable = true;
|
||||
|
||||
# Open ports in the firewall.
|
||||
# networking.firewall.allowedTCPPorts = [ ... ];
|
||||
# networking.firewall.allowedUDPPorts = [ ... ];
|
||||
networking.firewall.allowedUDPPorts = [
|
||||
51820 # wireguard client
|
||||
];
|
||||
# Or disable the firewall altogether.
|
||||
# networking.firewall.enable = false;
|
||||
|
||||
|
|
|
@ -4,6 +4,7 @@
|
|||
./dvd.nix
|
||||
./yubikey.nix
|
||||
./platformio.nix
|
||||
./wireguard.nix
|
||||
./language-server.nix
|
||||
];
|
||||
}
|
||||
|
|
|
@ -0,0 +1,15 @@
|
|||
{ pkgs, config, ... }: {
|
||||
|
||||
networking.wireguard.enable = true;
|
||||
|
||||
# Open ports in the firewall.
|
||||
# networking.firewall.allowedTCPPorts = [ ... ];
|
||||
# networking.firewall.allowedUDPPorts = [ ... ];
|
||||
networking.firewall.allowedUDPPorts = [
|
||||
51820 # wireguard client
|
||||
];
|
||||
|
||||
boot.kernelModules = [
|
||||
"wireguard"
|
||||
];
|
||||
}
|
Loading…
Reference in New Issue