moved wireguard to extra
This commit is contained in:
parent
c5675a751c
commit
92298b4bd7
1
boot.nix
1
boot.nix
|
@ -32,7 +32,6 @@
|
||||||
# extra enabled kernel modules
|
# extra enabled kernel modules
|
||||||
boot.kernelModules = [
|
boot.kernelModules = [
|
||||||
"sg" # for generic SCSI devices such as /dev/sg0
|
"sg" # for generic SCSI devices such as /dev/sg0
|
||||||
"wireguard"
|
|
||||||
];
|
];
|
||||||
|
|
||||||
# Kernel parameter on boot
|
# Kernel parameter on boot
|
||||||
|
|
|
@ -38,8 +38,6 @@ in
|
||||||
# networking.proxy.default = "http://user:password@proxy:port/";
|
# networking.proxy.default = "http://user:password@proxy:port/";
|
||||||
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
|
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
|
||||||
|
|
||||||
networking.wireguard.enable = true;
|
|
||||||
|
|
||||||
# Enable networking
|
# Enable networking
|
||||||
networking.networkmanager.enable = true;
|
networking.networkmanager.enable = true;
|
||||||
|
|
||||||
|
@ -235,12 +233,6 @@ in
|
||||||
# Enable the OpenSSH daemon.
|
# Enable the OpenSSH daemon.
|
||||||
# services.openssh.enable = true;
|
# services.openssh.enable = true;
|
||||||
|
|
||||||
# Open ports in the firewall.
|
|
||||||
# networking.firewall.allowedTCPPorts = [ ... ];
|
|
||||||
# networking.firewall.allowedUDPPorts = [ ... ];
|
|
||||||
networking.firewall.allowedUDPPorts = [
|
|
||||||
51820 # wireguard client
|
|
||||||
];
|
|
||||||
# Or disable the firewall altogether.
|
# Or disable the firewall altogether.
|
||||||
# networking.firewall.enable = false;
|
# networking.firewall.enable = false;
|
||||||
|
|
||||||
|
|
|
@ -4,6 +4,7 @@
|
||||||
./dvd.nix
|
./dvd.nix
|
||||||
./yubikey.nix
|
./yubikey.nix
|
||||||
./platformio.nix
|
./platformio.nix
|
||||||
|
./wireguard.nix
|
||||||
./language-server.nix
|
./language-server.nix
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,15 @@
|
||||||
|
{ pkgs, config, ... }: {
|
||||||
|
|
||||||
|
networking.wireguard.enable = true;
|
||||||
|
|
||||||
|
# Open ports in the firewall.
|
||||||
|
# networking.firewall.allowedTCPPorts = [ ... ];
|
||||||
|
# networking.firewall.allowedUDPPorts = [ ... ];
|
||||||
|
networking.firewall.allowedUDPPorts = [
|
||||||
|
51820 # wireguard client
|
||||||
|
];
|
||||||
|
|
||||||
|
boot.kernelModules = [
|
||||||
|
"wireguard"
|
||||||
|
];
|
||||||
|
}
|
Loading…
Reference in New Issue