disable wireguard for now

This commit is contained in:
Lillian Violet 2024-12-06 15:42:20 +01:00
parent 241d2180a7
commit 6f697b2b75

View file

@ -140,39 +140,39 @@
sops.secrets."protonvpn-priv-key".mode = "0440"; sops.secrets."protonvpn-priv-key".mode = "0440";
sops.secrets."protonvpn-priv-key".owner = config.users.users.root.name; sops.secrets."protonvpn-priv-key".owner = config.users.users.root.name;
networking.wireguard.enable = true; # networking.wireguard.enable = true;
networking.wg-quick.interfaces = { # networking.wg-quick.interfaces = {
# "wg0" is the network interface name. You can name the interface arbitrarily. # # "wg0" is the network interface name. You can name the interface arbitrarily.
wg0 = { # wg0 = {
autostart = true; # autostart = true;
# Determines the IP address and subnet of the server's end of the tunnel interface. # # Determines the IP address and subnet of the server's end of the tunnel interface.
address = ["10.2.0.2/32"]; # address = ["10.2.0.2/32"];
# The port that WireGuard listens to. Must be accessible by the client. # # The port that WireGuard listens to. Must be accessible by the client.
listenPort = 51820; # listenPort = 51820;
dns = ["10.2.0.1"]; # dns = ["10.2.0.1"];
# Path to the private key file. # # Path to the private key file.
# # #
# Note: The private key can also be included inline via the privateKey option, # # Note: The private key can also be included inline via the privateKey option,
# but this makes the private key world-readable; thus, using privateKeyFile is # # but this makes the private key world-readable; thus, using privateKeyFile is
# recommended. # # recommended.
privateKeyFile = config.sops.secrets."protonvpn-priv-key".path; # privateKeyFile = config.sops.secrets."protonvpn-priv-key".path;
peers = [ # peers = [
# List of allowed peers. # # List of allowed peers.
{ # {
# Feel free to give a meaning full name # # Feel free to give a meaning full name
# Public key of the peer (not a file path). # # Public key of the peer (not a file path).
publicKey = "/i7jCNpcqVBUkY07gVlILN4nFdvZHmxvreAOgLGoZGg="; # publicKey = "/i7jCNpcqVBUkY07gVlILN4nFdvZHmxvreAOgLGoZGg=";
# List of IPs assigned to this peer within the tunnel subnet. Used to configure routing. # # List of IPs assigned to this peer within the tunnel subnet. Used to configure routing.
allowedIPs = ["0.0.0.0/0"]; # allowedIPs = ["0.0.0.0/0"];
endpoint = "146.70.86.114:51820"; # endpoint = "146.70.86.114:51820";
} # }
]; # ];
}; # };
}; # };
networking.firewall = { networking.firewall = {
enable = true; enable = true;