re-enable wireguard, that wasn't the issue

This commit is contained in:
Lillian Violet 2024-12-06 18:15:47 +01:00
parent 9caddae553
commit b88cb6f85e

View file

@ -139,39 +139,39 @@
sops.secrets."protonvpn-priv-key".mode = "0440"; sops.secrets."protonvpn-priv-key".mode = "0440";
sops.secrets."protonvpn-priv-key".owner = config.users.users.root.name; sops.secrets."protonvpn-priv-key".owner = config.users.users.root.name;
# networking.wireguard.enable = true; networking.wireguard.enable = true;
# networking.wg-quick.interfaces = { networking.wg-quick.interfaces = {
# # "wg0" is the network interface name. You can name the interface arbitrarily. # "wg0" is the network interface name. You can name the interface arbitrarily.
# wg0 = { wg0 = {
# autostart = true; autostart = true;
# # Determines the IP address and subnet of the server's end of the tunnel interface. # Determines the IP address and subnet of the server's end of the tunnel interface.
# address = ["10.2.0.2/32"]; address = ["10.2.0.2/32"];
# # The port that WireGuard listens to. Must be accessible by the client. # The port that WireGuard listens to. Must be accessible by the client.
# listenPort = 51820; listenPort = 51820;
# dns = ["10.2.0.1"]; dns = ["10.2.0.1"];
# # Path to the private key file. # Path to the private key file.
# # #
# # Note: The private key can also be included inline via the privateKey option, # Note: The private key can also be included inline via the privateKey option,
# # but this makes the private key world-readable; thus, using privateKeyFile is # but this makes the private key world-readable; thus, using privateKeyFile is
# # recommended. # recommended.
# privateKeyFile = config.sops.secrets."protonvpn-priv-key".path; privateKeyFile = config.sops.secrets."protonvpn-priv-key".path;
# peers = [ peers = [
# # List of allowed peers. # List of allowed peers.
# { {
# # Feel free to give a meaning full name # Feel free to give a meaning full name
# # Public key of the peer (not a file path). # Public key of the peer (not a file path).
# publicKey = "/i7jCNpcqVBUkY07gVlILN4nFdvZHmxvreAOgLGoZGg="; publicKey = "/i7jCNpcqVBUkY07gVlILN4nFdvZHmxvreAOgLGoZGg=";
# # List of IPs assigned to this peer within the tunnel subnet. Used to configure routing. # List of IPs assigned to this peer within the tunnel subnet. Used to configure routing.
# allowedIPs = ["0.0.0.0/0"]; allowedIPs = ["0.0.0.0/0"];
# endpoint = "146.70.86.114:51820"; endpoint = "146.70.86.114:51820";
# } }
# ]; ];
# }; };
# }; };
networking.firewall = { networking.firewall = {
enable = true; enable = true;