Set up wireguard.

This commit is contained in:
Tom Alexander 2024-12-27 15:44:00 -05:00
parent 2ef181cfab
commit 0b31b91c69
Signed by: talexander
GPG Key ID: D3A179C9A53C0EDE
3 changed files with 28 additions and 1 deletions

View File

@ -35,6 +35,7 @@
./roles/gpg ./roles/gpg
./roles/waybar ./roles/waybar
./roles/qemu ./roles/qemu
./roles/wireguard
]; ];
nix.settings.experimental-features = [ nix.settings.experimental-features = [

View File

@ -16,7 +16,7 @@
]; ];
services.resolved = { services.resolved = {
enable = true; enable = true;
dnssec = "true"; # dnssec = "true";
domains = [ "~." ]; domains = [ "~." ];
fallbackDns = [ ]; fallbackDns = [ ];
dnsovertls = "true"; dnsovertls = "true";

View File

@ -0,0 +1,26 @@
{
config,
lib,
pkgs,
...
}:
{
imports = [ ];
networking.firewall.allowedUDPPorts = [ 51821 ];
networking.wireguard.enable = true;
networking.wg-quick.interfaces.wg0.configFile = "/persist/manual/wireguard/drmario.conf";
systemd.services."wg-quick-wg0".after = [
"nss-lookup.target"
"systemd-resolved.service"
"multi-user.target"
];
systemd.services."wg-quick-wg0".preStart = "${pkgs.toybox}/bin/sleep 10";
# environment.systemPackages = with pkgs; [
# wireguard-tools
# ];
}