explicitly enable wireguard

This commit is contained in:
Grigory Shipunov 2022-06-18 11:57:32 +02:00
parent 121e2f5004
commit 3f0894f453
Signed by: 0xa
GPG key ID: 91FA5E5BF9AA901C
3 changed files with 10 additions and 2 deletions

View file

@ -39,7 +39,10 @@
system = "x86_64-linux";
modules = [
sops-nix.nixosModules.sops
./hosts/cirrus
./hosts/cirrus/configuration.nix
./hosts/cirrus/hardware-configuration.nix
./hosts/cirrus/secrets.nix
./hosts/cirrus/wireguard-server.nix
./modules/basic-tools.nix
];
};
@ -48,7 +51,10 @@
modules = [
sops-nix.nixosModules.sops
microvm.nixosModules.host
./hosts/dishwasher
./hosts/dishwasher/configuration.nix
./hosts/dishwasher/hardware-configuration.nix
./hosts/dishwasher/oxalab.nix
./hosts/dishwasher/secrets.nix
./modules/basic-tools.nix
];
};

View file

@ -1,5 +1,6 @@
{ config, ... }:
{
networking.wireguard.enable = true;
systemd.network = {
netdevs."oxalab" = {
netdevConfig = {

View file

@ -1,5 +1,6 @@
{ config, ... }:
{
networking.wireguard.enable = true;
systemd.network = {
netdevs."oxalab" = {
netdevConfig = {