remove unused wireguard

This commit is contained in:
nyanloutre 2022-07-26 21:27:14 +02:00
parent d202456d6b
commit 9addf815c9
2 changed files with 0 additions and 23 deletions

View File

@ -541,24 +541,6 @@ in
security.pam.services.sshd.text = pkgs.lib.mkDefault( pkgs.lib.mkAfter "session optional ${pkgs.pam}/lib/security/pam_exec.so seteuid ${login_mail_alert}/bin/mail_alert.sh" ); security.pam.services.sshd.text = pkgs.lib.mkDefault( pkgs.lib.mkAfter "session optional ${pkgs.pam}/lib/security/pam_exec.so seteuid ${login_mail_alert}/bin/mail_alert.sh" );
networking = { networking = {
wireguard.interfaces = {
wg0 = {
ips = [ "192.168.20.1/24" ];
privateKeyFile = "/mnt/secrets/wireguard/wg0.privatekey";
listenPort = 51820;
allowedIPsAsRoutes = true;
peers = [
{
allowedIPs = [ "192.168.20.2/32" ];
publicKey = "b/SXiqo+GPdNOc54lyEVeUBc6B5AbVMKh+g5EZPGzlE=";
}
];
};
};
nat.internalInterfaces = [ "wg0" ];
nat.internalIPs = [ "192.168.20.0/24" ];
firewall.interfaces.eno2.allowedTCPPorts = [ firewall.interfaces.eno2.allowedTCPPorts = [
3260 3260
]; ];
@ -571,9 +553,5 @@ in
firewall.allowedTCPPortRanges = [ firewall.allowedTCPPortRanges = [
{ from = 64000; to = 65535; } # FTP { from = 64000; to = 65535; } # FTP
]; ];
firewall.allowedUDPPorts = [
config.networking.wireguard.interfaces.wg0.listenPort
];
}; };
} }

View File

@ -49,7 +49,6 @@
inetutils inetutils
rclone rclone
lftp lftp
wireguard-tools
nfs-utils nfs-utils
nmap nmap