diff --git a/modules/nixos/server/wireguard.nix b/modules/nixos/server/wireguard.nix index ca61000..087615a 100644 --- a/modules/nixos/server/wireguard.nix +++ b/modules/nixos/server/wireguard.nix @@ -6,9 +6,8 @@ }; }; - config = lib.mkIf config.mods.server.wireguard.enable { - networking.nat = { + networking.nat = { enable = true; enableIPv6 = true; externalInterface = "ens3"; @@ -45,22 +44,23 @@ ${pkgs.iptables}/bin/ip6tables -t nat -D POSTROUTING -s fdc9:281f:04d7:9ee9::1/64 -o ens3 -j MASQUERADE ''; - peers = [ - { # peer0 - publicKey = "MDBdADwP/SE/T9cadXB1Mup7Dr3x+l6gBFBN83BU4Dg="; - presharedKeyFile = "/home/muon/wireguard-keys/psk-muon"; - allowedIPs = [ "10.0.0.2/32" "fdc9:281f:04d7:9ee9::2/128" ]; - } - # More peers can be added here. - ]; + peers = [{ # peer0 + publicKey = "MDBdADwP/SE/T9cadXB1Mup7Dr3x+l6gBFBN83BU4Dg="; + presharedKeyFile = "/home/muon/wireguard-keys/psk-muon"; + allowedIPs = [ "10.0.0.2/32" "fdc9:281f:04d7:9ee9::2/128" ]; + } + # More peers can be added here. + ]; }; }; services.dnsmasq = { enable = true; - extraConfig = '' - interface=wg0 - ''; + settings.bind-interfaces = true; + settings.interface = "wg0"; + # extraConfig = '' + # interface=wg0 + # ''; }; # networking.wireguard.interfaces = {