diff options
author | Gregor Kleen <gkleen@yggdrasil.li> | 2022-08-09 11:23:00 +0300 |
---|---|---|
committer | Gregor Kleen <gkleen@yggdrasil.li> | 2022-08-09 11:23:00 +0300 |
commit | c1f62e9827efe7c8e303e3cfa70dac8f544312b1 (patch) | |
tree | d20ff0f367804bc87996c6312cebe2fa57b5bd4c /hosts/sif | |
parent | de66ba821b2851cb23bcc7b064e84de3dd848e26 (diff) | |
download | nixos-c1f62e9827efe7c8e303e3cfa70dac8f544312b1.tar nixos-c1f62e9827efe7c8e303e3cfa70dac8f544312b1.tar.gz nixos-c1f62e9827efe7c8e303e3cfa70dac8f544312b1.tar.bz2 nixos-c1f62e9827efe7c8e303e3cfa70dac8f544312b1.tar.xz nixos-c1f62e9827efe7c8e303e3cfa70dac8f544312b1.zip |
...
Diffstat (limited to 'hosts/sif')
-rw-r--r-- | hosts/sif/default.nix | 10 |
1 files changed, 6 insertions, 4 deletions
diff --git a/hosts/sif/default.nix b/hosts/sif/default.nix index f51535ea..8c64551a 100644 --- a/hosts/sif/default.nix +++ b/hosts/sif/default.nix | |||
@@ -26,6 +26,8 @@ in { | |||
26 | }; | 26 | }; |
27 | }; | 27 | }; |
28 | 28 | ||
29 | time.timeZone = null; | ||
30 | |||
29 | boot = { | 31 | boot = { |
30 | initrd = { | 32 | initrd = { |
31 | luks.devices = { | 33 | luks.devices = { |
@@ -148,7 +150,7 @@ in { | |||
148 | Kind = "wireguard"; | 150 | Kind = "wireguard"; |
149 | }; | 151 | }; |
150 | wireguardConfig = { | 152 | wireguardConfig = { |
151 | PrivateKeyFile = config.sops.secrets.wgrz.path; | 153 | PrivateKeyFile = "/run/credentials/systemd-networkd.service/wgrz.priv"; |
152 | ListenPort = 51822; | 154 | ListenPort = 51822; |
153 | # FirewallMark = 1; | 155 | # FirewallMark = 1; |
154 | }; | 156 | }; |
@@ -233,11 +235,11 @@ in { | |||
233 | sops.secrets.wgrz = { | 235 | sops.secrets.wgrz = { |
234 | format = "binary"; | 236 | format = "binary"; |
235 | sopsFile = ./wgrz/privkey; | 237 | sopsFile = ./wgrz/privkey; |
236 | mode = "0640"; | ||
237 | owner = "root"; | ||
238 | group = "systemd-network"; | ||
239 | }; | 238 | }; |
240 | networking.networkmanager.unmanaged = ["wgrz" "virbr0"]; | 239 | networking.networkmanager.unmanaged = ["wgrz" "virbr0"]; |
240 | systemd.services."systemd-networkd".serviceConfig.LoadCredential = [ | ||
241 | "wgrz.priv:${config.sops.secrets.wgrz.path}" | ||
242 | ]; | ||
241 | 243 | ||
242 | services.dnsmasq = { | 244 | services.dnsmasq = { |
243 | enable = true; | 245 | enable = true; |