about summary refs log tree commit diff
path: root/nixosConfigurations/manwe/default.nix
diff options
context:
space:
mode:
Diffstat (limited to 'nixosConfigurations/manwe/default.nix')
-rw-r--r--nixosConfigurations/manwe/default.nix58
1 files changed, 29 insertions, 29 deletions
diff --git a/nixosConfigurations/manwe/default.nix b/nixosConfigurations/manwe/default.nix
index a47cd88..a3c16b0 100644
--- a/nixosConfigurations/manwe/default.nix
+++ b/nixosConfigurations/manwe/default.nix
@@ -1,6 +1,5 @@
 {
   config,
-  inputs,
   lib,
   ...
 }:
@@ -44,36 +43,37 @@ with lib; {
       domain = my.domain.azahi;
     };
     vaultwarden.enable = true;
+    ntfy.enable = true;
   };
 
-  # To play old LAN games with the boys.
-  secrets."wireguard-private-key-70".file = "${inputs.self}/secrets/wireguard-private-key-70";
-  networking = mkIf config.nixfiles.modules.wireguard.server.enable {
-    wireguard.interfaces.wg70 = {
-      ips = ["10.70.0.1/16"];
-      listenPort = 7070;
-      privateKeyFile = config.secrets."wireguard-private-key-70".path;
-      peers = [
-        {
-          publicKey = "@PUBLIC_KEY@";
-          allowedIPs = ["10.70.1.1/32"];
-        }
-        {
-          publicKey = "@PUBLIC_KEY@";
-          allowedIPs = ["10.70.1.2/32"];
-        }
-        {
-          publicKey = "@PUBLIC_KEY@";
-          allowedIPs = ["10.70.1.3/32"];
-        }
-        {
-          publicKey = "@PUBLIC_KEY@";
-          allowedIPs = ["10.70.1.4/32"];
-        }
-      ];
-    };
-    firewall.allowedUDPPorts = [7070];
-  };
+  # A VPN to play old LAN games with the boys.
+  # secrets."wireguard-private-key-70".file = "${inputs.self}/secrets/wireguard-private-key-70";
+  # networking = mkIf config.nixfiles.modules.wireguard.server.enable {
+  #   wireguard.interfaces.wg70 = {
+  #     ips = ["10.70.0.1/16"];
+  #     listenPort = 7070;
+  #     privateKeyFile = config.secrets."wireguard-private-key-70".path;
+  #     peers = [
+  #       {
+  #         publicKey = "@PUBLIC_KEY@";
+  #         allowedIPs = ["10.70.1.1/32"];
+  #       }
+  #       {
+  #         publicKey = "@PUBLIC_KEY@";
+  #         allowedIPs = ["10.70.1.2/32"];
+  #       }
+  #       {
+  #         publicKey = "@PUBLIC_KEY@";
+  #         allowedIPs = ["10.70.1.3/32"];
+  #       }
+  #       {
+  #         publicKey = "@PUBLIC_KEY@";
+  #         allowedIPs = ["10.70.1.4/32"];
+  #       }
+  #     ];
+  #   };
+  #   firewall.allowedUDPPorts = [7070];
+  # };
 
   boot = {
     loader.grub = {

Consider giving Nix/NixOS a try! <3