diff --git a/flake.lock b/flake.lock index b4bd684..11dd040 100644 --- a/flake.lock +++ b/flake.lock @@ -151,11 +151,11 @@ "nixpkgs": "nixpkgs" }, "locked": { - "lastModified": 1717591765, - "narHash": "sha256-05dAcxEFpaLE9Vn9ghtZzaVtI3qXJUGqVmI3KUnan3I=", + "lastModified": 1717742034, + "narHash": "sha256-RUkjSjGHLMPmAAGewe4NoBt+CcHQI+NaGuJoz3neu1w=", "owner": "mrvandalo", "repo": "clan-fact-generators", - "rev": "7ffaea7135cba6e89c5986175dafaea37550b832", + "rev": "7301a98cefa9b8573c203d645ebabc7c103452d7", "type": "github" }, "original": { diff --git a/nixos/machines/orbi/network-wireguard.nix b/nixos/machines/orbi/network-wireguard.nix index 470515f..7b5cdec 100644 --- a/nixos/machines/orbi/network-wireguard.nix +++ b/nixos/machines/orbi/network-wireguard.nix @@ -5,6 +5,13 @@ in { networking.firewall.allowedUDPPorts = [ 51820 ]; clanCore.facts.services.wireguard = factsGenerator.wireguard { name = "wg0"; }; + clanCore.facts.services.wireguard_ip = factsGenerator.public { + "wireguard.wg0.endpoint" = "95.216.66.212:51820"; + "wireguard.wg0.cidr" = "10.100.0.1/24"; + "wireguard.wg0.ip" = "10.100.0.1"; + }; + + boot.kernel.sysctl."net.ipv4.ip_forward" = true; # Enable WireGuard