Compare commits

...

3 commits

3 changed files with 10 additions and 11 deletions

View file

@ -1,16 +1,15 @@
{pkgs, ...}: { {pkgs, ...}: {
# services.openssh.ports = [22 2050]; systemd.services.ssh-port2050-natpmp = {
systemd.services.port2050-natpmp = { bindsTo = ["sshd.socket"];
bindsTo = ["sshd"]; # might not work after = ["sshd.socket"];
confinement = { serviceConfig.Restart = "on-failure";
enable = true; serviceConfig.ExecStart = pkgs.writeScript "ssh-port2050-natpmp" ''
mode = "chroot-only"; #!${pkgs.bash}/bin/bash
};
serviceConfig.ExecStart = ''
while true while true
do do
${pkgs.libnatpmp}/bin/natpmpc -a 2050 22 tcp 60 ${pkgs.libnatpmp}/bin/natpmpc -a 2050 22 tcp 60
sleep 30 ${pkgs.coreutils}/bin/sleep 30
done done
''; '';
}; };

View file

@ -31,7 +31,7 @@ in {
peers; peers;
in { in {
allowedTCPPorts = getPortsWithProtocol "tcp"; allowedTCPPorts = getPortsWithProtocol "tcp";
allowedUDPPorts = [51820 1234] ++ getPortsWithProtocol "udp"; allowedUDPPorts = [51820] ++ getPortsWithProtocol "udp";
extraCommands = forPortIps ({ extraCommands = forPortIps ({
IP, IP,
port, port,
@ -72,7 +72,6 @@ in {
}) })
peers; peers;
}; };
"50-wg1" = lib.recursiveUpdate config.systemd.network.netdevs."50-wg0" {wireguardConig.ListenPort = 1234;};
}; };
systemd.network.networks.wg0 = { systemd.network.networks.wg0 = {

View file

@ -16,6 +16,7 @@
"render" "render"
"audio" "audio"
"wireshark" "wireshark"
"rtkit"
]; ];
openssh.authorizedKeys.keys = with vars.sshKeys; [ openssh.authorizedKeys.keys = with vars.sshKeys; [