From a4f79d7479bf63fb99e1d19cb6502feabc2854c3 Mon Sep 17 00:00:00 2001 From: oddlama Date: Thu, 14 Mar 2024 21:13:05 +0100 Subject: [PATCH] fix: typo prevented zone creation --- README.md | 2 +- modules/wireguard.nix | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 7563d9b..3c71fd9 100644 --- a/README.md +++ b/README.md @@ -19,7 +19,7 @@ Nginx recommended options | Module | [Link](./modules/nginx.nix) | - | agenix | Node options | Module | [Link](./modules/node.nix) | - | - | A module that stores meta information about your nodes (hosts). Required for some other modules that operate across nodes. Guests (MicroVMs & Containers) | Module | [Link](./modules/guests) | zfs, disko, node options | - | This module implements a common interface to use guest systems with microvms or nixos-containers. Restic hetzner storage box setup | Module | [Link](./modules/restic.nix) | agenix, agenix-rekey | - | This module exposes new options for restic backups that allow a simple setup of hetzner storage boxes. There's [an app](./apps/setup-hetzner-storage-boxes.nix) that you should expose on your flake to automate remote setup. -Wireguard overlay networks | Module | [Link](./modules/wireguard.nix) | agenix, agenix-rekey, nftables-firewall, specialArgs.nodes | - | This module automatically creates cross-node wireguard networks including automatic semi-stable ip address assignments +Wireguard overlay networks | Module | [Link](./modules/wireguard.nix) | agenix, agenix-rekey, nftables-firewall, inputs.self.nodes | - | This module automatically creates cross-node wireguard networks including automatic semi-stable ip address assignments #### Home Manager Modules diff --git a/modules/wireguard.nix b/modules/wireguard.nix index 2c7c3f0..48fe101 100644 --- a/modules/wireguard.nix +++ b/modules/wireguard.nix @@ -170,7 +170,7 @@ // listToAttrs (flip map participatingNodes ( peer: nameValuePair "wg-${wgCfg.linkName}-node-${peer}-to-${localZoneName}" ( - mkIf (wgCfg.firewallRuleForNode ? peer) { + mkIf (wgCfg.firewallRuleForNode ? ${peer}) { from = ["wg-${wgCfg.linkName}-node-${peer}"]; to = [localZoneName]; ignoreEmptyRule = true;