rico*: enable wireguard
This commit is contained in:
parent
feeb2dba32
commit
f78ec1bc61
6 changed files with 93 additions and 0 deletions
|
@ -1,4 +1,5 @@
|
|||
{ lib, ... }: {
|
||||
imports = [ ./wireguard.nix ];
|
||||
networking = {
|
||||
nameservers = [
|
||||
"2620:fe::fe#dns.quad9.net"
|
||||
|
|
30
hosts/rico0/wireguard.nix
Normal file
30
hosts/rico0/wireguard.nix
Normal file
|
@ -0,0 +1,30 @@
|
|||
{ config, ... }: {
|
||||
networking.firewall.trustedInterfaces = [ "wg0" ];
|
||||
networking.wireguard = {
|
||||
enable = true;
|
||||
interfaces = {
|
||||
wg0 = {
|
||||
ips = [
|
||||
"10.10.10.10/24"
|
||||
"fd7c:585c:c4ae::10/64"
|
||||
];
|
||||
listenPort = 51822;
|
||||
privateKeyFile = "/persist/secrets/wireguard/private.key";
|
||||
generatePrivateKeyFile = true;
|
||||
peers = [
|
||||
{
|
||||
name = "Proxy";
|
||||
endpoint = "165.232.180.97:51821";
|
||||
publicKey = "NNw/iDMCTq8mpHncrecEh4UlvtINX/UUDtCJf2ToFR4=";
|
||||
presharedKeyFile = config.sops.secrets."wireguard/psk/rico0".path;
|
||||
persistentKeepalive = 20;
|
||||
allowedIPs = [
|
||||
"10.10.10.0/24"
|
||||
"fd7c:585c:c4ae::0/64"
|
||||
];
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
|
@ -1,4 +1,5 @@
|
|||
{ lib, ... }: {
|
||||
imports = [ ./wireguard.nix ];
|
||||
networking = {
|
||||
nameservers = [
|
||||
"2620:fe::fe#dns.quad9.net"
|
||||
|
|
30
hosts/rico1/wireguard.nix
Normal file
30
hosts/rico1/wireguard.nix
Normal file
|
@ -0,0 +1,30 @@
|
|||
{ config, ... }: {
|
||||
networking.firewall.trustedInterfaces = [ "wg0" ];
|
||||
networking.wireguard = {
|
||||
enable = true;
|
||||
interfaces = {
|
||||
wg0 = {
|
||||
ips = [
|
||||
"10.10.10.11/24"
|
||||
"fd7c:585c:c4ae::11/64"
|
||||
];
|
||||
listenPort = 51822;
|
||||
privateKeyFile = "/persist/secrets/wireguard/private.key";
|
||||
generatePrivateKeyFile = true;
|
||||
peers = [
|
||||
{
|
||||
name = "Proxy";
|
||||
endpoint = "165.232.180.97:51821";
|
||||
publicKey = "NNw/iDMCTq8mpHncrecEh4UlvtINX/UUDtCJf2ToFR4=";
|
||||
presharedKeyFile = config.sops.secrets."wireguard/psk/rico1".path;
|
||||
persistentKeepalive = 20;
|
||||
allowedIPs = [
|
||||
"10.10.10.0/24"
|
||||
"fd7c:585c:c4ae::0/64"
|
||||
];
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
|
@ -1,4 +1,5 @@
|
|||
{ lib, ... }: {
|
||||
imports = [ ./wireguard.nix ];
|
||||
networking = {
|
||||
nameservers = [
|
||||
"2620:fe::fe#dns.quad9.net"
|
||||
|
|
30
hosts/rico2/wireguard.nix
Normal file
30
hosts/rico2/wireguard.nix
Normal file
|
@ -0,0 +1,30 @@
|
|||
{ config, ... }: {
|
||||
networking.firewall.trustedInterfaces = [ "wg0" ];
|
||||
networking.wireguard = {
|
||||
enable = true;
|
||||
interfaces = {
|
||||
wg0 = {
|
||||
ips = [
|
||||
"10.10.10.12/24"
|
||||
"fd7c:585c:c4ae::12/64"
|
||||
];
|
||||
listenPort = 51822;
|
||||
privateKeyFile = "/persist/secrets/wireguard/private.key";
|
||||
generatePrivateKeyFile = true;
|
||||
peers = [
|
||||
{
|
||||
name = "Proxy";
|
||||
endpoint = "165.232.180.97:51821";
|
||||
publicKey = "NNw/iDMCTq8mpHncrecEh4UlvtINX/UUDtCJf2ToFR4=";
|
||||
presharedKeyFile = config.sops.secrets."wireguard/psk/rico2".path;
|
||||
persistentKeepalive = 20;
|
||||
allowedIPs = [
|
||||
"10.10.10.0/24"
|
||||
"fd7c:585c:c4ae::0/64"
|
||||
];
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
Loading…
Reference in a new issue