64 lines
1.5 KiB
Nix
64 lines
1.5 KiB
Nix
{
|
|
flake,
|
|
config,
|
|
pkgs,
|
|
lib,
|
|
...
|
|
}: {
|
|
networking.hostName = "stroopwafel";
|
|
networking.wireless.iwd.enable = true;
|
|
|
|
age.secrets.wg-private-key.file = "${flake.self}/secrets/wg-private-stroopwafel.age";
|
|
|
|
pub-solar.wireguard.private = {
|
|
ownIPs = [
|
|
"10.13.12.8/32"
|
|
"fd00:b12f:acab:1312:acab:8::/96"
|
|
];
|
|
privateKeyFile = config.age.secrets.wg-private-key.path;
|
|
};
|
|
|
|
age.secrets.wg-tunnel-key.file = "${flake.self}/secrets/wg-tunnel-stroopwafel.age";
|
|
|
|
pub-solar.wireguard.tunnel = {
|
|
ownIPs = [
|
|
"10.65.141.174/32"
|
|
"fc00:bbbb:bbbb:bb01::2:8dad/128"
|
|
];
|
|
privateKeyFile = config.age.secrets.wg-tunnel-key.path;
|
|
peer = {
|
|
publicKey = "5FZW+fNA2iVBSY99HFl+KjGc9AFVNE+UFAedLNhu8lc=";
|
|
endpoint = "146.70.134.2:3565";
|
|
};
|
|
};
|
|
|
|
age.secrets.wg-pub-solar-key.file = "${flake.self}/secrets/wg-pub-solar-stroopwafel.age";
|
|
|
|
pub-solar.wireguard.pub-solar = {
|
|
ownIPs = [
|
|
"10.7.6.200/32"
|
|
"fd00:fae:fae:fae:fae:200::/96"
|
|
];
|
|
privateKeyFile = config.age.secrets.wg-pub-solar-key.path;
|
|
};
|
|
|
|
age.secrets.wg-momo-key.file = "${flake.self}/secrets/wg-momo-stroopwafel.age";
|
|
|
|
pub-solar.wireguard.momo = {
|
|
ownIPs = [
|
|
"10.30.30.200/32"
|
|
"fd00:3030:3030:3030:3030:200::/96"
|
|
];
|
|
privateKeyFile = config.age.secrets.wg-momo-key.path;
|
|
};
|
|
|
|
age.secrets.wg-ehex-key.file = "${flake.self}/secrets/wg-ehex-stroopwafel.age";
|
|
|
|
pub-solar.wireguard.ehex = {
|
|
ownIPs = [
|
|
"10.42.0.135/22"
|
|
];
|
|
privateKeyFile = config.age.secrets.wg-ehex-key.path;
|
|
};
|
|
}
|