forked from pub-solar/infra
87 lines
2.1 KiB
Nix
87 lines
2.1 KiB
Nix
{
|
|
config,
|
|
pkgs,
|
|
flake,
|
|
...
|
|
}:
|
|
let
|
|
wireguardIPv4 = "10.7.6.5";
|
|
wireguardIPv6 = "fd00:fae:fae:fae:fae:5::";
|
|
in
|
|
{
|
|
networking.firewall.allowedUDPPorts = [ 51820 ];
|
|
|
|
age.secrets.wg-private-key.file = "${flake.self}/secrets/trinkgenossin-wg-private-key.age";
|
|
|
|
networking.wireguard.interfaces = {
|
|
wg-ssh = {
|
|
listenPort = 51820;
|
|
mtu = 1300;
|
|
ips = [
|
|
"${wireguardIPv4}/32"
|
|
"${wireguardIPv6}/96"
|
|
];
|
|
privateKeyFile = config.age.secrets.wg-private-key.path;
|
|
peers = flake.self.logins.wireguardDevices ++ [
|
|
{
|
|
# nachtigall.pub.solar
|
|
endpoint = "138.201.80.102:51820";
|
|
publicKey = "qzNywKY9RvqTnDO8eLik75/SHveaSk9OObilDzv+xkk=";
|
|
allowedIPs = [
|
|
"10.7.6.1/32"
|
|
"fd00:fae:fae:fae:fae:1::/96"
|
|
];
|
|
}
|
|
{
|
|
# metronom.pub.solar
|
|
endpoint = "49.13.236.167:51820";
|
|
publicKey = "zOSYGO7MfnOOUnzaTcWiKRQM0qqxR3JQrwx/gtEtHmo=";
|
|
allowedIPs = [
|
|
"10.7.6.3/32"
|
|
"fd00:fae:fae:fae:fae:3::/96"
|
|
];
|
|
persistentKeepalive = 15;
|
|
}
|
|
{
|
|
# tankstelle.pub.solar
|
|
endpoint = "80.244.242.5:51820";
|
|
publicKey = "iRTlY1lB7nPXf2eXzX8ZZDkfMmXyGjff5/joccbP8Cg=";
|
|
allowedIPs = [
|
|
"10.7.6.4/32"
|
|
"fd00:fae:fae:fae:fae:4::/96"
|
|
];
|
|
}
|
|
{
|
|
# delite.pub.solar
|
|
endpoint = "5.255.119.132:51820";
|
|
publicKey = "ZT2qGWgMPwHRUOZmTQHWCRX4m14YwOsiszjsA5bpc2k=";
|
|
allowedIPs = [
|
|
"10.7.6.6/32"
|
|
"fd00:fae:fae:fae:fae:6::/96"
|
|
];
|
|
}
|
|
{
|
|
# blue-shell.pub.solar
|
|
endpoint = "194.13.83.205:51820";
|
|
publicKey = "bcrIpWrKc1M+Hq4ds3aN1lTaKE26f2rvXhd+93QrzR8=";
|
|
allowedIPs = [
|
|
"10.7.6.7/32"
|
|
"fd00:fae:fae:fae:fae:7::/96"
|
|
];
|
|
}
|
|
];
|
|
};
|
|
};
|
|
|
|
services.openssh.listenAddresses = [
|
|
{
|
|
addr = wireguardIPv4;
|
|
port = 22;
|
|
}
|
|
{
|
|
addr = "[${wireguardIPv6}]";
|
|
port = 22;
|
|
}
|
|
];
|
|
}
|