2024-05-29 12:08:59 +00:00
|
|
|
{
|
|
|
|
config,
|
|
|
|
pkgs,
|
|
|
|
flake,
|
|
|
|
...
|
|
|
|
}:
|
|
|
|
{
|
|
|
|
networking.firewall.allowedUDPPorts = [ 51820 ];
|
|
|
|
|
2024-05-30 17:17:21 +00:00
|
|
|
age.secrets.wg-private-key.file = "${flake.self}/secrets/tankstelle-wg-private-key.age";
|
2024-05-29 12:08:59 +00:00
|
|
|
|
|
|
|
networking.wireguard.interfaces = {
|
|
|
|
wg-ssh = {
|
|
|
|
listenPort = 51820;
|
|
|
|
mtu = 1300;
|
|
|
|
ips = [
|
2024-05-30 17:17:21 +00:00
|
|
|
"10.7.6.4/32"
|
|
|
|
"fd00:fae:fae:fae:fae:4::/96"
|
2024-05-29 12:08:59 +00:00
|
|
|
];
|
|
|
|
privateKeyFile = config.age.secrets.wg-private-key.path;
|
|
|
|
peers = flake.self.logins.admins.wireguardDevices ++ [
|
|
|
|
{
|
|
|
|
# nachtigall.pub.solar
|
|
|
|
endpoint = "138.201.80.102:51820";
|
|
|
|
publicKey = "qzNywKY9RvqTnDO8eLik75/SHveaSk9OObilDzv+xkk=";
|
|
|
|
allowedIPs = [
|
|
|
|
"10.7.6.1/32"
|
|
|
|
"fd00:fae:fae:fae:fae:1::/96"
|
|
|
|
];
|
|
|
|
}
|
2024-06-06 10:53:49 +00:00
|
|
|
{
|
2024-09-09 15:22:57 +00:00
|
|
|
# trinkgenossin.pub.solar
|
|
|
|
publicKey = "QWgHovHxtqiQhnHLouSWiT6GIoQDmuvnThYL5c/rvU4=";
|
2024-06-06 10:53:49 +00:00
|
|
|
allowedIPs = [
|
2024-09-09 15:22:57 +00:00
|
|
|
"10.7.6.5/32"
|
|
|
|
"fd00:fae:fae:fae:fae:5::/96"
|
2024-06-06 10:53:49 +00:00
|
|
|
];
|
2024-09-27 09:56:46 +00:00
|
|
|
#endpoint = "85.215.152.22:51820";
|
2024-09-09 15:22:57 +00:00
|
|
|
endpoint = "[2a01:239:35d:f500::1]:51820";
|
|
|
|
persistentKeepalive = 15;
|
2024-06-06 10:53:49 +00:00
|
|
|
}
|
2024-05-29 12:08:59 +00:00
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2024-06-08 21:52:08 +00:00
|
|
|
services.openssh.listenAddresses = [
|
|
|
|
{
|
|
|
|
addr = "10.7.6.4";
|
|
|
|
port = 22;
|
|
|
|
}
|
|
|
|
{
|
|
|
|
addr = "[fd00:fae:fae:fae:fae:4::]";
|
|
|
|
port = 22;
|
|
|
|
}
|
|
|
|
];
|
2024-05-29 12:08:59 +00:00
|
|
|
}
|