64 lines
1.7 KiB
Nix
64 lines
1.7 KiB
Nix
{ config, ... }:
|
|
|
|
{
|
|
networking.firewall.allowedUDPPorts = [
|
|
config.networking.wireguard.interfaces.wgautobahn.listenPort
|
|
];
|
|
|
|
age.secrets.wireguard-key-wgautobahn = {
|
|
file = ../../../../secrets/wireguard-key-wgautobahn.age;
|
|
owner = "root";
|
|
group = "root";
|
|
mode = "0400";
|
|
};
|
|
age.secrets.wireguard-key-wgmv = {
|
|
file = ../../../../secrets/wireguard-key-wgmv.age;
|
|
owner = "root";
|
|
group = "root";
|
|
mode = "0400";
|
|
};
|
|
|
|
networking.wireguard = {
|
|
enable = true;
|
|
interfaces.wgautobahn = {
|
|
ips = [ "10.15.0.1/30" ];
|
|
listenPort = 51820;
|
|
privateKeyFile = config.age.secrets.wireguard-key-wgautobahn.path;
|
|
|
|
allowedIPsAsRoutes = true;
|
|
peers = [
|
|
# animus
|
|
{
|
|
publicKey = "CIJ8W5SDMyPnSZLN2CNplwhGaNPUGoLV0mdzoDHhxUo=";
|
|
allowedIPs = [ "10.15.0.0/30" "10.150.0.0/16" ];
|
|
endpoint = "116.202.226.86:53042";
|
|
}
|
|
];
|
|
};
|
|
interfaces.wgmv = {
|
|
ips = [ "10.65.193.152/32" ];
|
|
privateKeyFile = config.age.secrets.wireguard-key-wgmv.path;
|
|
allowedIPsAsRoutes = false;
|
|
peers = [
|
|
# es-mad-wg-102
|
|
{
|
|
publicKey = "1Wo/cQeVHX2q9k95nxN+48lgkGLsPQ+uesRb/9XdY1Y=";
|
|
allowedIPs = [ "10.64.0.1/32" "0.0.0.0/0" ];
|
|
endpoint = "45.134.213.207:51820";
|
|
}
|
|
# es-mad-wg-202
|
|
{
|
|
publicKey = "iehXacO91FbBqni2IFxedEYPlW2Wvvt9GtRPPPMo9zc=";
|
|
allowedIPs = [ "10.64.0.1/32" "0.0.0.0/0" ];
|
|
endpoint = "146.70.128.226:51820";
|
|
}
|
|
];
|
|
};
|
|
};
|
|
networking.interfaces = {
|
|
wgmv.ipv4.routes = [
|
|
{ address = "10.64.0.1"; prefixLength = 32; }
|
|
{ address = "10.124.0.0"; prefixLength = 16; }
|
|
];
|
|
};
|
|
}
|