[fugitive] Add wireguard interface
This commit is contained in:
@@ -6,6 +6,14 @@ let
|
|||||||
ssh = [ 2322 2323 2324 ];
|
ssh = [ 2322 2323 2324 ];
|
||||||
gitea = 10010;
|
gitea = 10010;
|
||||||
headscale = 10020;
|
headscale = 10020;
|
||||||
|
wg0 = 51820;
|
||||||
|
};
|
||||||
|
|
||||||
|
pubkeys = {
|
||||||
|
labyrinth = {
|
||||||
|
wg = "fGP6Iebdk31dDtreRmvrur+9IzRL56v3N/sw1ILGPSk=";
|
||||||
|
nix = "labyrinth-1:GCR2h5k9WFvome2mrFRBtiWw7sAn+pYZwXRwAj9W0b0=";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
in
|
in
|
||||||
@@ -41,6 +49,22 @@ in
|
|||||||
networking.firewall = {
|
networking.firewall = {
|
||||||
enable = true;
|
enable = true;
|
||||||
allowedTCPPorts = [ 80 443 ];
|
allowedTCPPorts = [ 80 443 ];
|
||||||
|
allowedUDPPorts = [ ports.wg0 ];
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.wireguard.enable = true;
|
||||||
|
networking.wireguard.interfaces = {
|
||||||
|
wg0 = {
|
||||||
|
ips = ["10.11.12.1/24" ];
|
||||||
|
listenPort = ports.wg0;
|
||||||
|
privateKeyFile = "/srv/wireguard/wg0.private";
|
||||||
|
generatePrivateKeyFile = true;
|
||||||
|
|
||||||
|
peers = [{
|
||||||
|
publicKey = pubkeys.labyrinth.wg;
|
||||||
|
allowedIPs = [ "10.11.12.2/32" ];
|
||||||
|
}];
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
security = {
|
security = {
|
||||||
@@ -58,9 +82,7 @@ in
|
|||||||
|
|
||||||
nix.settings = {
|
nix.settings = {
|
||||||
trusted-users = [ "@wheel" ];
|
trusted-users = [ "@wheel" ];
|
||||||
trusted-public-keys = [
|
trusted-public-keys = [ pubkeys.labyrinth.nix ];
|
||||||
"labyrinth-1:GCR2h5k9WFvome2mrFRBtiWw7sAn+pYZwXRwAj9W0b0="
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
|
|||||||
Reference in New Issue
Block a user