wireguard.nix
This commit is contained in:
parent
2f7dc23398
commit
e153dabbc9
1 changed files with 27 additions and 1 deletions
|
|
@ -1 +1,27 @@
|
|||
{ ... }: { }
|
||||
{ config, lib, ... }:
|
||||
{
|
||||
options.server.wireguard-bridge.enable = lib.mkEnableOption "Enables Wireguard host functionality";
|
||||
options.server.wireguard-bridge.ip = lib.mkOption;
|
||||
|
||||
config = lib.mkIf config.server.wireguard-bridge {
|
||||
sops.secrets."wireguard/bridge/private" = { };
|
||||
networking.firewall.allowedUDPPorts = [ 51821 ];
|
||||
|
||||
networking.wireguard.interfaces = {
|
||||
bridge = {
|
||||
ips = [ config.server.wireguard-bridge.ip ];
|
||||
listenPort = 51821;
|
||||
privateKeyFile = config.sops.secrets."wireguard-bridge/private".path;
|
||||
|
||||
peers = [
|
||||
{
|
||||
publicKey = "kYJn39tFStvzJ6QOMy3NabNWrJREaYdxwo/GdYD0MRk=";
|
||||
allowedIPs = [ "10.0.1.2/32" ];
|
||||
endpoint = "95.217.79.106:51821";
|
||||
persistentKeepalive = 25;
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue