nixos/server/wireguard.nix
2026-01-15 13:00:45 +01:00

27 lines
831 B
Nix

{ config, lib, ... }:
{
options.server.wireguard-bridge.enable = lib.mkEnableOption "Enables Wireguard host functionality";
options.server.wireguard-bridge.ip = lib.mkOption;
config = lib.mkIf config.server.wireguard-bridge {
sops.secrets."wireguard/bridge/private" = { };
networking.firewall.allowedUDPPorts = [ 51821 ];
networking.wireguard.interfaces = {
bridge = {
ips = [ config.server.wireguard-bridge.ip ];
listenPort = 51821;
privateKeyFile = config.sops.secrets."wireguard-bridge/private".path;
peers = [
{
publicKey = "kYJn39tFStvzJ6QOMy3NabNWrJREaYdxwo/GdYD0MRk=";
allowedIPs = [ "10.0.1.2/32" ];
endpoint = "95.217.79.106:51821";
persistentKeepalive = 25;
}
];
};
};
};
}