nix-config/modules/wireguard.nix

55 lines
1.5 KiB
Nix
Raw Normal View History

2022-05-25 19:27:42 +02:00
{ config, ... }:
{
networking.wg-quick.interfaces = {
wg-zw = {
2022-06-11 23:28:31 +02:00
privateKeyFile = config.sops.secrets."wg/wg-zw-seckey".path;
address = [ "172.20.76.226" ];
2022-05-25 19:27:42 +02:00
dns = [ "172.20.73.8" ];
peers = [
{
publicKey = "PG2VD0EB+Oi+U5/uVMUdO5MFzn59fAck6hz8GUyLMRo=";
endpoint = "81.201.149.152:1337";
allowedIPs = [ "172.20.72.0/21" "172.22.99.0/24" ];
}
];
};
2022-06-18 11:49:27 +02:00
2022-05-25 19:27:42 +02:00
wg-dvb = {
2022-06-11 23:28:31 +02:00
privateKeyFile = config.sops.secrets."wg/wg-dvb-seckey".path;
2022-05-25 19:27:42 +02:00
address = [ "10.13.37.3/32" ];
2022-06-18 11:49:27 +02:00
peers = [ {
2022-05-25 19:27:42 +02:00
publicKey = "WDvCObJ0WgCCZ0ORV2q4sdXblBd8pOPZBmeWr97yphY=";
allowedIPs = [ "10.13.37.0/24" ];
endpoint = "academicstrokes.com:51820";
persistentKeepalive = 25;
2022-06-18 11:49:27 +02:00
} ];
2022-05-25 19:27:42 +02:00
};
mlwd-nl = {
2022-06-11 23:28:31 +02:00
privateKeyFile = config.sops.secrets."wg/mlwd-nl-seckey".path;
2022-05-25 19:27:42 +02:00
address = [ "10.65.79.164/32" "fc00:bbbb:bbbb:bb01::2:4fa3/128" ];
dns = [ "193.138.218.74" ];
2022-06-11 23:28:31 +02:00
peers = [{
2022-05-25 19:27:42 +02:00
publicKey = "StMPmol1+QQQQCJyAkm7t+l/QYTKe5CzXUhw0I6VX14=";
allowedIPs = [ "0.0.0.0/0" "::0/0" ];
endpoint = "92.60.40.194:51820";
}];
};
2022-06-18 11:49:27 +02:00
oxalab = {
privateKeyFile = config.sops.secrets."wg/oxalab-seckey".path;
address = [ "10.66.66.10/32" ];
peers = [{
publicKey = "5nCVC21BL+1r70OGwA4Q6Z/gcPLC3+ZF8sTurdn7N0E=";
allowedIPs = [ "10.66.66.0/24" ];
endpoint = "95.216.166.21:51820";
persistentKeepalive = 25;
}];
};
2022-05-25 19:27:42 +02:00
};
}