2023-05-12 11:17:58 +02:00
|
|
|
{ pkgs, config, ... }:
|
|
|
|
{
|
2023-05-20 22:31:36 +02:00
|
|
|
# networking.firewall.trustedInterfaces = [ "wg0" ];
|
2023-05-12 11:17:58 +02:00
|
|
|
networking.firewall.allowedUDPPorts = [ 51820 ];
|
|
|
|
sops.secrets.wireguard_private = { };
|
2023-06-09 02:32:28 +02:00
|
|
|
#boot.kernel.sysctl."net.ipv4.ip_forward" = true;
|
2023-05-12 11:17:58 +02:00
|
|
|
|
|
|
|
# Enable WireGuard
|
|
|
|
networking.wg-quick.interfaces = {
|
|
|
|
# Hub and Spoke Setup
|
|
|
|
# https://www.procustodibus.com/blog/2020/11/wireguard-hub-and-spoke-config/
|
|
|
|
wg0 = {
|
|
|
|
address = [ "10.100.0.2/32" ];
|
|
|
|
listenPort = 51820; # to match firewall allowedUDPPorts (without this wg uses random port numbers)
|
|
|
|
privateKeyFile = config.sops.secrets.wireguard_private.path;
|
|
|
|
mtu = 1280;
|
|
|
|
|
|
|
|
# server
|
|
|
|
peers = [
|
|
|
|
{
|
2024-04-07 17:58:36 +02:00
|
|
|
# orbi
|
2023-05-12 11:17:58 +02:00
|
|
|
publicKey = "uWR93xJe5oEbX3DsAYpOS9CuSg1VmXEQxJzdlJpe3DU=";
|
|
|
|
allowedIPs = [ "10.100.0.1/24" ];
|
|
|
|
endpoint = "ingolf-wagner.de:51820";
|
|
|
|
persistentKeepalive = 25;
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|