wireguard: add framework to network
All checks were successful
continuous-integration/drone/push Build is passing

This commit is contained in:
Sijmen 2022-08-10 13:25:38 +02:00
parent 79131a5b5e
commit bf92851bd2
Signed by: vijfhoek
GPG key ID: DAF7821E067D9C48
2 changed files with 17 additions and 20 deletions

View file

@ -65,26 +65,17 @@
];
};
# wireguard.interfaces.wg0 = {
# ips = [ "10.100.0.4/32" ];
# listenPort = 51820;
#
# privateKeyFile = "/home/sijmen/wireguard-keys/private";
#
# peers = [{
# publicKey = "zu9vXxxg4wm0R4yWQ2HPaAwJbizuccGYbBB/StwSsm4=";
#
# # Forward all the traffic via VPN.
# #allowedIPs = [ "0.0.0.0/0" ];
# # Or forward only particular subnets
# allowedIPs = [ "10.100.0.0/24" ];
#
# # Set this to the server IP and port.
# endpoint = "143.178.219.107:51820";
# persistentKeepalive = 25;
# }
# ];
# };
wireguard.interfaces.wg0 = {
ips = [ "10.100.0.4/32" ];
listenPort = 51820;
privateKeyFile = "/home/sijmen/wireguard-keys/private";
peers = [{
publicKey = "zu9vXxxg4wm0R4yWQ2HPaAwJbizuccGYbBB/StwSsm4=";
allowedIPs = [ "10.100.0.0/24" ];
endpoint = "143.178.219.107:51820";
persistentKeepalive = 25;
}];
};
};
services = {

View file

@ -108,6 +108,12 @@
publicKey = "Y2X8mT+LCXkjLjzRBcdglIKLYu68kvf5K0nKTEOWdGE=";
allowedIPs = [ "10.100.0.2/32" ];
}
{
# framework
publicKey = "csvOi6DK6b9zh0JCGIe8z25ePmayY7Hihm5Ur2/aIyo=";
allowedIPs = [ "10.100.0.4/32" ];
}
];
};
};