wireguard: add framework to network
All checks were successful
continuous-integration/drone/push Build is passing
All checks were successful
continuous-integration/drone/push Build is passing
This commit is contained in:
parent
79131a5b5e
commit
bf92851bd2
2 changed files with 17 additions and 20 deletions
|
@ -65,26 +65,17 @@
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
# wireguard.interfaces.wg0 = {
|
wireguard.interfaces.wg0 = {
|
||||||
# ips = [ "10.100.0.4/32" ];
|
ips = [ "10.100.0.4/32" ];
|
||||||
# listenPort = 51820;
|
listenPort = 51820;
|
||||||
#
|
privateKeyFile = "/home/sijmen/wireguard-keys/private";
|
||||||
# privateKeyFile = "/home/sijmen/wireguard-keys/private";
|
peers = [{
|
||||||
#
|
publicKey = "zu9vXxxg4wm0R4yWQ2HPaAwJbizuccGYbBB/StwSsm4=";
|
||||||
# peers = [{
|
allowedIPs = [ "10.100.0.0/24" ];
|
||||||
# publicKey = "zu9vXxxg4wm0R4yWQ2HPaAwJbizuccGYbBB/StwSsm4=";
|
endpoint = "143.178.219.107:51820";
|
||||||
#
|
persistentKeepalive = 25;
|
||||||
# # Forward all the traffic via VPN.
|
}];
|
||||||
# #allowedIPs = [ "0.0.0.0/0" ];
|
};
|
||||||
# # Or forward only particular subnets
|
|
||||||
# allowedIPs = [ "10.100.0.0/24" ];
|
|
||||||
#
|
|
||||||
# # Set this to the server IP and port.
|
|
||||||
# endpoint = "143.178.219.107:51820";
|
|
||||||
# persistentKeepalive = 25;
|
|
||||||
# }
|
|
||||||
# ];
|
|
||||||
# };
|
|
||||||
};
|
};
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
|
|
|
@ -108,6 +108,12 @@
|
||||||
publicKey = "Y2X8mT+LCXkjLjzRBcdglIKLYu68kvf5K0nKTEOWdGE=";
|
publicKey = "Y2X8mT+LCXkjLjzRBcdglIKLYu68kvf5K0nKTEOWdGE=";
|
||||||
allowedIPs = [ "10.100.0.2/32" ];
|
allowedIPs = [ "10.100.0.2/32" ];
|
||||||
}
|
}
|
||||||
|
|
||||||
|
{
|
||||||
|
# framework
|
||||||
|
publicKey = "csvOi6DK6b9zh0JCGIe8z25ePmayY7Hihm5Ur2/aIyo=";
|
||||||
|
allowedIPs = [ "10.100.0.4/32" ];
|
||||||
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
Loading…
Reference in a new issue