add wireguard config to all other hosts into wheatley and auto-enable

This commit is contained in:
Lillian Violet 2024-12-06 19:42:52 +01:00
parent 733d98a446
commit 2a29f5587a
3 changed files with 66 additions and 0 deletions

View file

@ -5,6 +5,7 @@
outputs, outputs,
lib, lib,
pkgs, pkgs,
config,
... ...
}: { }: {
# You can import other NixOS modules here # You can import other NixOS modules here
@ -44,6 +45,27 @@
networking.hostName = "EDI"; networking.hostName = "EDI";
sops.secrets."wg-private-key".mode = "0440";
sops.secrets."wg-private-key".owner = config.users.users.root.name;
networking.wireguard.enable = true;
networking.wg-quick.interfaces = {
wg0 = {
autostart = true;
dns = ["1.1.1.1"];
address = ["10.5.5.3/32"];
privateKeyFile = config.sops.secrets."wg-private-key".path;
peers = [
{
publicKey = "A02sO7uLdgflhPIRd0cbJONIaPP4z8HTxDkmX4NegFg=";
endpoint = "84.87.146.85:5181";
allowedIPs = ["10.47.47.0/24"];
}
];
};
};
# Lanzaboote currently replaces the systemd-boot module. # Lanzaboote currently replaces the systemd-boot module.
# This setting is usually set to true in configuration.nix # This setting is usually set to true in configuration.nix
# generated at installation time. So we force it to false # generated at installation time. So we force it to false

View file

@ -4,6 +4,7 @@
inputs, inputs,
outputs, outputs,
pkgs, pkgs,
config,
... ...
}: { }: {
# You can import other NixOS modules here # You can import other NixOS modules here
@ -86,6 +87,27 @@
# virtualisation.waydroid.enable = false; # virtualisation.waydroid.enable = false;
networking.hostName = "GLaDOS"; networking.hostName = "GLaDOS";
sops.secrets."wg-private-key".mode = "0440";
sops.secrets."wg-private-key".owner = config.users.users.root.name;
networking.wireguard.enable = true;
networking.wg-quick.interfaces = {
wg0 = {
autostart = true;
dns = ["1.1.1.1"];
address = ["10.5.5.2/32"];
privateKeyFile = config.sops.secrets."wg-private-key".path;
peers = [
{
publicKey = "A02sO7uLdgflhPIRd0cbJONIaPP4z8HTxDkmX4NegFg=";
endpoint = "84.87.146.85:5181";
allowedIPs = ["10.47.47.0/24"];
}
];
};
};
# https://nixos.wiki/wiki/FAQ/When_do_I_update_stateVersion # https://nixos.wiki/wiki/FAQ/When_do_I_update_stateVersion
system.stateVersion = "24.11"; system.stateVersion = "24.11";
} }

View file

@ -3,6 +3,7 @@
outputs, outputs,
lib, lib,
pkgs, pkgs,
config,
... ...
}: { }: {
imports = [ imports = [
@ -213,6 +214,27 @@
networking.hostName = "shodan"; networking.hostName = "shodan";
sops.secrets."wg-private-key".mode = "0440";
sops.secrets."wg-private-key".owner = config.users.users.root.name;
networking.wireguard.enable = true;
networking.wg-quick.interfaces = {
wg0 = {
autostart = true;
dns = ["1.1.1.1"];
address = ["10.5.5.4/32"];
privateKeyFile = config.sops.secrets."wg-private-key".path;
peers = [
{
publicKey = "A02sO7uLdgflhPIRd0cbJONIaPP4z8HTxDkmX4NegFg=";
endpoint = "84.87.146.85:5181";
allowedIPs = ["10.47.47.0/24"];
}
];
};
};
security.tpm2.enable = true; security.tpm2.enable = true;
security.tpm2.pkcs11.enable = true; # expose /run/current-system/sw/lib/libtpm2_pkcs11.so security.tpm2.pkcs11.enable = true; # expose /run/current-system/sw/lib/libtpm2_pkcs11.so
security.tpm2.tctiEnvironment.enable = true; # TPM2TOOLS_TCTI and TPM2_PKCS11_TCTI env variables security.tpm2.tctiEnvironment.enable = true; # TPM2TOOLS_TCTI and TPM2_PKCS11_TCTI env variables