add wireguard config to all other hosts into wheatley and auto-enable

This commit is contained in:
Lillian Violet 2024-12-06 19:42:52 +01:00
parent 733d98a446
commit 2a29f5587a
3 changed files with 66 additions and 0 deletions

View file

@ -5,6 +5,7 @@
outputs,
lib,
pkgs,
config,
...
}: {
# You can import other NixOS modules here
@ -44,6 +45,27 @@
networking.hostName = "EDI";
sops.secrets."wg-private-key".mode = "0440";
sops.secrets."wg-private-key".owner = config.users.users.root.name;
networking.wireguard.enable = true;
networking.wg-quick.interfaces = {
wg0 = {
autostart = true;
dns = ["1.1.1.1"];
address = ["10.5.5.3/32"];
privateKeyFile = config.sops.secrets."wg-private-key".path;
peers = [
{
publicKey = "A02sO7uLdgflhPIRd0cbJONIaPP4z8HTxDkmX4NegFg=";
endpoint = "84.87.146.85:5181";
allowedIPs = ["10.47.47.0/24"];
}
];
};
};
# Lanzaboote currently replaces the systemd-boot module.
# This setting is usually set to true in configuration.nix
# generated at installation time. So we force it to false

View file

@ -4,6 +4,7 @@
inputs,
outputs,
pkgs,
config,
...
}: {
# You can import other NixOS modules here
@ -86,6 +87,27 @@
# virtualisation.waydroid.enable = false;
networking.hostName = "GLaDOS";
sops.secrets."wg-private-key".mode = "0440";
sops.secrets."wg-private-key".owner = config.users.users.root.name;
networking.wireguard.enable = true;
networking.wg-quick.interfaces = {
wg0 = {
autostart = true;
dns = ["1.1.1.1"];
address = ["10.5.5.2/32"];
privateKeyFile = config.sops.secrets."wg-private-key".path;
peers = [
{
publicKey = "A02sO7uLdgflhPIRd0cbJONIaPP4z8HTxDkmX4NegFg=";
endpoint = "84.87.146.85:5181";
allowedIPs = ["10.47.47.0/24"];
}
];
};
};
# https://nixos.wiki/wiki/FAQ/When_do_I_update_stateVersion
system.stateVersion = "24.11";
}

View file

@ -3,6 +3,7 @@
outputs,
lib,
pkgs,
config,
...
}: {
imports = [
@ -213,6 +214,27 @@
networking.hostName = "shodan";
sops.secrets."wg-private-key".mode = "0440";
sops.secrets."wg-private-key".owner = config.users.users.root.name;
networking.wireguard.enable = true;
networking.wg-quick.interfaces = {
wg0 = {
autostart = true;
dns = ["1.1.1.1"];
address = ["10.5.5.4/32"];
privateKeyFile = config.sops.secrets."wg-private-key".path;
peers = [
{
publicKey = "A02sO7uLdgflhPIRd0cbJONIaPP4z8HTxDkmX4NegFg=";
endpoint = "84.87.146.85:5181";
allowedIPs = ["10.47.47.0/24"];
}
];
};
};
security.tpm2.enable = true;
security.tpm2.pkcs11.enable = true; # expose /run/current-system/sw/lib/libtpm2_pkcs11.so
security.tpm2.tctiEnvironment.enable = true; # TPM2TOOLS_TCTI and TPM2_PKCS11_TCTI env variables