diff options
author | Mx Kookie <kookie@spacekookie.de> | 2020-12-25 22:13:56 +0100 |
---|---|---|
committer | Mx Kookie <kookie@spacekookie.de> | 2020-12-25 22:13:56 +0100 |
commit | b3317c7cdde522f01f56f5a0799163beb0c219b8 (patch) | |
tree | 06e67f310c6d1d35c478775f140be1bf3f04c6a1 /infra/libkookie/configuration/server/wireguard/hyperion.nix | |
parent | 13b1f4b6f67012010d58411f86da6f1d35299b78 (diff) |
libkookie: hyperion: import configuration from legacy installation
Diffstat (limited to 'infra/libkookie/configuration/server/wireguard/hyperion.nix')
-rw-r--r-- | infra/libkookie/configuration/server/wireguard/hyperion.nix | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/infra/libkookie/configuration/server/wireguard/hyperion.nix b/infra/libkookie/configuration/server/wireguard/hyperion.nix new file mode 100644 index 000000000000..2a20f6ee5533 --- /dev/null +++ b/infra/libkookie/configuration/server/wireguard/hyperion.nix @@ -0,0 +1,27 @@ +{ config, ... }: + +let listenPort = 51820; +in +{ + networking.firewall.allowedTCPPorts = [ listenPort ]; + + networking.wireguard.interfaces."intranet" = { + ips = [ "10.13.12.1" ]; + inherit listenPort; + privateKeyFile = "/var/lib/wireguard/keys/private"; + + peers = [ + { publicKey = "NHMpnZW6h/MwxWcjztpwH5NN44jS9lB1b5T5jby1i1A="; + allowedIPs = [ "10.13.12.2/32" ]; } + { publicKey = "U/EmC6uMGqrLOd+lqfquDcUShPHgoulN35Dan6RAqyU="; + allowedIPs = [ "10.13.12.3/32" ]; } + { publicKey = "yh8gU4otkndmSsVBuaPMxxFHem45FE3POvSAWi8LEik="; + allowedIPs = [ "10.13.12.4/32" ]; } + { publicKey = "cPvj0SPITg1twz3DprtQgehJDOAhOL/hnXlB5ZS6Fi4="; + endpoint = "85.119.82.108:51820"; + allowedIPs = [ "10.172.171.0/24" ]; } + # { publicKey = "oQZ3fcb9LsnQj8sDYLHf1+hodnW4XEhsM0rNBgHROz8="; + # allowedIPs = [ "10.172.171.2/32" ]; } + ]; + }; +} |