Files
nix/hosts/jupiter/configs/wireguard/default.nix
Nikolaos Karaolidis ce12d650d2 Cycle wireguard keys
Signed-off-by: Nikolaos Karaolidis <nick@karaolidis.com>
2025-07-24 11:37:38 +01:00

53 lines
1.3 KiB
Nix

{
config,
inputs,
pkgs,
...
}:
let
jupiterVpsConfig = inputs.self.nixosConfigurations.jupiter-vps.config;
wireguardPort = jupiterVpsConfig.networking.wireguard.interfaces.wg0.listenPort;
jupiterVpsPublicIPv4 = "51.75.170.190";
jupiterPublicIPv4 = "51.89.210.124";
in
{
sops.secrets."wireguard/client/vps" = { };
networking = {
iproute2 = {
enable = true;
rttablesExtraConfig = ''
100 wireguard
'';
};
wireguard.interfaces.wg0 =
let
ip = "${pkgs.iproute2}/bin/ip";
table = "wireguard";
in
{
ips = [
"10.0.0.2/24"
"${jupiterPublicIPv4}/32"
];
privateKeyFile = config.sops.secrets."wireguard/client/vps".path;
inherit table;
postSetup = [ "${ip} rule add from ${jupiterPublicIPv4} table ${table}" ];
postShutdown = [ "${ip} rule del from ${jupiterPublicIPv4} table ${table}" ];
peers = [
{
name = "jupiter-vps";
allowedIPs = [ "0.0.0.0/0" ];
publicKey = "dRUBz0AZFp30zXqWyTDRe7UyNioc5lV5QE2xYJCc6yU=";
endpoint = "${jupiterVpsPublicIPv4}:${builtins.toString wireguardPort}";
persistentKeepalive = 25;
}
];
};
};
}