dff14a180b
Instead of `networking.wireguard` which seems to be broken
69 lines
1.5 KiB
Nix
69 lines
1.5 KiB
Nix
{
|
|
config,
|
|
pkgs,
|
|
...
|
|
}: {
|
|
imports = [
|
|
./hardware-configuration.nix
|
|
];
|
|
|
|
# Nix
|
|
nix.settings.experimental-features = ["nix-command" "flakes"];
|
|
|
|
# Set your time zone.
|
|
time.timeZone = "Europe/Paris";
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
helix
|
|
git
|
|
];
|
|
|
|
services.openssh = {
|
|
enable = true;
|
|
ports = [22];
|
|
settings = {
|
|
PasswordAuthentication = false;
|
|
};
|
|
};
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHQyRXFQ6iA5p0vDuoGSHZfajiVZPAGIyqhTziM7QgBV gaspard@nixos"
|
|
];
|
|
|
|
networking = {
|
|
interfaces."wlan0".useDHCP = true;
|
|
wireless = {
|
|
interfaces = ["wlan0"];
|
|
enable = true;
|
|
networks = {
|
|
"TestNetwork".psk = "not_an_actual_password_leak";
|
|
};
|
|
};
|
|
};
|
|
|
|
# SOPS
|
|
sops.defaultSopsFile = ../../secrets/pi4/default.yaml;
|
|
sops.secrets."wireguard/private_key".owner = "root";
|
|
|
|
# Wireguard
|
|
networking.firewall = {
|
|
allowedUDPPorts = [51820];
|
|
};
|
|
networking.wg-quick.interfaces = {
|
|
wg0 = {
|
|
address = ["10.8.0.31/32"];
|
|
listenPort = 51820; # Should match firewall allowedUDPPorts
|
|
privateKeyFile = config.sops.secrets."wireguard/private_key".path;
|
|
|
|
peers = [
|
|
{
|
|
publicKey = "KLULII6VEUWMhyIba6oxxHdZsVP3TMVlNY1Vz49q7jg=";
|
|
allowedIPs = ["0.0.0.0/0"];
|
|
endpoint = "vpn.gasdev.fr:993";
|
|
persistentKeepalive = 25;
|
|
}
|
|
];
|
|
};
|
|
};
|
|
|
|
system.stateVersion = "24.11";
|
|
}
|