XNGFJHLQT32DYH52PZRADH5EQDY7HRNEJ472IP4FNWL45NYO6LNAC 66COC6TI5UGIYQMWHOTONDBSH63AQYAHYP5UKYZR65Y6VEVJIPZQC RHDO6BBKT5SL2IER3BMB3RO7FF7HCKVSOHYO3C7KCVEVVZPVVV2QC 6TJTI7RQ5QVCBPW6BKPUL6XUFWUIMXH774UAFCHACDJQWDMPSZNQC BSONDEQ66PXQ4K57M4WDAH77Y2RTCVUS5C2ZPROTIJHSAQJYPPJQC SQW3L5DJGHETLQDNSZ5ZTXR5KBF35HLJIDGRRAGOBNDPNJXXVEOQC 4IUIQWLQY3WHRAGFP5TXB4AO4AXD2ZVK7IS257UYCY6XYOSUYURAC UIVGUJCHU6JKX6FSEVA553CNNMZAMTTLLNBWQEA4L43BECZND6BAC 6JAZSTWHYD5WOY5KLRXWKUSQQHJY5LV7KB26XYHSIKG7XVJDJVVAC ZRJNPDNXM2XBDKJH4I4WFFNGFVWGFDPWRKAICRN45CMYRR5VADZAC LCU2Y6NLRNRKR4R2YHQH5G6LJXG4UZZOMFEV7C5B2BDQPC45E5YAC XYVOW54TWIJYX7VDWOTXFNM27C2ODJKTGUZ3LXVDURPHHLBKXS6QC GGKSPLOM4NMOFIKWY5DUIYUL7QFU4UQ54GWS2ER7Z3R3YW4SKVRQC },"locked": {"lastModified": 1637793790,"narHash": "sha256-oPXavjxETEWGXq8g7kQHyRLKUmLX2yPtGn+t3V0mrTY=","owner": "ryantm","repo": "agenix","rev": "f85eea0e29fa9a8924571d0e398215e175f80d55","type": "github"},"original": {"owner": "ryantm","repo": "agenix","type": "github"}},"home-manager": {"inputs": {"nixpkgs": "nixpkgs_2"
"lastModified": 1634436779,"narHash": "sha256-D/nrXTWpe1bPIjFy85sgiLHYqu+AeaC6v5/+KlA9PRg=","owner": "NixOS","repo": "nixpkgs","rev": "9aeeb7574fb784eaf6395f4400705b5f619e6cc3","type": "github"
"lastModified": 1618628710,"narHash": "sha256-9xIoU+BrCpjs5nfWcd/GlU7XCVdnNKJPffoNTxgGfhs=","path": "/nix/store/z1rf17q0fxj935cmplzys4gg6nxj1as0-source","rev": "7919518f0235106d050c77837df5e338fb94de5d","type": "path"
"locked": {"lastModified": 1634436779,"narHash": "sha256-D/nrXTWpe1bPIjFy85sgiLHYqu+AeaC6v5/+KlA9PRg=","owner": "NixOS","repo": "nixpkgs","rev": "9aeeb7574fb784eaf6395f4400705b5f619e6cc3","type": "github"},"original": {"id": "nixpkgs","type": "indirect"}},"nixpkgs_3": {
letcoding_server = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIuYCV7NwqlACA5rp8WH4lerKB8M9Ci3jucyW0hhQLfD";in {"wireguard/private.key".publicKeys = [coding_server];}
OdVMF/vEnyFYAOYU8Rfl+0ubW14TVfZUU5HGUV8sGzY=
# Configure network proxy if necessary# networking.proxy.default = "http://user:password@proxy:port/";# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
networking.nat = {enable = true;externalInterface = "ens18";internalInterfaces = ["wg0"];};networking.wireguard.interfaces = {wg0 = {ips = ["10.0.100.1/24"];listenPort = 51820;privateKeyFile = config.age.secrets."wireguard/private.key".path;peers = [];};};age.secrets."wireguard/private.key".file = ../../secrets/wireguard/private.key;