2BFSPRZ7HCKD2GYB24EYDFQUQNWOBIHEZWU4CLAU5FIAEYRC55VAC
RNEH6N4LYINZ2RMIJ5GWIWUKRTYFZHGBXVAOWQT7PWIX5W4AGMBAC
WTREXOXVN27E3CR25K7ZT3ZX5IAZQQ5BN6HDJSM7AR7GMMZSWBKQC
PNKSVM5EGSTD6ZIRPJD233SGJDNPE2VMUHTA5F2C3Y7HEYKBZLGQC
"wireguard-hpcr-private.age".publicKeys = allKeys;
{ pkgs, suites, lib, profiles, ... }:
{ self, pkgs, suites, lib, profiles, ... }:
# WireGuard networking.firewall.allowedUDPPorts = [ 13231 ]; age.secrets = { wireguard-hpcr-private.file = "${self}/secrets/wireguard-hpcr-private.age"; }; networking.wireguard.interfaces.wg0 = { ips = [ "192.168.1.2/24" ]; listenPort = 13231;
# WireGuard
networking.firewall.allowedUDPPorts = [ 13231 ];
age.secrets = {
wireguard-hpcr-private.file = "${self}/secrets/wireguard-hpcr-private.age";
};
networking.wireguard.interfaces.wg0 = {
ips = [ "192.168.1.2/24" ];
listenPort = 13231;
privateKeyFile = "/run/agenix/wireguard-hpcr-private"; peers = [ { publicKey = "e4fhLzPP1XB3C7kNzZr8foqAUhH79Bod4Dheks9Q6CM="; allowedIPs = [ "192.168.10.0/24" ]; endpoint = "5.179.0.121:13231"; persistentKeepalive = 25; } ]; };
privateKeyFile = "/run/agenix/wireguard-hpcr-private";
peers = [
{
publicKey = "e4fhLzPP1XB3C7kNzZr8foqAUhH79Bod4Dheks9Q6CM=";
allowedIPs = [ "192.168.10.0/24" ];
endpoint = "5.179.0.121:13231";
persistentKeepalive = 25;
}
];