Update wireguard
Some checks failed
ssh-test / ssh-test (push) Has been cancelled

This commit is contained in:
iFargle 2023-12-11 21:07:16 +09:00
parent baae25f4e2
commit 30b282a0e0
3 changed files with 16 additions and 1 deletions

View file

@ -66,7 +66,7 @@
osaka-linode-01 = libx.deploy { hostname = "osaka-linode-01"; }; osaka-linode-01 = libx.deploy { hostname = "osaka-linode-01"; };
nixos-vm-01 = libx.deploy { hostname = "nixos-vm-01"; }; nixos-vm-01 = libx.deploy { hostname = "nixos-vm-01"; };
framework-server = libx.deploy { hostname = "framework-server"; }; framework-server = libx.deploy { hostname = "framework-server"; };
nixos-framework = libx.deploy { hostname = "nixos-framework"; }; # nixos-framework = libx.deploy { hostname = "nixos-framework"; };
nixos-rpi4-01 = libx.deploy { hostname = "nixos-rpi4-01"; platform = "aarch64-linux"; }; nixos-rpi4-01 = libx.deploy { hostname = "nixos-rpi4-01"; platform = "aarch64-linux"; };
nixos-rpi4-02 = libx.deploy { hostname = "nixos-rpi4-02"; platform = "aarch64-linux"; }; nixos-rpi4-02 = libx.deploy { hostname = "nixos-rpi4-02"; platform = "aarch64-linux"; };
nixos-rpi4-03 = libx.deploy { hostname = "nixos-rpi4-03"; platform = "aarch64-linux"; }; nixos-rpi4-03 = libx.deploy { hostname = "nixos-rpi4-03"; platform = "aarch64-linux"; };

View file

@ -1,5 +1,13 @@
{ pkgs, config, lib, ... }: { { pkgs, config, lib, ... }: {
# Allow these hosts to directly communicate with their hostnames
netweorking.extraHosts = ''
10.100.0.1 osaka-linode-01
10.100.0.2 framework-server
'';
networking.firewall.interfaces.wireguard0.allowedTCPPorts = [ 22 ];
# Set up the secrets file: # Set up the secrets file:
sops.secrets."wireguard_keys/framework-server" = { sops.secrets."wireguard_keys/framework-server" = {
owner = "root"; owner = "root";

View file

@ -1,4 +1,11 @@
{ pkgs, config, lib, ... }: { { pkgs, config, lib, ... }: {
# Allow these hosts to directly communicate with their hostnames
netweorking.extraHosts = ''
10.100.0.1 osaka-linode-01
10.100.0.2 framework-server
'';
networking.firewall.allowedUDPPorts = [ 51820 ]; networking.firewall.allowedUDPPorts = [ 51820 ];
networking.firewall.interfaces.wireguard0.allowedTCPPorts = [ 22 ]; networking.firewall.interfaces.wireguard0.allowedTCPPorts = [ 22 ];