{ ... }: { # Allow these hosts to directly communicate with their hostnames networking.extraHosts = '' 10.100.0.1 osaka-linode-01 10.100.0.2 framework-server ''; networking.firewall.interfaces.wireguard0.allowedTCPPorts = [ 22 ]; # Set up the secrets file: sops.secrets."wireguard_key" = { owner = "root"; sopsFile = ../../../secrets/hosts/framework-server.yaml; }; sops.secrets."preshared_key" = { owner = "root"; sopsFile = ../../../secrets/wireguard.yaml; }; # Wireguard Forwarder networking.wireguard = { enable = true; interfaces = { "wireguard0" = { ips = [ "10.100.0.2/24" ]; listenPort = 51820; privateKeyFile = "/run/secrets/wireguard_key"; # Testing peers = [ { # osaka-linode-01 publicKey = "yPZ3EmmIqCkReXf1DRTxzVaKQ2k+ifGmYJHji5nnMmE="; presharedKeyFile = "/run/secrets/preshared_key"; persistentKeepalive = 5; allowedIPs = [ "10.100.0.1/32" ]; # endpoint = "172.234.84.222:51820"; # osaka-linode-01 # endpoint = "172.232.204.45:51820"; # milan-linode-01 endpoint = "172.105.76.221:51820"; # frankfurt-linode-01 } ]; }; }; }; }