Compare commits
3 commits
cc053b216a
...
497384d486
Author | SHA1 | Date | |
---|---|---|---|
497384d486 | |||
ed5a14a517 | |||
e33a9538fb |
6 changed files with 21 additions and 22 deletions
|
@ -165,11 +165,11 @@
|
||||||
},
|
},
|
||||||
"secrets": {
|
"secrets": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1711641020,
|
"lastModified": 1711740735,
|
||||||
"narHash": "sha256-und6yndmaPsS/wEkqrEvN02VbK+HCFz0zglRNaZeCJI=",
|
"narHash": "sha256-/NmklXfLak65luQoMsUl539faoabD+lo7P9fNDaXkic=",
|
||||||
"ref": "refs/heads/master",
|
"ref": "refs/heads/master",
|
||||||
"rev": "057f8a2b8cd29a70764004d035a6a9e33c73f4ff",
|
"rev": "42e5e76765daf6dd36fa195a5a424d8d69c15dfa",
|
||||||
"revCount": 5,
|
"revCount": 6,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "ssh://git@git.caspervk.net/caspervk/nixos-secrets.git"
|
"url": "ssh://git@git.caspervk.net/caspervk/nixos-secrets.git"
|
||||||
},
|
},
|
||||||
|
|
|
@ -45,9 +45,9 @@
|
||||||
name = "wg-sigma-public";
|
name = "wg-sigma-public";
|
||||||
};
|
};
|
||||||
|
|
||||||
# The following routes traffic destined for 116.203.6.156 (floating IP) to
|
# The following routes traffic destined for the sigma-p2p address (floating
|
||||||
# sigma through wireguard. This allows the server to have a public address
|
# IP) to sigma through wireguard. This allows the server to have a public
|
||||||
# and help others sail the high seas even though it is behind NAT.
|
# address and help others sail the high seas even though it is behind NAT.
|
||||||
netdevs."51-wg-sigma-p2p" = {
|
netdevs."51-wg-sigma-p2p" = {
|
||||||
netdevConfig = {
|
netdevConfig = {
|
||||||
Name = "wg-sigma-p2p";
|
Name = "wg-sigma-p2p";
|
||||||
|
@ -62,7 +62,7 @@
|
||||||
wireguardPeerConfig = {
|
wireguardPeerConfig = {
|
||||||
PublicKey = "sigmaH/DKSU8KWyrPtucYmS2ewUvDvCNLxd/qYEo0n0=";
|
PublicKey = "sigmaH/DKSU8KWyrPtucYmS2ewUvDvCNLxd/qYEo0n0=";
|
||||||
PresharedKeyFile = config.age.secrets.wireguard-preshared-key-file.path;
|
PresharedKeyFile = config.age.secrets.wireguard-preshared-key-file.path;
|
||||||
AllowedIPs = ["116.203.6.156/32"];
|
AllowedIPs = ["${secrets.alpha.sigma-p2p-ip-address}/32"];
|
||||||
RouteTable = "main";
|
RouteTable = "main";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -7,7 +7,6 @@
|
||||||
../../modules/syncthing.nix
|
../../modules/syncthing.nix
|
||||||
./hardware.nix
|
./hardware.nix
|
||||||
./borg.nix
|
./borg.nix
|
||||||
./network.nix
|
|
||||||
./sway.nix
|
./sway.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
../../modules/server
|
../../modules/server
|
||||||
./hardware.nix
|
./hardware.nix
|
||||||
#./borg.nix
|
#./borg.nix
|
||||||
#./network.nix
|
./network.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
networking.hostName = "sigma";
|
networking.hostName = "sigma";
|
||||||
|
|
|
@ -10,7 +10,7 @@
|
||||||
(modulesPath + "/installer/scan/not-detected.nix")
|
(modulesPath + "/installer/scan/not-detected.nix")
|
||||||
nixos-hardware.nixosModules.common-cpu-amd
|
nixos-hardware.nixosModules.common-cpu-amd
|
||||||
nixos-hardware.nixosModules.common-cpu-amd-pstate
|
nixos-hardware.nixosModules.common-cpu-amd-pstate
|
||||||
#nixos-hardware.nixosModules.common-gpu-amd
|
nixos-hardware.nixosModules.common-gpu-nvidia
|
||||||
nixos-hardware.nixosModules.common-pc
|
nixos-hardware.nixosModules.common-pc
|
||||||
nixos-hardware.nixosModules.common-pc-ssd
|
nixos-hardware.nixosModules.common-pc-ssd
|
||||||
];
|
];
|
||||||
|
|
|
@ -6,8 +6,8 @@
|
||||||
systemd.network = {
|
systemd.network = {
|
||||||
config = {
|
config = {
|
||||||
routeTables = {
|
routeTables = {
|
||||||
"wg-sigma-public" = 822944075;
|
"wg-sigma-public" = 42;
|
||||||
"wg-sigma-p2p" = 2553;
|
"wg-sigma-p2p" = 6881;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@
|
||||||
Kind = "wireguard";
|
Kind = "wireguard";
|
||||||
};
|
};
|
||||||
wireguardConfig = {
|
wireguardConfig = {
|
||||||
PrivateKeyFile = config.age.secrets.wireguard-private-key-file-omega.path;
|
PrivateKeyFile = config.age.secrets.wireguard-private-key-file-sigma.path;
|
||||||
};
|
};
|
||||||
wireguardPeers = [
|
wireguardPeers = [
|
||||||
{
|
{
|
||||||
|
@ -59,16 +59,16 @@
|
||||||
};
|
};
|
||||||
|
|
||||||
# The following establishes a wireguard tunnel to alpha and configures
|
# The following establishes a wireguard tunnel to alpha and configures
|
||||||
# receiving traffic destined for 116.203.6.156. This allows the server to
|
# receiving traffic destined for the sigma-p2p address. This allows the
|
||||||
# have a public address and help others sail the high seas even though it
|
# server to have a public address and help others sail the high seas even
|
||||||
# is behind NAT.
|
# though it is behind NAT.
|
||||||
netdevs."51-wg-sigma-p2p" = {
|
netdevs."51-wg-sigma-p2p" = {
|
||||||
netdevConfig = {
|
netdevConfig = {
|
||||||
Name = "wg-sigma-p2p";
|
Name = "wg-sigma-p2p";
|
||||||
Kind = "wireguard";
|
Kind = "wireguard";
|
||||||
};
|
};
|
||||||
wireguardConfig = {
|
wireguardConfig = {
|
||||||
PrivateKeyFile = config.age.secrets.wireguard-private-key-file-omega.path;
|
PrivateKeyFile = config.age.secrets.wireguard-private-key-file-sigma.path;
|
||||||
};
|
};
|
||||||
wireguardPeers = [
|
wireguardPeers = [
|
||||||
{
|
{
|
||||||
|
@ -85,11 +85,11 @@
|
||||||
};
|
};
|
||||||
networks."wg-sigma-p2p" = {
|
networks."wg-sigma-p2p" = {
|
||||||
name = "wg-sigma-p2p";
|
name = "wg-sigma-p2p";
|
||||||
address = ["116.203.6.156/32"];
|
address = ["${secrets.sigma-p2p-ip-address}/32"];
|
||||||
routingPolicyRules = [
|
routingPolicyRules = [
|
||||||
{
|
{
|
||||||
routingPolicyRuleConfig = {
|
routingPolicyRuleConfig = {
|
||||||
From = "116.203.6.156/32";
|
From = "${secrets.sigma-p2p-ip-address}/32";
|
||||||
Table = "wg-sigma-p2p";
|
Table = "wg-sigma-p2p";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -104,8 +104,8 @@
|
||||||
group = "systemd-network";
|
group = "systemd-network";
|
||||||
};
|
};
|
||||||
|
|
||||||
age.secrets.wireguard-private-key-file-omega = {
|
age.secrets.wireguard-private-key-file-sigma = {
|
||||||
file = "${secrets}/secrets/wireguard-private-key-file-omega.age";
|
file = "${secrets}/secrets/wireguard-private-key-file-sigma.age";
|
||||||
mode = "640";
|
mode = "640";
|
||||||
owner = "root";
|
owner = "root";
|
||||||
group = "systemd-network";
|
group = "systemd-network";
|
Loading…
Reference in a new issue