Skip to content

Commit

Permalink
switch wireguard client from homeserver to klaus
Browse files Browse the repository at this point in the history
  • Loading branch information
tiborpilz committed Mar 1, 2024
1 parent 124e46e commit 140b618
Show file tree
Hide file tree
Showing 2 changed files with 32 additions and 32 deletions.
32 changes: 16 additions & 16 deletions hosts/nixos/homeserver/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -28,22 +28,22 @@ with lib;
prefixLength = 24;
}];

networking.wg-quick.interfaces = {
wg0 = {
address = [ "10.0.0.2/24" "fdc9:281f:04d7:9ee9::2/64" ];
dns = [ "10.0.0.1" "fdc9:281f:04d7:9ee9::1" ];
privateKeyFile = "/var/lib/wireguard/private.key";

peers = [
{
publicKey = "QzJm9puVez50UZbCUAJYZnqBdW19o1tBU0Q/WXZsbyw=";
allowedIPs = [ "0.0.0.0/0" "::/0" ];
endpoint = "159.69.194.44:51820";
persistentKeepalive = 25;
}
];
};
};
# networking.wg-quick.interfaces = {
# wg0 = {
# address = [ "10.0.0.2/24" "fdc9:281f:04d7:9ee9::2/64" ];
# dns = [ "10.0.0.1" "fdc9:281f:04d7:9ee9::1" ];
# privateKeyFile = "/var/lib/wireguard/private.key";

# peers = [
# {
# publicKey = "QzJm9puVez50UZbCUAJYZnqBdW19o1tBU0Q/WXZsbyw=";
# allowedIPs = [ "0.0.0.0/0" "::/0" ];
# endpoint = "159.69.194.44:51820";
# persistentKeepalive = 25;
# }
# ];
# };
# };

# networking.useNetworkd = false;

Expand Down
32 changes: 16 additions & 16 deletions hosts/nixos/klaus/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -27,22 +27,22 @@ with lib;

networking.useDHCP = false;

# networking.wg-quick.interfaces = {
# wg0 = {
# address = [ "10.0.0.2/24" "fdc9:281f:04d7:9ee9::2/64" ];
# dns = [ "10.0.0.1" "fdc9:281f:04d7:9ee9::1" ];
# privateKeyFile = "/var/lib/wireguard/private.key";

# peers = [
# {
# publicKey = "QzJm9puVez50UZbCUAJYZnqBdW19o1tBU0Q/WXZsbyw=";
# allowedIPs = [ "0.0.0.0/0" "::/0" ];
# endpoint = "159.69.194.44:51820";
# persistentKeepalive = 25;
# }
# ];
# };
#};
networking.wg-quick.interfaces = {
wg0 = {
address = [ "10.0.0.2/24" "fdc9:281f:04d7:9ee9::2/64" ];
dns = [ "10.0.0.1" "fdc9:281f:04d7:9ee9::1" ];
privateKeyFile = "/var/lib/wireguard/private.key";

peers = [
{
publicKey = "QzJm9puVez50UZbCUAJYZnqBdW19o1tBU0Q/WXZsbyw=";
allowedIPs = [ "0.0.0.0/0" "::/0" ];
endpoint = "159.69.194.44:51820";
persistentKeepalive = 25;
}
];
};
};

# networking.useNetworkd = false;

Expand Down

0 comments on commit 140b618

Please sign in to comment.