aboutsummaryrefslogtreecommitdiff
path: root/lib/private-wireguard.nix (unfollow)
Commit message (Collapse)AuthorFilesLines
2022-03-02wireguard: use agenix from the moduleFranck Cuny1-2/+8
This is the correct way to set up the private key, let's see if this works consistently across hosts and reboots.
2022-02-24agenix: store wireguard key in persistent storageFranck Cuny1-4/+2
The key was created under /run/agenix, which is wiped out after a reboot. The key being absent prevents the wireguard interface to come up. Store the key somewhere persistent to prevent this to happen.
2022-02-21wireguard: module and peers configurationsFranck Cuny1-0/+44
Add a new module to automatically configure the peers for wireguard. The module needs a configuration file (in `configs/wireguard.toml`) which lists all the peers, their IP and and their public keys. The secret keys is encrypted as a secret with agenix. There's some initial documentation on how to use this setup.