aboutsummaryrefslogtreecommitdiff
path: root/nix/private-wireguard.nix (unfollow)
Commit message (Collapse)AuthorFilesLines
2023-05-08modules/wireguard: move the module to the right locationFranck Cuny1-44/+0
2022-06-10fix(fmt): correct formatting for all nix filesFranck Cuny1-12/+15
This was done by running `nixpkgs-fmt .'. Change-Id: I4ea6c1e759bf468d08074be2111cbc7af72df295 Reviewed-on: https://cl.fcuny.net/c/world/+/404 Tested-by: CI Reviewed-by: Franck Cuny <franck@fcuny.net>
2022-06-09ref(nix): rename lib/ to nix/Franck Cuny1-0/+0
Change-Id: If1e608b89b39bd5a53a37b873833a7ea881cb418 Reviewed-on: https://cl.fcuny.net/c/world/+/298 Reviewed-by: Franck Cuny <franck@fcuny.net>
2022-04-13secrets: move the actual secrets with hosts configFranck Cuny1-2/+1
Having the secrets closer to the host is easier to manage. At the moment I don't have secrets that are shared across multiple hosts, so that's an OK approach.
2022-04-10secrets: move all the secrets under module/Franck Cuny1-12/+6
Refactor a bit the configuration, which should simplify the management and usage of secrets from now on.
2022-03-02wireguard: revert to previous portFranck Cuny1-1/+1
2022-03-02wireguard: use agenix from the moduleFranck Cuny1-2/+8
This is the correct way to set up the private key, let's see if this works consistently across hosts and reboots.
2022-02-24agenix: store wireguard key in persistent storageFranck Cuny1-4/+2
The key was created under /run/agenix, which is wiped out after a reboot. The key being absent prevents the wireguard interface to come up. Store the key somewhere persistent to prevent this to happen.
2022-02-21wireguard: module and peers configurationsFranck Cuny1-0/+44
Add a new module to automatically configure the peers for wireguard. The module needs a configuration file (in `configs/wireguard.toml`) which lists all the peers, their IP and and their public keys. The secret keys is encrypted as a secret with agenix. There's some initial documentation on how to use this setup.