enable = lib.mkEnableOption "this peer";
});
config = {
- systemd.services."wireguard-${wgIface}".serviceConfig.LoadCredentialEncrypted =
- [ "privateKey:${inputs.self}/hosts/${hostName}/wireguard/${wgIface}/privateKey.cred" ];
+ #systemd.services."wireguard-${wgIface}".serviceConfig.LoadCredentialEncrypted =
+ # [ "privateKey:${inputs.self}/hosts/${hostName}/wireguard/${wgIface}/privateKey.cred" ];
networking.wireguard.interfaces.${wgIface} = lib.recursiveUpdate
(removeAttrs peers.${hostName} [ "ipv4" "persistentKeepalive" "peer" ])
{
(host: host.peer.allowedIPs)
(lib.attrValues peers);
networking.networkmanager.unmanaged = [ wgIface ];
- systemd.services.sshd.after = [ "wireguard-${wgIface}.service" ];
- services.openssh.listenAddresses = [
- { addr = peers.${hostName}.ipv4; port = 22; }
- ];
};
}