nix: update julm-nix input
[sourcephile-nix.git] / hosts / carotte / networking / wireguard / intranet.nix
index 133f0bc697a9f76ba907393acf52e9e64388bada..34ef34e6d0f56a74a5b614e7507342bde29ea503 100644 (file)
@@ -1,26 +1,30 @@
-{ pkgs, lib, config, hostName, inputs, ... }:
+{ config, inputs, ... }:
 let
   inherit (config.security) gnupg;
   iface = "wg-intra";
 in
 {
-imports = [
-  (inputs.julm-nix + "/nixos/profiles/wireguard/wg-intra.nix")
-];
-networking.wireguard.interfaces.${iface} = {
-  privateKeyFile = gnupg.secrets."wireguard/${iface}/privateKey".path;
-};
-security.gnupg.secrets."wireguard/${iface}/privateKey" = {
-/*
-  systemdConfig.serviceConfig = {
-    before     = [ "wireguard-${iface}.service" ];
-    wantedBy   = [ "wireguard-${iface}.service" ];
-    requiredBy = [ "wireguard-${iface}.service" ];
+  imports = [
+    (inputs.julm-nix + "/nixos/profiles/wireguard/wg-intra.nix")
+  ];
+  networking.wireguard.${iface}.peers = {
+    losurdo.enable = true;
+    oignon.enable = true;
+  };
+  networking.wireguard.interfaces.${iface} = {
+    privateKeyFile = gnupg.secrets."wireguard/${iface}/privateKey".path;
+  };
+  security.gnupg.secrets."wireguard/${iface}/privateKey" = {
+    /*
+      systemdConfig.serviceConfig = {
+      before     = [ "wireguard-${iface}.service" ];
+      wantedBy   = [ "wireguard-${iface}.service" ];
+      requiredBy = [ "wireguard-${iface}.service" ];
+      };
+    */
+  };
+  systemd.services."wireguard-${iface}" = {
+    after = [ gnupg.secrets."wireguard/${iface}/privateKey".service ];
+    requires = [ gnupg.secrets."wireguard/${iface}/privateKey".service ];
   };
-*/
-};
-systemd.services."wireguard-${iface}" = {
-  after    = [ gnupg.secrets."wireguard/${iface}/privateKey".service ];
-  requires = [ gnupg.secrets."wireguard/${iface}/privateKey".service ];
-};
 }