diff --git a/nixos/wireguard.nix b/nixos/wireguard.nix index e954415..a82a129 100644 --- a/nixos/wireguard.nix +++ b/nixos/wireguard.nix @@ -15,32 +15,16 @@ in { wg-quick.interfaces = { home = { privateKeyFile = config.sops.secrets."wireguard/home/privateKey".path; - address = ["10.225.191.4/24"]; - dns = ["192.168.30.131"]; + address = ["10.225.191.7/24" "5ee:bad:c0de::7/128"]; + dns = ["10.225.191.1"]; autostart = false; mtu = 1412; peers = [ { presharedKeyFile = config.sops.secrets."wireguard/home/presharedKey".path; endpoint = "wg.kun.is:51820"; - publicKey = "fa3mQ7ximJbH7cu2ZbWidto5xBGxEEfWvCCiUDk00Hg="; - allowedIPs = ["0.0.0.0/0"]; - } - ]; - }; - - home-no-pihole = { - privateKeyFile = config.sops.secrets."wireguard/home/privateKey".path; - address = ["10.225.191.4/24"]; - dns = ["192.168.10.1"]; - autostart = false; - mtu = 1412; - peers = [ - { - presharedKeyFile = config.sops.secrets."wireguard/home/presharedKey".path; - endpoint = "wg.kun.is:51820"; - publicKey = "fa3mQ7ximJbH7cu2ZbWidto5xBGxEEfWvCCiUDk00Hg="; - allowedIPs = ["0.0.0.0/0"]; + publicKey = "1+gTBx8ghAt/BJICtgUKMKu52rufxuM6e46MN2g0Dlc="; + allowedIPs = ["0.0.0.0/0" "::/0"]; } ]; }; diff --git a/secrets/blocktech/nixos.yaml b/secrets/blocktech/nixos.yaml index 8066caa..15eca95 100644 --- a/secrets/blocktech/nixos.yaml +++ b/secrets/blocktech/nixos.yaml @@ -1,12 +1,8 @@ wireguard: home: - presharedKey: ENC[AES256_GCM,data:nFOqWcdo8zG83v1ceod8Uy4wX3w2LHmDPp2PaAAJ/lUexU4DhY9RZ4wtgC8=,iv:UvzQSZZ62I+QVFHMkHczC2KPeqX8z+DodS7nxLmXr4U=,tag:otwdNc2636DJdkzg22puqQ==,type:str] - privateKey: ENC[AES256_GCM,data:RCQ3hvrnxCerTmKYfZFV7c9smMj5tbP+iFWouo1oxfhbec5K3uXipkL+KSg=,iv:zKSPvtDH3WcuxVpQydGScX6m0isZzLKk/F+/Wlpt/YQ=,tag:BDag2DSoHQDzg8xTS3SX3A==,type:str] + presharedKey: ENC[AES256_GCM,data:ayLbDjTDMnLNr5v7hDVtV2iCQ4/VMXk6qWpp2CjJI+NCIMxUOb2Ozd+6hMs=,iv:jkfYVgJebkbRFXfUMefn6A1+rkQW/md13rpoaJKCdik=,tag:itsm94ieGagpoiPqfyNGcQ==,type:str] + privateKey: ENC[AES256_GCM,data:DkVLF6YZsNYEMS7pKK5BWPxgcar2Bv8U/Nk9Wssktbfvt60vqa4YBCnO314=,iv:PZ6adaCeEXhodO2k5O2E1GRLLajyE3aMzUtWYPfsDZM=,tag:d4EMsDlPiOvTHOMIktVV5A==,type:str] sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] age: - recipient: age1w99m9klvc7m5qtmtmu3l0jx8ksdzp5c4p9rkvh5fdullfc6afemqv5py2q enc: | @@ -17,8 +13,7 @@ sops: N1Rab3RNZ00vd0xPOVBYRHphaldWU1EKNKnKPWO1l8NwWXG2e15Y3td9I0rN9Wwn QdoeVf2+cPJOO5g9stZpl2DBF3QxJojt+dQhwjuEbP9nQtlVQPAlMQ== -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-11-30T23:42:09Z" - mac: ENC[AES256_GCM,data:nHLeqi4DAoyIi0CfARfx9b753BFdMmIR/fkOrhV5yehl7rUWvSh0+H7sb/ncgW6Blrc5g6Ek8BxXAt8a2SXfCEQaFU6tI1wJ/3mPtEPSvWQnZ75wAQLRgaBE3oxdL2FxSu3sjXMRjipPa/ACbau60FpNFzVbGuwNYfQAquwWtFg=,iv:LYn+36pfIw8zCnhQE4nCyt9yhetoHZRVNrBXL8N12Jo=,tag:aZsxtfEdK99+aBQS6OEwWg==,type:str] - pgp: [] + lastmodified: "2025-07-02T19:43:11Z" + mac: ENC[AES256_GCM,data:GtaZa2Ce0rr6c5rB+u2q8R8y0zDfNRbFesEnbSaQlxGjXF/6tzEfARbMhVjpjrUn7HCvNK3dbtm5QtCOFqtjyUkbS5NoelH9fdNj1SqzITuhLynxwldfkWpo0TpDf0MA3OjzxPhQz9FiIN58d94wCEhS4ma3yyPq0kvNmYopQN0=,iv:nmtkdSnSwKGNlantq6aWBQMySpkRMJ+cxdEji46DL5I=,tag:Ix0EnzWJXZzyNR4FQx5Rag==,type:str] unencrypted_suffix: _unencrypted - version: 3.9.1 + version: 3.10.2