diff --git a/nixos/machines/foxhut/machine.nix b/nixos/machines/foxhut/machine.nix index d112e1e1..057d0d71 100644 --- a/nixos/machines/foxhut/machine.nix +++ b/nixos/machines/foxhut/machine.nix @@ -35,13 +35,13 @@ ]; }; - networking.firewall.allowedUDPPorts = [ 51821 ]; + networking.firewall.allowedUDPPorts = [ 51821 51820 ]; networking.wireguard = { enable = true; interfaces.wg0 = { ips = [ "192.168.69.254/32" ]; listenPort = 51821; - privateKeyFile = "/home/xenia/wireguard-keys/private"; + privateKeyFile = "/home/xenia/wireguard-keys/eta.private"; peers = [ { publicKey = "XfHU29ij76y4TB8P/QJyn1JnTl9tvxO77IGVmM6p+ic="; allowedIPs = [ "10.30.0.0/16" "10.250.0.0/16" "10.254.0.0/16" "192.168.30.0/24" "192.168.40.0/24" "192.168.50.0/24" "192.168.51.0/24" "192.168.250.0/24" ]; @@ -49,8 +49,20 @@ persistentKeepalive = 25; } ]; }; + interfaces.wg-bnuy = { + ips = [ "10.100.1.1/16" ]; + listenPort = 51820; + privateKeyFile = "/home/xenia/wireguard-keys/local-network.private"; + peers = [ { + publicKey = "Qa3saFnPTlGbxLnoyhsczczBMUGA8F/tlGsH8wnMTWY="; # https://github.com/xeniagda/cluster-config/tree/main/keys/catboy-cafe.public + allowedIPs = [ "10.100.0.0/16" ]; + endpoint = "95.80.26.48:51820"; + persistentKeepalive = 25; + } ]; + }; }; + services.pipewire.wireplumber.extraConfig."10-bluez" = { "monitor.bluez.properties" = { "bluez5.enable-sbc-xq" = true;