XNGFJHLQT32DYH52PZRADH5EQDY7HRNEJ472IP4FNWL45NYO6LNAC
66COC6TI5UGIYQMWHOTONDBSH63AQYAHYP5UKYZR65Y6VEVJIPZQC
RHDO6BBKT5SL2IER3BMB3RO7FF7HCKVSOHYO3C7KCVEVVZPVVV2QC
6TJTI7RQ5QVCBPW6BKPUL6XUFWUIMXH774UAFCHACDJQWDMPSZNQC
BSONDEQ66PXQ4K57M4WDAH77Y2RTCVUS5C2ZPROTIJHSAQJYPPJQC
SQW3L5DJGHETLQDNSZ5ZTXR5KBF35HLJIDGRRAGOBNDPNJXXVEOQC
4IUIQWLQY3WHRAGFP5TXB4AO4AXD2ZVK7IS257UYCY6XYOSUYURAC
UIVGUJCHU6JKX6FSEVA553CNNMZAMTTLLNBWQEA4L43BECZND6BAC
6JAZSTWHYD5WOY5KLRXWKUSQQHJY5LV7KB26XYHSIKG7XVJDJVVAC
ZRJNPDNXM2XBDKJH4I4WFFNGFVWGFDPWRKAICRN45CMYRR5VADZAC
LCU2Y6NLRNRKR4R2YHQH5G6LJXG4UZZOMFEV7C5B2BDQPC45E5YAC
XYVOW54TWIJYX7VDWOTXFNM27C2ODJKTGUZ3LXVDURPHHLBKXS6QC
GGKSPLOM4NMOFIKWY5DUIYUL7QFU4UQ54GWS2ER7Z3R3YW4SKVRQC
},
"locked": {
"lastModified": 1637793790,
"narHash": "sha256-oPXavjxETEWGXq8g7kQHyRLKUmLX2yPtGn+t3V0mrTY=",
"owner": "ryantm",
"repo": "agenix",
"rev": "f85eea0e29fa9a8924571d0e398215e175f80d55",
"type": "github"
},
"original": {
"owner": "ryantm",
"repo": "agenix",
"type": "github"
}
},
"home-manager": {
"inputs": {
"nixpkgs": "nixpkgs_2"
"lastModified": 1634436779,
"narHash": "sha256-D/nrXTWpe1bPIjFy85sgiLHYqu+AeaC6v5/+KlA9PRg=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "9aeeb7574fb784eaf6395f4400705b5f619e6cc3",
"type": "github"
"lastModified": 1618628710,
"narHash": "sha256-9xIoU+BrCpjs5nfWcd/GlU7XCVdnNKJPffoNTxgGfhs=",
"path": "/nix/store/z1rf17q0fxj935cmplzys4gg6nxj1as0-source",
"rev": "7919518f0235106d050c77837df5e338fb94de5d",
"type": "path"
"locked": {
"lastModified": 1634436779,
"narHash": "sha256-D/nrXTWpe1bPIjFy85sgiLHYqu+AeaC6v5/+KlA9PRg=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "9aeeb7574fb784eaf6395f4400705b5f619e6cc3",
"type": "github"
},
"original": {
"id": "nixpkgs",
"type": "indirect"
}
},
"nixpkgs_3": {
let
coding_server = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIuYCV7NwqlACA5rp8WH4lerKB8M9Ci3jucyW0hhQLfD";
in {
"wireguard/private.key".publicKeys = [coding_server];
}
OdVMF/vEnyFYAOYU8Rfl+0ubW14TVfZUU5HGUV8sGzY=
# Configure network proxy if necessary
# networking.proxy.default = "http://user:password@proxy:port/";
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
networking.nat = {
enable = true;
externalInterface = "ens18";
internalInterfaces = ["wg0"];
};
networking.wireguard.interfaces = {
wg0 = {
ips = ["10.0.100.1/24"];
listenPort = 51820;
privateKeyFile = config.age.secrets."wireguard/private.key".path;
peers = [
];
};
};
age.secrets."wireguard/private.key".file = ../../secrets/wireguard/private.key;