feat: wireguard test

This commit is contained in:
Nick 2025-07-01 16:37:21 -05:00
parent d7360e2e63
commit f9e0ffb400
2 changed files with 3 additions and 2 deletions

View file

@ -47,7 +47,7 @@ in
"${configHelpers.host}" = { "${configHelpers.host}" = {
extraConfig = '' extraConfig = ''
@allowed_ips { @allowed_ips {
remote_ip ${mars.wireguard.ip0} 192.168.50.1 remote_ip ${mars.wireguard.ip0}
} }
handle @allowed_ips { handle @allowed_ips {
@ -56,7 +56,7 @@ in
reverse_proxy ${ceres.wireguard.ip0}:${toString configHelpers.service.ports.port0} reverse_proxy ${ceres.wireguard.ip0}:${toString configHelpers.service.ports.port0}
} }
handle { handle {
respond "Your IP: {remote_host}" 200 respond "Access Denied" 403
} }
tls ${configHelpers.service.ssl.cert} ${configHelpers.service.ssl.key} tls ${configHelpers.service.ssl.cert} ${configHelpers.service.ssl.key}
''; '';

View file

@ -16,6 +16,7 @@ in
allowedIPs = [ allowedIPs = [
"${ceres.wireguard.ip0}/32" "${ceres.wireguard.ip0}/32"
"${web.localhost.address4}/24" "${web.localhost.address4}/24"
"${web.remotehost.address0}/32"
]; ];
endpoint = "${web.remotehost.address0}:${builtins.toString service.ports.port1}"; endpoint = "${web.remotehost.address0}:${builtins.toString service.ports.port1}";
persistentKeepalive = 25; persistentKeepalive = 25;