From b39b258bff828c37093aee3c243839942582c1e8 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Aleix=20Bon=C3=A9?= Date: Wed, 1 Oct 2025 16:48:47 +0200 Subject: [PATCH] Allow access to hut from fox --- m/apex/wireguard.nix | 2 +- m/fox/wireguard.nix | 5 +++-- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/m/apex/wireguard.nix b/m/apex/wireguard.nix index 4721d2df..e1335149 100644 --- a/m/apex/wireguard.nix +++ b/m/apex/wireguard.nix @@ -20,7 +20,7 @@ { name = "fox"; publicKey = "VfMPBQLQTKeyXJSwv8wBhc6OV0j2qAxUpX3kLHunK2Y="; - allowedIPs = [ "10.106.0.1/32" ]; + allowedIPs = [ "10.106.0.1/32" "10.0.40.0/24" ]; endpoint = "fox.ac.upc.edu:666"; # Send keepalives every 25 seconds. Important to keep NAT tables alive. persistentKeepalive = 25; diff --git a/m/fox/wireguard.nix b/m/fox/wireguard.nix index 7a55c2e9..f93c3e41 100644 --- a/m/fox/wireguard.nix +++ b/m/fox/wireguard.nix @@ -23,11 +23,11 @@ peers = [ # List of allowed peers. - { + { name = "apex"; publicKey = "VwhcN8vSOzdJEotQTpmPHBC52x3Hbv1lkFIyKubrnUA="; # List of IPs assigned to this peer within the tunnel subnet. Used to configure routing. - allowedIPs = [ "10.106.0.30/32" ]; + allowedIPs = [ "10.106.0.30/32" "10.0.40.7/32" ]; } { name = "raccoon"; @@ -40,6 +40,7 @@ networking.hosts = { "10.106.0.30" = [ "apex" ]; + "10.0.40.7" = [ "hut" ]; "10.106.0.236" = [ "raccoon" ]; "10.0.44.4" = [ "tent" ]; };