From a41037ef644dbacb3d577933fb3d93c210439b38 Mon Sep 17 00:00:00 2001 From: sinanmohd Date: Tue, 10 Jun 2025 15:55:54 +0530 Subject: chore(repo): reformat with nixfmt-rfc-style --- os/cez/modules/wireguard.nix | 30 +++++++++++++++++------------- 1 file changed, 17 insertions(+), 13 deletions(-) (limited to 'os/cez/modules/wireguard.nix') diff --git a/os/cez/modules/wireguard.nix b/os/cez/modules/wireguard.nix index c52087a..47b857a 100644 --- a/os/cez/modules/wireguard.nix +++ b/os/cez/modules/wireguard.nix @@ -1,4 +1,5 @@ -{ config, pkgs, ... }: let +{ config, pkgs, ... }: +let domain = config.global.userdata.domain; wgIface = "kay"; @@ -21,8 +22,9 @@ fi ''; }; -in { - sops.secrets."misc/wireguard" = {}; +in +{ + sops.secrets."misc/wireguard" = { }; networking.wg-quick.interfaces.${wgIface} = { autostart = false; @@ -31,16 +33,18 @@ in { mtu = 1412; privateKeyFile = config.sops.secrets."misc/wireguard".path; - peers = [{ - publicKey = "wJMyQDXmZO4MjYRk6NK4+J6ZKWLTTZygAH+OwbPjOiw="; - allowedIPs = [ - "10.0.1.0/24" - "104.16.0.0/12" - "172.64.0.0/13" - ]; - endpoint = "${domain}:51820"; - persistentKeepalive = 25; - }]; + peers = [ + { + publicKey = "wJMyQDXmZO4MjYRk6NK4+J6ZKWLTTZygAH+OwbPjOiw="; + allowedIPs = [ + "10.0.1.0/24" + "104.16.0.0/12" + "172.64.0.0/13" + ]; + endpoint = "${domain}:51820"; + persistentKeepalive = 25; + } + ]; }; environment.systemPackages = [ helper ]; -- cgit v1.2.3