os/modules/wireguard-client/default.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

94 lines
2.1 KiB
Nix
Raw Normal View History

2023-10-19 18:55:56 +00:00
{
lib,
config,
pkgs,
...
}:
with lib; let
psCfg = config.pub-solar;
cfg = config.pub-solar.wireguard-client;
in {
options.pub-solar.wireguard-client = {
ownIPs = mkOption {
description = ''
Internal ips in wireguard used for cluster control-plane communication.
'';
type = types.listOf types.str;
};
wireguardPrivateKeyFile = mkOption {
description = ''
Location of private key file
'';
type = types.path;
};
fullTunnel = mkOption {
description = ''
Whether to tunnel all traffic through the wireguard VPN
'';
default = false;
type = types.bool;
};
2023-10-19 18:55:56 +00:00
};
config = {
networking.firewall.allowedUDPPorts = [51899];
systemd.services.wg-quick-wg0 = {
after = [
"network.target"
"network-online.target"
"nss-lookup.target"
];
serviceConfig = {
Type = mkForce "simple";
Restart = "on-failure";
RestartSec = "30";
};
environment = {
WG_ENDPOINT_RESOLUTION_RETRIES = "infinity";
};
};
2023-10-19 18:55:56 +00:00
networking.wg-quick.interfaces = {
wg0 = {
listenPort = 51899;
2023-10-19 18:55:56 +00:00
address = cfg.ownIPs;
dns = [
"10.0.1.2"
"fd00:b12f:acab:1312:acab:2::"
];
2023-10-19 18:55:56 +00:00
privateKeyFile = cfg.wireguardPrivateKeyFile;
peers = [
{
2023-10-24 15:56:14 +00:00
# frikandel
publicKey = "p6YKNYBlySKfhTN+wbSsKdoNjzko/XSAiTAlCJzP1jA=";
allowedIPs = [
"10.0.1.0/24"
2023-10-26 13:10:54 +00:00
"fd00:b12f:acab:1312::/64"
] ++ (if cfg.fullTunnel then [
"0.0.0.0/0"
"::/0"
] else []);
endpoint = "vpn.b12f.io:51899";
2023-10-19 18:55:56 +00:00
persistentKeepalive = 25;
}
{
# pie
publicKey = "hPTXEqQ2GYEywdPNdZBacwB9KKcoFZ/heClxnqmizyw=";
allowedIPs = [
"10.0.1.2/32"
"fd00:b12f:acab:1312:acab:2::/96"
];
endpoint = "pie-wg.b12f.io:51899";
persistentKeepalive = 25;
}
2023-10-19 18:55:56 +00:00
];
};
};
};
}