os/hosts/frikandel/wireguard.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

109 lines
2.7 KiB
Nix
Raw Normal View History

2023-10-19 18:55:56 +00:00
{
flake,
config,
pkgs,
lib,
2023-10-19 18:55:56 +00:00
...
}: with lib; {
2023-10-24 15:56:14 +00:00
boot.kernel.sysctl = {
"net.ipv4.ip_forward" = 1;
2024-02-12 15:46:46 +00:00
"net.ipv6.conf.wg-private.forwarding" = 1;
"net.ipv6.conf.wg-private.accept_ra" = 1;
"net.ipv6.conf.wg-private.accept_ra_pinfo" = 1;
2023-10-24 15:56:14 +00:00
};
2023-10-19 18:55:56 +00:00
networking.nat = {
enable = true;
enableIPv6 = true;
externalInterface = "enp1s0";
2024-02-12 15:46:46 +00:00
internalInterfaces = [ "wg-private" ];
2023-10-19 18:55:56 +00:00
};
2023-10-24 15:56:14 +00:00
networking.firewall.allowedUDPPorts = [ 51899 ];
2023-10-24 15:56:14 +00:00
networking.firewall.extraForwardRules = [
2024-02-12 15:46:46 +00:00
"iifname { != wg-private } reject"
"iifname wg-private accept"
2023-10-24 15:56:14 +00:00
];
2023-10-19 18:55:56 +00:00
2024-02-12 15:46:46 +00:00
systemd.services.wireguard-wg-private = {
after = [
"network.target"
"network-online.target"
"nss-lookup.target"
];
serviceConfig = {
Type = mkForce "simple";
Restart = "on-failure";
RestartSec = "30";
};
environment = {
WG_ENDPOINT_RESOLUTION_RETRIES = "infinity";
};
};
2024-02-12 15:46:46 +00:00
age.secrets.wg-private-key.file = "${flake.self}/secrets/wg-private-frikandel-server.age";
2023-10-19 18:55:56 +00:00
# Enable WireGuard
networking.wireguard.interfaces = {
2024-02-12 15:46:46 +00:00
wg-private = {
2023-10-24 15:56:14 +00:00
listenPort = 51899;
mtu = 1300;
ips = [
"10.13.12.7/32"
"fd00:b12f:acab:1312:acab:7::/96"
];
2024-02-12 15:46:46 +00:00
privateKeyFile = config.age.secrets.wg-private-key.path;
2023-10-19 18:55:56 +00:00
peers = [
2023-10-24 15:56:14 +00:00
{ # pie
publicKey = "hPTXEqQ2GYEywdPNdZBacwB9KKcoFZ/heClxnqmizyw=";
allowedIPs = [
"10.13.12.2/32"
"fd00:b12f:acab:1312:acab:2::/96"
];
persistentKeepalive = 30;
dynamicEndpointRefreshSeconds = 30;
2023-10-24 15:56:14 +00:00
}
{ # droppie
2023-10-19 18:55:56 +00:00
publicKey = "qsnBMoj9Z16D8PJ5ummRtIfT5AiMpoF3SoOCo4sbyiw=";
allowedIPs = [
"10.13.12.3/32"
"fd00:b12f:acab:1312:acab:3::/96"
];
persistentKeepalive = 30;
dynamicEndpointRefreshSeconds = 30;
2023-10-19 18:55:56 +00:00
}
2023-10-24 15:56:14 +00:00
{ # chocolatebar
2023-10-19 18:55:56 +00:00
publicKey = "nk8EtGE/QsnSEm1lhLS3/w83nOBD2OGYhODIf92G91A=";
allowedIPs = [
"10.13.12.5/32"
"fd00:b12f:acab:1312:acab:5::/96"
];
persistentKeepalive = 30;
dynamicEndpointRefreshSeconds = 30;
2023-10-19 18:55:56 +00:00
}
2023-10-24 15:56:14 +00:00
{ # biolimo
2023-10-19 18:55:56 +00:00
publicKey = "4ymN7wwBuhF+h+5fFN0TqXmVyOe1AsWiTqRL0jJ3CDc=";
allowedIPs = [
"10.13.12.6/32"
"fd00:b12f:acab:1312:acab:6::/96"
];
persistentKeepalive = 30;
dynamicEndpointRefreshSeconds = 30;
2024-01-27 22:53:36 +00:00
}
{ # stroopwafel
publicKey = "5iNRg13utOJ30pX2Z8SjwPNUFwfH2zonlbeYW2mKFkU=";
allowedIPs = [
"10.13.12.8/32"
2024-01-27 22:53:36 +00:00
"fd00:b12f:acab:1312:acab:8::/96"
];
persistentKeepalive = 30;
dynamicEndpointRefreshSeconds = 30;
2023-10-19 18:55:56 +00:00
}
];
};
};
}