2023-10-19 18:55:56 +00:00
|
|
|
{
|
|
|
|
lib,
|
|
|
|
config,
|
|
|
|
pkgs,
|
|
|
|
...
|
|
|
|
}:
|
|
|
|
with lib; let
|
|
|
|
psCfg = config.pub-solar;
|
|
|
|
cfg = config.pub-solar.wireguard-client;
|
|
|
|
in {
|
|
|
|
options.pub-solar.wireguard-client = {
|
|
|
|
ownIPs = mkOption {
|
|
|
|
description = ''
|
|
|
|
Internal ips in wireguard used for cluster control-plane communication.
|
|
|
|
'';
|
|
|
|
type = types.listOf types.str;
|
|
|
|
};
|
|
|
|
|
|
|
|
wireguardPrivateKeyFile = mkOption {
|
|
|
|
description = ''
|
|
|
|
Location of private key file
|
|
|
|
'';
|
|
|
|
type = types.path;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
config = {
|
|
|
|
networking.firewall.allowedUDPPorts = [51899];
|
|
|
|
|
|
|
|
networking.wg-quick.interfaces = {
|
|
|
|
wg0 = {
|
2023-10-19 22:47:11 +00:00
|
|
|
listenPort = 51899;
|
2023-10-19 18:55:56 +00:00
|
|
|
address = cfg.ownIPs;
|
2023-10-25 11:23:13 +00:00
|
|
|
dns = [
|
|
|
|
"10.0.1.2"
|
|
|
|
"fd00:b12f:acab:1312:acab:2::"
|
|
|
|
];
|
2023-10-19 18:55:56 +00:00
|
|
|
privateKeyFile = cfg.wireguardPrivateKeyFile;
|
|
|
|
peers = [
|
|
|
|
{
|
2023-10-24 15:56:14 +00:00
|
|
|
# frikandel
|
|
|
|
publicKey = "p6YKNYBlySKfhTN+wbSsKdoNjzko/XSAiTAlCJzP1jA=";
|
2023-10-25 11:23:13 +00:00
|
|
|
allowedIPs = [
|
|
|
|
"10.0.1.0/24"
|
2023-10-26 13:10:54 +00:00
|
|
|
"fd00:b12f:acab:1312::/64"
|
2023-10-25 11:23:13 +00:00
|
|
|
];
|
2023-11-01 15:27:29 +00:00
|
|
|
endpoint = "vpn.b12f.io:51899";
|
2023-10-19 18:55:56 +00:00
|
|
|
persistentKeepalive = 25;
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|