wireguard: add ehex vpn
This commit is contained in:
parent
b8a48cd704
commit
9616093a21
|
@ -41,4 +41,13 @@
|
|||
];
|
||||
privateKeyFile = config.age.secrets.wg-pub-solar-key.path;
|
||||
};
|
||||
|
||||
age.secrets.wg-ehex-key.file = "${flake.self}/secrets/wg-ehex-stroopwafel.age";
|
||||
|
||||
pub-solar.wireguard.ehex = {
|
||||
ownIPs = [
|
||||
"10.42.0.135/22"
|
||||
];
|
||||
privateKeyFile = config.age.secrets.wg-ehex-key.path;
|
||||
};
|
||||
}
|
||||
|
|
|
@ -8,5 +8,6 @@
|
|||
./private.nix
|
||||
./tunnel.nix
|
||||
./pub.solar.nix
|
||||
./ehex.nix
|
||||
];
|
||||
}
|
||||
|
|
74
modules/wireguard/ehex.nix
Normal file
74
modules/wireguard/ehex.nix
Normal file
|
@ -0,0 +1,74 @@
|
|||
{
|
||||
lib,
|
||||
config,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
with lib; let
|
||||
psCfg = config.pub-solar;
|
||||
cfg = config.pub-solar.wireguard.ehex;
|
||||
in {
|
||||
options.pub-solar.wireguard.ehex = {
|
||||
ownIPs = mkOption {
|
||||
description = "Internal ips in wireguard used for cluster control-plane communication.";
|
||||
type = types.listOf types.str;
|
||||
default = [];
|
||||
};
|
||||
|
||||
privateKeyFile = mkOption {
|
||||
description = "Location of private key file";
|
||||
type = types.path;
|
||||
};
|
||||
};
|
||||
|
||||
config = mkIf (length cfg.ownIPs != 0){
|
||||
networking.firewall.allowedUDPPorts = [51822];
|
||||
|
||||
systemd.network.wait-online.ignoredInterfaces = [ "wg-ehex" ];
|
||||
|
||||
systemd.services.wireguard-wg-ehex = {
|
||||
after = [
|
||||
"network.target"
|
||||
"network-online.target"
|
||||
"nss-lookup.target"
|
||||
];
|
||||
|
||||
serviceConfig = {
|
||||
Type = mkForce "simple";
|
||||
Restart = "on-failure";
|
||||
RestartSec = "30";
|
||||
};
|
||||
|
||||
environment = {
|
||||
WG_ENDPOINT_RESOLUTION_RETRIES = "infinity";
|
||||
};
|
||||
};
|
||||
|
||||
networking.wireguard.interfaces = {
|
||||
wg-ehex = {
|
||||
listenPort = 51821;
|
||||
mtu = 1300;
|
||||
ips = cfg.ownIPs;
|
||||
privateKeyFile = cfg.privateKeyFile;
|
||||
postSetup = ''
|
||||
printf "nameserver 10.0.66.10\nnameserver 10.0.66.12" | resolvconf -a wg-ehex -m 0 -x
|
||||
'';
|
||||
postShutdown = ''
|
||||
resolvconf -d wg-ehex -f
|
||||
'';
|
||||
peers = [
|
||||
{
|
||||
endpoint = "vpn-gateway.ehex.de:4242";
|
||||
publicKey = "Fsg4KEyDEvQEt/1cVWU9xa/k9x/3UhONDj61aXZ7tys=";
|
||||
presharedKey = "tQy7B5R3wOgWwIKFDcEr4WZIqCrwG+9UgPRIQx/5xso=";
|
||||
allowedIPs = [ "10.42.0.0/22" "10.0.66.0/24" ];
|
||||
persistentKeepalive = 15;
|
||||
dynamicEndpointRefreshSeconds = 30;
|
||||
# DNS = 10.0.66.10, ehex.cloud,ehex.de
|
||||
# DNS = 10.0.66.12, ehex.cloud,ehex.de
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
|
@ -93,6 +93,8 @@ in {
|
|||
|
||||
"wg-pub-solar-stroopwafel.age".publicKeys = stroopwafelKeys ++ baseKeys;
|
||||
|
||||
"wg-ehex-stroopwafel.age".publicKeys = stroopwafelKeys ++ baseKeys;
|
||||
|
||||
"invoiceplane-db-password.age".publicKeys = pieKeys ++ baseKeys;
|
||||
"invoiceplane-db-secrets.env.age".publicKeys = pieKeys ++ baseKeys;
|
||||
|
||||
|
|
BIN
secrets/wg-ehex-stroopwafel.age
Normal file
BIN
secrets/wg-ehex-stroopwafel.age
Normal file
Binary file not shown.
Loading…
Reference in a new issue