wireguard: add ehex vpn

This commit is contained in:
Benjamin Yule Bädorf 2024-06-11 14:57:33 +02:00
parent b8a48cd704
commit 9616093a21
Signed by: b12f
GPG key ID: 729956E1124F8F26
5 changed files with 86 additions and 0 deletions

View file

@ -41,4 +41,13 @@
]; ];
privateKeyFile = config.age.secrets.wg-pub-solar-key.path; privateKeyFile = config.age.secrets.wg-pub-solar-key.path;
}; };
age.secrets.wg-ehex-key.file = "${flake.self}/secrets/wg-ehex-stroopwafel.age";
pub-solar.wireguard.ehex = {
ownIPs = [
"10.42.0.135/22"
];
privateKeyFile = config.age.secrets.wg-ehex-key.path;
};
} }

View file

@ -8,5 +8,6 @@
./private.nix ./private.nix
./tunnel.nix ./tunnel.nix
./pub.solar.nix ./pub.solar.nix
./ehex.nix
]; ];
} }

View file

@ -0,0 +1,74 @@
{
lib,
config,
pkgs,
...
}:
with lib; let
psCfg = config.pub-solar;
cfg = config.pub-solar.wireguard.ehex;
in {
options.pub-solar.wireguard.ehex = {
ownIPs = mkOption {
description = "Internal ips in wireguard used for cluster control-plane communication.";
type = types.listOf types.str;
default = [];
};
privateKeyFile = mkOption {
description = "Location of private key file";
type = types.path;
};
};
config = mkIf (length cfg.ownIPs != 0){
networking.firewall.allowedUDPPorts = [51822];
systemd.network.wait-online.ignoredInterfaces = [ "wg-ehex" ];
systemd.services.wireguard-wg-ehex = {
after = [
"network.target"
"network-online.target"
"nss-lookup.target"
];
serviceConfig = {
Type = mkForce "simple";
Restart = "on-failure";
RestartSec = "30";
};
environment = {
WG_ENDPOINT_RESOLUTION_RETRIES = "infinity";
};
};
networking.wireguard.interfaces = {
wg-ehex = {
listenPort = 51821;
mtu = 1300;
ips = cfg.ownIPs;
privateKeyFile = cfg.privateKeyFile;
postSetup = ''
printf "nameserver 10.0.66.10\nnameserver 10.0.66.12" | resolvconf -a wg-ehex -m 0 -x
'';
postShutdown = ''
resolvconf -d wg-ehex -f
'';
peers = [
{
endpoint = "vpn-gateway.ehex.de:4242";
publicKey = "Fsg4KEyDEvQEt/1cVWU9xa/k9x/3UhONDj61aXZ7tys=";
presharedKey = "tQy7B5R3wOgWwIKFDcEr4WZIqCrwG+9UgPRIQx/5xso=";
allowedIPs = [ "10.42.0.0/22" "10.0.66.0/24" ];
persistentKeepalive = 15;
dynamicEndpointRefreshSeconds = 30;
# DNS = 10.0.66.10, ehex.cloud,ehex.de
# DNS = 10.0.66.12, ehex.cloud,ehex.de
}
];
};
};
};
}

View file

@ -93,6 +93,8 @@ in {
"wg-pub-solar-stroopwafel.age".publicKeys = stroopwafelKeys ++ baseKeys; "wg-pub-solar-stroopwafel.age".publicKeys = stroopwafelKeys ++ baseKeys;
"wg-ehex-stroopwafel.age".publicKeys = stroopwafelKeys ++ baseKeys;
"invoiceplane-db-password.age".publicKeys = pieKeys ++ baseKeys; "invoiceplane-db-password.age".publicKeys = pieKeys ++ baseKeys;
"invoiceplane-db-secrets.env.age".publicKeys = pieKeys ++ baseKeys; "invoiceplane-db-secrets.env.age".publicKeys = pieKeys ++ baseKeys;

Binary file not shown.