63 lines
1.8 KiB
Nix
63 lines
1.8 KiB
Nix
{
|
|
lib,
|
|
config,
|
|
...
|
|
}:
|
|
let
|
|
cfg = config.pub-solar.wireguard.pub-solar;
|
|
in {
|
|
options.pub-solar.wireguard.pub-solar = {
|
|
ownIPs = lib.mkOption {
|
|
description = "Internal ips in wireguard used for cluster control-plane communication.";
|
|
type = lib.types.listOf lib.types.str;
|
|
default = [];
|
|
};
|
|
|
|
privateKeyFile = lib.mkOption {
|
|
description = "Location of private key file";
|
|
type = lib.types.path;
|
|
};
|
|
};
|
|
|
|
config = lib.mkIf (lib.length cfg.ownIPs != 0){
|
|
networking.firewall.allowedUDPPorts = [51821];
|
|
|
|
systemd.network.wait-online.ignoredInterfaces = [ "wg-pub-solar" ];
|
|
|
|
systemd.services.wireguard-wg-pub-solar = import ./service-override.nix lib;
|
|
|
|
networking.wireguard.interfaces = {
|
|
wg-pub-solar = {
|
|
listenPort = 51821;
|
|
mtu = 1300;
|
|
ips = cfg.ownIPs;
|
|
privateKeyFile = cfg.privateKeyFile;
|
|
peers = [
|
|
{
|
|
endpoint = "flora-6.pub.solar:51820";
|
|
publicKey = "jtSR5G2P/nm9s8WrVc26Xc/SQLupRxyXE+5eIeqlsTU=";
|
|
allowedIPs = [ "10.7.6.2/32" "fd00:fae:fae:fae:fae:2::/96" ];
|
|
persistentKeepalive = 15;
|
|
dynamicEndpointRefreshSeconds = 30;
|
|
}
|
|
{
|
|
endpoint = "nachtigall.pub.solar:51820";
|
|
publicKey = "qzNywKY9RvqTnDO8eLik75/SHveaSk9OObilDzv+xkk=";
|
|
allowedIPs = [ "10.7.6.1/32" "fd00:fae:fae:fae:fae:1::/96" ];
|
|
persistentKeepalive = 15;
|
|
dynamicEndpointRefreshSeconds = 30;
|
|
}
|
|
{
|
|
endpoint = "tankstelle.pub.solar:51820";
|
|
publicKey = "iRTlY1lB7nPXf2eXzX8ZZDkfMmXyGjff5/joccbP8Cg=";
|
|
allowedIPs = [
|
|
"10.7.6.4/32"
|
|
"fd00:fae:fae:fae:fae:4::/96"
|
|
];
|
|
}
|
|
];
|
|
};
|
|
};
|
|
};
|
|
}
|