2021-02-20 19:56:33 +01:00
|
|
|
{ lib, config, pkgs, ... }:
|
2020-12-05 14:39:36 +01:00
|
|
|
let
|
2021-02-20 19:03:40 +01:00
|
|
|
serverHostName = "vueko";
|
|
|
|
peers = {
|
|
|
|
issei = {
|
|
|
|
address = "10.80.0.1";
|
|
|
|
publicKey = "UyZRAVTIc/RMs/J+591wrA8lHU0e8dwDJJwcpRb3xQA=";
|
|
|
|
};
|
|
|
|
nunotaba = {
|
|
|
|
address = "10.80.0.4";
|
|
|
|
publicKey = "DvR8mUkll4uyYhNcX82caMkbcw0Lykg8zDzm/3PD5jw=";
|
|
|
|
};
|
|
|
|
sayuri = {
|
|
|
|
address = "10.80.0.5";
|
|
|
|
publicKey = "t7hpd2yZupAKHxYerHtXnlPRUjV1aGbrrzjYakKdOwE=";
|
|
|
|
};
|
|
|
|
vueko = {
|
|
|
|
address = "10.80.0.6";
|
|
|
|
publicKey = "JbOfL4FxPCzJOjI8AGklPHY2FniCXq0QwOa08gjSyns=";
|
|
|
|
};
|
|
|
|
fuuko = {
|
|
|
|
address = "10.80.0.7";
|
|
|
|
publicKey = "VXic8mhaJBSl6yFkx0Cu6JI8tqqjjM3UbW7x+05pV0M=";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2020-12-05 14:39:36 +01:00
|
|
|
cfg = config.sbruder.wireguard.home;
|
2021-02-20 19:03:40 +01:00
|
|
|
enableServer = config.networking.hostName == serverHostName;
|
2020-12-05 14:39:36 +01:00
|
|
|
in
|
2020-08-22 17:44:39 +02:00
|
|
|
{
|
2020-12-05 14:39:36 +01:00
|
|
|
options = {
|
|
|
|
sbruder.wireguard.home = {
|
|
|
|
enable = lib.mkEnableOption "WireGuard tunnel wg-home";
|
|
|
|
address = lib.mkOption {
|
|
|
|
type = lib.types.str;
|
2021-02-20 19:03:40 +01:00
|
|
|
visible = false;
|
|
|
|
readOnly = true;
|
2020-12-05 14:39:36 +01:00
|
|
|
};
|
2020-08-22 17:44:39 +02:00
|
|
|
};
|
|
|
|
};
|
2020-12-05 14:39:36 +01:00
|
|
|
|
2021-01-06 13:09:29 +01:00
|
|
|
config = lib.mkIf cfg.enable {
|
|
|
|
krops.secrets.wg-home-private-key = { };
|
|
|
|
|
2021-02-20 19:03:40 +01:00
|
|
|
sbruder.wireguard.home.address = peers."${config.networking.hostName}".address;
|
|
|
|
|
2021-01-06 13:09:29 +01:00
|
|
|
networking.wireguard.interfaces.wg-home = {
|
|
|
|
privateKeyFile = config.krops.secrets.wg-home-private-key.path;
|
|
|
|
ips = [ "${cfg.address}/24" ];
|
2021-02-20 19:03:40 +01:00
|
|
|
listenPort = if enableServer then 51820 else null;
|
|
|
|
peers =
|
|
|
|
if enableServer
|
|
|
|
then
|
|
|
|
map
|
|
|
|
(peerConfig: with peerConfig; {
|
|
|
|
allowedIPs = [ "${address}/32" ];
|
|
|
|
inherit publicKey;
|
|
|
|
})
|
|
|
|
(lib.attrValues
|
|
|
|
(lib.filterAttrs
|
|
|
|
(n: v: n != config.networking.hostName)
|
|
|
|
peers))
|
|
|
|
else [
|
|
|
|
{
|
|
|
|
allowedIPs = [ "10.80.0.0/24" ];
|
|
|
|
publicKey = peers."${serverHostName}".publicKey;
|
|
|
|
endpoint = "${serverHostName}.sbruder.de:51820";
|
|
|
|
persistentKeepalive = 25;
|
|
|
|
}
|
|
|
|
];
|
2021-01-06 13:09:29 +01:00
|
|
|
};
|
2021-01-18 00:05:18 +01:00
|
|
|
|
2021-02-20 19:03:40 +01:00
|
|
|
networking.firewall = {
|
|
|
|
trustedInterfaces = [ "wg-home" ];
|
2021-02-20 19:56:33 +01:00
|
|
|
allowedUDPPorts = lib.optionals enableServer [
|
|
|
|
51820
|
|
|
|
53
|
|
|
|
];
|
2021-02-20 19:03:40 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
boot.kernel.sysctl = lib.optionalAttrs enableServer {
|
|
|
|
"net.ipv4.ip_forward" = 1;
|
|
|
|
};
|
2021-02-20 19:56:33 +01:00
|
|
|
|
|
|
|
services.bind = lib.mkIf enableServer {
|
|
|
|
enable = true;
|
|
|
|
zones = lib.singleton {
|
|
|
|
name = "vpn.sbruder.de";
|
|
|
|
file =
|
|
|
|
let
|
|
|
|
# !!! very hacky
|
|
|
|
hexStringToInt = hex: (builtins.fromTOML "int = 0x${hex}").int;
|
|
|
|
|
|
|
|
peerRecords = lib.concatStrings
|
|
|
|
(lib.mapAttrsToList
|
|
|
|
(peer: peerConfig: ''
|
|
|
|
${peer} IN A ${peerConfig.address}
|
|
|
|
'')
|
|
|
|
peers);
|
|
|
|
|
|
|
|
peerRecordsHash = builtins.hashString "sha256" peerRecords;
|
|
|
|
serial = hexStringToInt (lib.substring 0 8 peerRecordsHash);
|
|
|
|
in
|
|
|
|
pkgs.writeText "vpn.sbruder.de.zone" (''
|
|
|
|
$TTL 3600
|
|
|
|
@ IN SOA ${serverHostName}.sbruder.de. hostmaster.sbruder.de. ${toString serial} 28800 3600 604800 3600
|
|
|
|
@ IN NS ${serverHostName}.sbruder.de.
|
|
|
|
'' + peerRecords);
|
|
|
|
};
|
|
|
|
};
|
2020-12-05 14:39:36 +01:00
|
|
|
};
|
2020-08-22 17:44:39 +02:00
|
|
|
}
|