114 lines
2.7 KiB
Nix
114 lines
2.7 KiB
Nix
{ config, pkgs, lib, inputs, ... }:
|
|
with lib;
|
|
let
|
|
cfg = config.custom.services.wireguard;
|
|
in
|
|
{
|
|
options.custom.services.wireguard = {
|
|
enable = mkEnableOption "Enables wireguard";
|
|
ip = lib.mkOption {
|
|
default = "192.168.2.1";
|
|
type = types.str;
|
|
description = "ipv4 address";
|
|
};
|
|
};
|
|
config =
|
|
let
|
|
wireguardIp = cfg.ip;
|
|
in lib.mkIf cfg.enable {
|
|
|
|
age.secrets.wireguard-private = {
|
|
file = ../../secrets/wireguard-private.age;
|
|
};
|
|
|
|
networking.nat.enable = true;
|
|
networking.nat.externalInterface = "eth0";
|
|
networking.nat.internalInterfaces = [ "wg0" ];
|
|
networking.firewall.allowedUDPPorts = [ 51820 ];
|
|
|
|
networking.wg-quick.interfaces = {
|
|
wg0 = {
|
|
autostart = true;
|
|
listenPort = 51820;
|
|
address = [
|
|
"${wireguardIp}/24"
|
|
];
|
|
peers = [
|
|
{
|
|
allowedIPs = [
|
|
"192.168.2.2/32"
|
|
];
|
|
publicKey = "YgecbWSNRqOmylYqxr/V21LL3UpKEr5x42lXPAxriSc=";
|
|
}
|
|
{
|
|
allowedIPs = [
|
|
"192.168.2.3/32"
|
|
];
|
|
publicKey = "Eg5ZS3zN05mJ/gct6wJlwVAHTlXpkhxFfUd7yscANV0=";
|
|
}
|
|
# detschn pc
|
|
{
|
|
allowedIPs = [
|
|
"192.168.2.4/32"
|
|
];
|
|
publicKey = "8Eigfs+k2k2WPaMn+SqDmlSHdMv+I+xcBr/2qhtpGzI=";
|
|
}
|
|
# detschn laptop
|
|
{
|
|
allowedIPs = [
|
|
"192.168.2.5/32"
|
|
];
|
|
publicKey = "g5uTlA1IciXgtSbECjhVis0dajRAc53Oa7Hz6dUI+0Q=";
|
|
}
|
|
{
|
|
allowedIPs = [
|
|
"192.168.2.6/32"
|
|
];
|
|
publicKey = "5ClF2HcqndpXS7nVgDn2unWFUYcKo5fbudV6xX2OIVE=";
|
|
}
|
|
# handy
|
|
{
|
|
allowedIPs = [
|
|
"192.168.2.20/32"
|
|
];
|
|
publicKey = "25u1RSfjsx3wb1DMeTm0pvUfUkG7zTjGaN+m0w6ZjCw=";
|
|
}
|
|
{
|
|
allowedIPs = [
|
|
"192.168.2.21/32"
|
|
];
|
|
publicKey = "S+8F+yxSQvjjoU44LRYqRv1YulqmOKumUtYo/YIh7X8=";
|
|
}
|
|
# laptop
|
|
{
|
|
allowedIPs = [
|
|
"192.168.2.22/32"
|
|
];
|
|
publicKey = "/dIW7K49vB9HOghFeXvcY7wu2utQltuv6RfgCbxZwlk=";
|
|
}
|
|
{
|
|
allowedIPs = [
|
|
"192.168.2.23/32"
|
|
];
|
|
publicKey = "89rjQXNcyCRUCihqfqcOnctWmhiNR8snpRFF6dyHAmk=";
|
|
}
|
|
{
|
|
allowedIPs = [
|
|
"192.168.2.24/32"
|
|
];
|
|
publicKey = "adaWtboVz3UhpNBKFirs7slbU2+Y3GaV5yS2EoafwVU=";
|
|
}
|
|
# raphi
|
|
{
|
|
allowedIPs = [
|
|
"192.168.2.25/32"
|
|
];
|
|
publicKey = "AGBWzMeSTxmB3jwNdROYHbyiqhhAVyofMV5Ku5JIE1A=";
|
|
}
|
|
];
|
|
privateKeyFile = config.age.secrets.wireguard-private.path;
|
|
};
|
|
};
|
|
};
|
|
}
|