wireguard: initial setup

This commit is contained in:
Katherina Walshe-Grey 2024-07-19 19:26:36 +01:00
parent 35563b1b07
commit c60728e7aa
10 changed files with 99 additions and 4 deletions

View file

@ -4,6 +4,7 @@
imports = [
./hardware-configuration.nix
./home.nix
./wireguard.nix
];
boot.loader.systemd-boot.enable = true;

33
hosts/orm/wireguard.nix Normal file
View file

@ -0,0 +1,33 @@
{ config, lib, pkgs, ... }:
{
age.secrets.wireguard-hub.file = ../../secrets/wireguard-hub.age;
networking = {
nat = {
enable = true;
externalInterface = "ens3";
internalInterfaces = [ "wg0" ];
};
firewall.allowedUDPPorts = [ config.networking.wireguard.interfaces.wg0.listenPort ];
wireguard.interfaces.wg0 = {
ips = [ "10.127.1.1/24" "fd70:81ca:0f8f:1::1/64" ];
listenPort = 51820;
privateKeyFile = config.age.secrets.wireguard-hub.path;
peers = [
{
name = "shaw";
publicKey = "eD79pROC2zjhKz4tGRS43O95gcFRqO+SFb2XDnTr0zc=";
allowedIPs = [ "10.127.1.2" "fd70:81ca:0f8f:1::2" ];
}
{
name = "tohru";
publicKey = "lk3PCQM1jmZoI8sM/rWSyKNuZOUnjox3n9L9geJD+18=";
allowedIPs = [ "10.127.1.3" "fd70:81ca:0f8f:1::3" ];
}
];
};
};
}

View file

@ -9,6 +9,7 @@
../../services/fonts.nix
../../services/steam.nix
./syncthing.nix
./wireguard.nix
];
boot.loader.systemd-boot.enable = true;

23
hosts/tohru/wireguard.nix Normal file
View file

@ -0,0 +1,23 @@
{ config, lib, pkgs, ... }:
{
age.secrets.wireguard-peer-tohru.file = ../../secrets/wireguard-peer-tohru.age;
networking = {
firewall.allowedUDPPorts = [ config.networking.wireguard.interfaces.wg0.listenPort ];
wireguard.interfaces.wg0 = {
ips = [ "10.127.1.3/24" "fd70:81ca:0f8f:1::3/64" ];
listenPort = 51821;
privateKeyFile = config.age.secrets.wireguard-peer-tohru.path;
peers = [
{
publicKey = "birdLVh8roeZpcVo308Ums4l/aibhAxbi7MBsglkJyA=";
allowedIPs = [ "10.127.1.0/24" "fd70:81ca:0f8f:1::/64" ];
endpoint = "birdsong.network:51820";
persistentKeepalive = 23;
}
];
};
};
}

19
secrets.nix Normal file
View file

@ -0,0 +1,19 @@
let
keys = import ./keys.nix;
commonKeys = keys.users.qenya;
secrets = with keys; {
wireguard-hub = [ machines.orm ];
wireguard-peer-orm = [ machines.orm ];
wireguard-peer-tohru = [ machines.tohru ];
};
in
builtins.listToAttrs (
map
(secretName: {
name = "secrets/${secretName}.age";
value.publicKeys = secrets."${secretName}" ++ commonKeys;
})
(builtins.attrNames secrets)
)

View file

@ -1,4 +0,0 @@
let
keys = ../ssh-keys.nix;
in
{ }

10
secrets/wireguard-hub.age Normal file
View file

@ -0,0 +1,10 @@
age-encryption.org/v1
-> ssh-ed25519 l/RSAw +h2Jz8m9ZEklGxWK8HcixO3+D4AVATPI3m3wE1ITviM
US+J+FDPJ/nmLT1ylRGfXyfjiJRgLpdgCg1L3IPrmrc
-> ssh-ed25519 900ILw bX/KdX53EFQCmWI0MU/wKfzqKmAw+/fMs4/955iYOlw
7epwHu5g+p6BHe/ksaA9MAvpneZBwHeqnMtSc1m3FFY
-> !V-grease &x6T2i d0B}!
tkT/G8gEKyx280vDO1QgG5ERBCkR9XCgk8IIE1AeBONi9eo+Z0sGfNHv2DXFx14B
TcKX31wDmUbtv8j+4d7722YeZ4jvKiSuQA38zLREOGJyhA
--- TR/GFMXQ4N6AMuScg8LSednd6jAJugxgCJLegPtFmgI
4>?(Yë×Ã|R5V¡×ù«  ôן4<C5B8>Å'æ[¤K<5F>ë,ϧ —ÅT²Ïkº5öåTC~c×*D[N䃼Þá<ê

View file

@ -0,0 +1 @@
birdLVh8roeZpcVo308Ums4l/aibhAxbi7MBsglkJyA=

View file

@ -0,0 +1,10 @@
age-encryption.org/v1
-> ssh-ed25519 yZzWlg HKjvqxwrKVDSKuKcog2RTryVc+0vWII6DdFuouffNWs
fPlYoR4wSrGPlX3t11J1YSP3yToM2RjJVfLKM4oATxA
-> ssh-ed25519 900ILw f76/jY251hkNMd3fBVZPuoWleh4ZdSdu95p7WDlmZi4
iSULkGxw9aokMgv59fhW3LzJR/Dpx+LVCc6jbbPwCgU
-> vdo-grease
8NUae81gLW0x8UoCVKqQUZaqkG8FTXwnysjEgXaEGBgDxjpuTp+C5qWczNYAXOFN
ha3mtF6IYHFHBZKsH0t1366nfYDAQXHOuu0hN4GBBz8gqnUt
--- uB1k+yMkL5ZUHXGSDv8ZPHDn0UfHOv1x3tRa2eIdbP8
締Eュセ暈Y3ホタD㎡e/兎4呼G[lQ=C<05>ヤ錏<EFBE94>oテvェ枯ソ<E69EAF>z<EFBFBD>寥キ/nbチ<1C>a・_<EFBDA5>ムhクチホヨ{A{ィ

View file

@ -0,0 +1 @@
lk3PCQM1jmZoI8sM/rWSyKNuZOUnjox3n9L9geJD+18=