]> Git — Sourcephile - sourcephile-nix.git/blob - hosts/mermet/networking/wireguard.nix
transmission: do not disable transmission.timer (it would not retrigger)
[sourcephile-nix.git] / hosts / mermet / networking / wireguard.nix
1 { pkgs, lib, config, hosts, hostName, wireguard, ... }:
2 let
3 inherit (builtins) hasAttr removeAttrs;
4 inherit (config.security.gnupg) secrets;
5 wg = "wg-intra";
6 peers = lib.filterAttrs (peerName: host:
7 hasAttr "${wg}" host.extraArgs.wireguard
8 ) (removeAttrs hosts [hostName]);
9 in
10 {
11 security.gnupg.secrets."wireguard/${wg}/privateKey" = {};
12 systemd.services."wireguard-${wg}" = {
13 after = [ secrets."wireguard/${wg}/privateKey".service ];
14 requires = [ secrets."wireguard/${wg}/privateKey".service ];
15 };
16 networking.nftables.ruleset = ''
17 # Allow peers to initiate connection for ${wg}
18 add rule inet filter net2fw udp dport ${toString wireguard."${wg}".listenPort} counter accept comment "${wg}"
19
20 # Hook ${wg} into relevant chains
21 add rule inet filter input iifname "${wg}" jump intra2fw
22 add rule inet filter input iifname "${wg}" log level warn prefix "intra2fw: " counter drop
23 add rule inet filter output oifname "${wg}" jump fw2intra
24 add rule inet filter output oifname "${wg}" log level warn prefix "fw2intra: " counter drop
25
26 # ${wg} firewalling
27 add rule inet filter fw2intra counter accept
28 add rule inet filter intra2fw ip saddr ${hosts.losurdo.extraArgs.wireguard."${wg}".ipv4} counter accept comment "losurdo"
29 '';
30 networking.wireguard.interfaces."${wg}" = {
31 ips = [ "${wireguard."${wg}".ipv4}/24" ];
32 listenPort = wireguard."${wg}".listenPort;
33 privateKeyFile = secrets."wireguard/${wg}/privateKey".path;
34 peers = lib.mapAttrsToList (peerName: host: host.extraArgs.wireguard."${wg}".peer) peers;
35 };
36 networking.hosts = lib.mapAttrs' (hostName: host: lib.nameValuePair
37 host.extraArgs.wireguard."${wg}".ipv4
38 [ "${hostName}.intranet" ]
39 ) peers;
40 }