feat: use seperate routing table for wg
Signed-off-by: Lander Van den Bulcke <landervandenbulcke@gmail.com>
This commit is contained in:
parent
42ed02f151
commit
2c60a915eb
1 changed files with 41 additions and 1 deletions
|
|
@ -1,4 +1,4 @@
|
||||||
{ config, ... }:
|
{ config, pkgs, ... }:
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./disk-config.nix
|
./disk-config.nix
|
||||||
|
|
@ -18,12 +18,51 @@
|
||||||
80
|
80
|
||||||
443
|
443
|
||||||
];
|
];
|
||||||
|
allowedUDPPorts = [
|
||||||
|
51820
|
||||||
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
systemd.network.networks."30-wan".address = [
|
systemd.network.networks."30-wan".address = [
|
||||||
"2a01:4f8:c013:7fc0::/64"
|
"2a01:4f8:c013:7fc0::/64"
|
||||||
];
|
];
|
||||||
|
|
||||||
|
users.groups.vpn = { };
|
||||||
|
users.users.vpn = {
|
||||||
|
isSystemUser = true;
|
||||||
|
group = "vpn";
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.iproute2 = {
|
||||||
|
enable = true;
|
||||||
|
rttablesExtraConfig = ''
|
||||||
|
133 vpn
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.services.vpn-policy-routing =
|
||||||
|
let
|
||||||
|
vpnUid = toString config.users.users.vpn.uid;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
description = "Apply policy routing rules for the 'vpn' user.";
|
||||||
|
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
|
||||||
|
after = [ "network-online.target" ];
|
||||||
|
wants = [ "network-online.target" ];
|
||||||
|
|
||||||
|
serviceConfig.type = "oneshot";
|
||||||
|
|
||||||
|
script = ''
|
||||||
|
IP_CMD="${pkgs.iproute2}/bin/ip"
|
||||||
|
$IP_CMD rule add from ${builtins.elemAt config.networking.wireguard.interfaces.wg0.ips 0} table vpn prio 200
|
||||||
|
$IP_CMD rule add uidrange ${vpnUid}-${vpnUid} table vpn prio 201
|
||||||
|
$IP_CMD -6 rule add from ${builtins.elemAt config.networking.wireguard.interfaces.wg0.ips 1} table vpn prio 200
|
||||||
|
$IP_CMD -6 rule add uidrange ${vpnUid}-${vpnUid} table vpn prio 201
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
networking.wireguard = {
|
networking.wireguard = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
||||||
|
|
@ -47,6 +86,7 @@
|
||||||
|
|
||||||
listenPort = 51820;
|
listenPort = 51820;
|
||||||
privateKeyFile = config.sops.secrets.wireguardKey.path;
|
privateKeyFile = config.sops.secrets.wireguardKey.path;
|
||||||
|
table = "133";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue