Signed-off-by: Lander Van den Bulcke <landervandenbulcke@gmail.com>
104 lines
2.2 KiB
Nix
104 lines
2.2 KiB
Nix
{ config, pkgs, ... }:
|
|
{
|
|
imports = [
|
|
./disk-config.nix
|
|
{
|
|
_module.args.disks = [ "/dev/sda" ];
|
|
}
|
|
|
|
../common/servers
|
|
];
|
|
|
|
time.timeZone = "Europe/Berlin";
|
|
|
|
networking.hostName = "hosting-02";
|
|
networking.firewall = {
|
|
enable = true;
|
|
allowedTCPPorts = [
|
|
80
|
|
443
|
|
];
|
|
allowedUDPPorts = [
|
|
51820
|
|
];
|
|
};
|
|
|
|
systemd.network.networks."30-wan".address = [
|
|
"2a01:4f8:c013:7fc0::/64"
|
|
];
|
|
|
|
users.groups.vpn = { };
|
|
users.users.vpn = {
|
|
isSystemUser = true;
|
|
group = "vpn";
|
|
};
|
|
|
|
networking.iproute2 = {
|
|
enable = true;
|
|
rttablesExtraConfig = ''
|
|
133 vpn
|
|
'';
|
|
};
|
|
|
|
systemd.services.vpn-policy-routing =
|
|
let
|
|
vpnUid = toString config.users.users.vpn.uid;
|
|
in
|
|
{
|
|
description = "Apply policy routing rules for the 'vpn' user.";
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
after = [ "network-online.target" ];
|
|
wants = [ "network-online.target" ];
|
|
|
|
serviceConfig.type = "oneshot";
|
|
|
|
script = ''
|
|
IP_CMD="${pkgs.iproute2}/bin/ip"
|
|
$IP_CMD rule add from ${builtins.elemAt config.networking.wireguard.interfaces.wg0.ips 0} table vpn prio 200
|
|
$IP_CMD rule add uidrange ${vpnUid}-${vpnUid} table vpn prio 201
|
|
$IP_CMD -6 rule add from ${builtins.elemAt config.networking.wireguard.interfaces.wg0.ips 1} table vpn prio 200
|
|
$IP_CMD -6 rule add uidrange ${vpnUid}-${vpnUid} table vpn prio 201
|
|
'';
|
|
};
|
|
|
|
networking.wireguard = {
|
|
enable = true;
|
|
|
|
interfaces.wg0 = {
|
|
ips = [
|
|
"10.64.244.95/32"
|
|
"fc00:bbbb:bbbb:bb01::1:f45e/128"
|
|
];
|
|
|
|
peers = [
|
|
{
|
|
publicKey = "KkShcqgwbkX2A9n1hhST6qu+m3ldxdJ2Lx8Eiw6mdXw=";
|
|
allowedIPs = [
|
|
"0.0.0.0/0"
|
|
"::0/0"
|
|
];
|
|
endpoint = "146.70.117.226:51820";
|
|
persistentKeepalive = 25;
|
|
}
|
|
];
|
|
|
|
listenPort = 51820;
|
|
privateKeyFile = config.sops.secrets.wireguardKey.path;
|
|
table = "133";
|
|
};
|
|
};
|
|
|
|
sops.secrets = {
|
|
wireguardKey = {
|
|
owner = "root";
|
|
sopsFile = ./secrets.yaml;
|
|
};
|
|
};
|
|
|
|
security.acme.defaults.email = "landervandenbulcke@gmail.com";
|
|
security.acme.acceptTerms = true;
|
|
|
|
system.stateVersion = "25.05";
|
|
}
|