2022-10-10 03:13:16 +00:00
|
|
|
{ config, pkgs, lib, ... }: {
|
2022-10-09 14:12:31 +00:00
|
|
|
|
2022-10-16 03:18:58 +00:00
|
|
|
imports = [ ./secrets.nix ];
|
2022-10-09 14:12:31 +00:00
|
|
|
|
2022-10-10 03:13:16 +00:00
|
|
|
config = {
|
2022-10-09 14:12:31 +00:00
|
|
|
|
2022-10-10 03:13:16 +00:00
|
|
|
networking.wireguard = {
|
|
|
|
enable = true;
|
|
|
|
interfaces = {
|
|
|
|
wg0 = {
|
2022-10-09 14:12:31 +00:00
|
|
|
|
2022-10-10 03:13:16 +00:00
|
|
|
# Establishes identity of this machine
|
|
|
|
generatePrivateKeyFile = false;
|
2022-10-16 03:18:58 +00:00
|
|
|
privateKeyFile = config.secrets.wireguard.dest;
|
2022-10-09 14:12:31 +00:00
|
|
|
|
2022-10-10 03:13:16 +00:00
|
|
|
# Move to network namespace for isolating programs
|
|
|
|
interfaceNamespace = "wg";
|
2022-10-09 14:12:31 +00:00
|
|
|
|
2022-10-10 03:13:16 +00:00
|
|
|
};
|
2022-06-04 14:29:36 +00:00
|
|
|
};
|
2022-05-29 16:00:19 +00:00
|
|
|
};
|
2022-10-09 14:12:31 +00:00
|
|
|
|
2022-10-10 03:13:16 +00:00
|
|
|
# Create namespace for Wireguard
|
|
|
|
# This allows us to isolate specific programs to Wireguard
|
|
|
|
systemd.services."netns@" = {
|
|
|
|
description = "%I network namespace";
|
|
|
|
before = [ "network.target" ];
|
|
|
|
serviceConfig = {
|
|
|
|
Type = "oneshot";
|
|
|
|
RemainAfterExit = true;
|
|
|
|
ExecStart = "${pkgs.iproute2}/bin/ip netns add %I";
|
|
|
|
ExecStop = "${pkgs.iproute2}/bin/ip netns del %I";
|
|
|
|
};
|
2022-10-09 14:12:31 +00:00
|
|
|
};
|
|
|
|
|
2022-10-10 03:13:16 +00:00
|
|
|
# Create private key file for wireguard
|
2022-10-16 03:18:58 +00:00
|
|
|
secrets.wireguard = {
|
|
|
|
source = ../../private/wireguard.age;
|
|
|
|
dest = "${config.secretsDirectory}/wireguard";
|
2022-10-09 14:12:31 +00:00
|
|
|
};
|
2022-10-10 03:13:16 +00:00
|
|
|
|
2022-10-09 14:12:31 +00:00
|
|
|
};
|
|
|
|
|
2022-05-29 16:00:19 +00:00
|
|
|
}
|