summaryrefslogtreecommitdiff
path: root/os/kay/modules/wireguard.nix
blob: 753228039ec7d52d19bf00c8f801e0c842ff50f9 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
{ config, pkgs, lib, ... }: let
  wgInterface = "wg";
  wanInterface = "ppp0";
  subnet = "10.0.1.0";
  prefix = 24;
  port = 51820;

  wgConf = pkgs.writeText "wg.conf" ''
    [interface]
    Address = 10.0.1.1/24
    MTU = 1412
    ListenPort = 51820
    PostUp = ${lib.getExe (pkgs.writeShellApplication {
      name = "wg_set_key";
      runtimeInputs = with pkgs; [ wireguard-tools ];
      text = ''
        wg set ${wgInterface} private-key <(cat ${config.sops.secrets."misc/wireguard".path})
      '';
    })}

    [Peer]
    # friendly_name = cez
    PublicKey = IcMpAs/D0u8O/AcDBPC7pFUYSeFQXQpTqHpGOeVpjS8=
    AllowedIPs = 10.0.1.2/32

    [Peer]
    # friendly_name = veu
    PublicKey = bJ9aqGYD2Jh4MtWIL7q3XxVHFuUdwGJwO8p7H3nNPj8=
    AllowedIPs = 10.0.1.3/32

    [Peer]
    # friendly_name = dad
    PublicKey = q70IyOS2IpubIRWqo5sL3SeEjtUy2V/PT8yqVExiHTQ=
    AllowedIPs = 10.0.1.4/32

    [Peer]
    # friendly_name = pradeep
    PublicKey = BAOdbgUd53ZmQWkZP3N+zAsxdBpqv6icEwmmjRFEmxI=
    AllowedIPs = 10.0.1.5/32
  '';
in {
  sops.secrets."misc/wireguard" = {};

  networking = {
    nat = {
      enable = true;
      externalInterface = wanInterface;
      internalInterfaces = [ wgInterface ];
    };
    firewall = {
      allowedUDPPorts = [ port ];
      extraCommands = ''
        iptables -t nat -I POSTROUTING 1 \
            -s ${subnet}/${toString prefix} \
            -o ${wanInterface} \
            -j MASQUERADE
      '';
    };

    wg-quick.interfaces.${wgInterface}.configFile = builtins.toString wgConf;
  };

  services.dnsmasq.settings = {
    no-dhcp-interface = wgInterface;
    interface = [ wgInterface  ];
  };

  services.prometheus.exporters.wireguard = {
    enable = true;
    withRemoteIp = true;
    wireguardConfig = builtins.toString wgConf;
    singleSubnetPerField = true;
    listenAddress = "127.0.0.1";
  };
}