flake/modules/services/wgautomesh.nix

84 lines
2.4 KiB
Nix
Raw Normal View History

{
config,
pkgs,
lib,
cfg,
...
2024-11-12 03:46:56 +01:00
}: let
prefix = "lyn";
2024-11-13 05:15:14 +01:00
# decrypt gossip secret
# change this to comply with you secret management
gossip_secret_path = config.sops.secrets."all/meshnetwork/gossip_secret".path;
# function to make a peerlist suitable for wgautomesh
buildPeerlist = version: hosts: let
#filter out hosts that have wg.enabled set to false
wgEnabledHosts = lib.filterAttrs (_: host: host.wg.enabled or false) hosts;
#filter out hosts that don't support IP{$version}
2024-11-13 23:17:28 +01:00
filteredHosts = lib.filterAttrs (_: host: host.${version} != null) wgEnabledHosts;
in
lib.mapAttrsToList (name: host: {
pubkey = host.wg.pubkey;
#if there is no public IP, make endpoint null so wgautomesh knows it unknown
endpoint =
if host.${version}.public == ""
then null
else "${host.${version}.public}:${toString host.wg.port}";
address = host.${version}.internal;
})
filteredHosts;
2024-11-12 03:46:56 +01:00
# helper vars to prettify
2024-11-13 05:15:14 +01:00
meshnetwork = config.${prefix}.network;
currentHost = meshnetwork.hosts.${config.networking.hostName};
2024-11-12 03:46:56 +01:00
wireguardPort = currentHost.wg.port;
in {
opt.useIPv6 = lib.mkOption {
type = lib.types.bool;
description = "Whether to use IPv6. Defaults to true";
default = true;
};
2024-11-13 20:30:39 +01:00
config = {
networking.firewall = {
allowedUDPPorts = [
wireguardPort
];
extraCommands = ''
# Allow UDP packets comming from port 1900 from a local address,
# these are necessary for UPnP/IGD
iptables -A INPUT -s 192.168.0.0/16 -p udp --sport 1900 -j ACCEPT
'';
extraStopCommands = ''
iptables -D INPUT -s 192.168.0.0/16 -p udp --sport 1900 -j ACCEPT
'';
};
2024-11-14 01:48:38 +01:00
2024-11-13 20:30:39 +01:00
networking.wireguard.interfaces.wg0 = {
ips =
2024-11-12 01:52:07 +01:00
if cfg.useIPv6
2024-11-20 21:39:42 +01:00
then ["${currentHost.IPv6}/64"]
else ["${currentHost.IPv4}/24"];
2024-11-13 21:08:27 +01:00
listenPort = wireguardPort;
2024-11-13 20:30:39 +01:00
privateKeyFile = "/var/lib/wireguard-keys/private";
2024-11-14 01:48:38 +01:00
mtu = 1200;
2024-11-13 20:30:39 +01:00
};
2024-11-13 20:30:39 +01:00
services.wgautomesh = {
enable = true;
settings = {
2024-11-13 20:30:39 +01:00
interface = "wg0";
peers =
if cfg.useIPv6
2024-11-20 21:39:42 +01:00
then buildPeerlist "IPv6" meshnetwork.hosts
else buildPeerlist "IPv4" meshnetwork.hosts;
2024-11-13 20:30:39 +01:00
upnp_forward_external_port = wireguardPort;
};
gossipSecretFile = gossip_secret_path;
#DEBUG
logLevel = "trace";
};
};
}