about summary refs log tree commit diff
path: root/nix/private-wireguard.nix
blob: 8e5d74cff48394d02f3b23dbf938f8bbbe3677fc (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
{ lib, hostname, config, ... }:

let
  inherit (lib) mkEnableOption mkOption mkIf types;
  inherit (builtins) readFile fromTOML fromJSON;
  secrets = config.age.secrets;
  cfg = config.networking.private-wireguard;
  port = 51871;
  wgcfg = fromTOML (readFile ./../configs/wireguard.toml);
  allPeers = wgcfg.peers;
  thisPeer = allPeers."${hostname}" or null;
  otherPeers = lib.filterAttrs (n: v: n != hostname) allPeers;
in
{
  options.networking.private-wireguard = {
    enable = mkEnableOption "Enable private wireguard vpn connection";
  };

  config = lib.mkIf cfg.enable {
    networking = {
      wireguard.interfaces.wg0 = {
        listenPort = port;
        privateKeyFile = secrets."wireguard_privatekey".path;
        ips = [
          "${wgcfg.subnet4}.${toString thisPeer.ipv4}/${toString wgcfg.mask4}"
        ];

        peers = lib.mapAttrsToList
          (name: peer:
            {
              allowedIPs = [
                "${wgcfg.subnet4}.${toString peer.ipv4}/${toString wgcfg.mask4}"
              ];
              publicKey = peer.key;
            } // lib.optionalAttrs (peer ? externalIp) {
              endpoint = "${peer.externalIp}:${toString port}";
            } // lib.optionalAttrs (!(thisPeer ? externalIp)) {
              persistentKeepalive = 10;
            })
          otherPeers;
      };
    };
  };
}