end with netbird

This commit is contained in:
catvayor 2024-10-14 17:04:43 +02:00
parent 6dff25218b
commit 293081666b
Signed by: lbailly
GPG key ID: CE3E645251AC63F3
3 changed files with 78 additions and 54 deletions

View file

@ -2,6 +2,7 @@
config, config,
lib, lib,
pkgs, pkgs,
nodes,
sources, sources,
... ...
}: }:
@ -21,38 +22,62 @@ in
efi.canTouchEfiVariables = true; efi.canTouchEfiVariables = true;
}; };
networking = { kat.wireguardPubKey = "Znj451+hGJcPV1zFgpRMA8hg8edmUInA5zBtYBUuL3k=";
useNetworkd = lib.mkForce false; systemd.network = {
interfaces."enp1s0" = { networks = {
useDHCP = false; "10-enp1s0" = {
ipv4.addresses = [ name = "enp1s0";
{ address = [
address = "192.168.122.3"; "192.168.122.3/24"
prefixLength = 24; "fe80::3/64"
} ];
]; routes = [
ipv6.addresses = [ {
{ routeConfig = {
address = "fe80::3"; Destination = "10.42.0.2/32";
prefixLength = 64; Gateway = "192.168.122.1";
} };
]; }
];
dns = [ "192.168.122.1" ];
};
"50-wg0" = {
name = "wg0";
address = [ "10.42.2.1/16" ];
routes = [
{
routeConfig.Gateway = "10.42.0.2";
}
];
};
}; };
defaultGateway = "192.168.122.1"; netdevs = {
defaultGateway6 = { "50-wg0" = {
address = "fe80::1"; netdevConfig = {
interface = "enp1s0"; Name = "wg0";
Kind = "wireguard";
};
wireguardConfig = {
PrivateKeyFile = "/wg/private.key";
};
wireguardPeers = [
{
Endpoint = "10.42.0.2:1194";
AllowedIPs = [
"0.0.0.0/0"
];
PersistentKeepalive = 20;
PublicKey = nodes.kat-watcher.config.kat.wireguardPubKey;
}
];
};
}; };
nameservers = [
"192.168.122.1"
"fe80::1%enp1s0"
];
}; };
services = { networking.useDHCP = false;
openssh.enable = true;
netbird.enable = true; services.openssh.enable = true;
};
networking.firewall.enable = false; networking.firewall.enable = false;
@ -81,7 +106,10 @@ in
loginAccounts = { loginAccounts = {
"root@${host}" = { "root@${host}" = {
catchAll = [ host ]; catchAll = [ host ];
aliases = builtins.genList (id: "user${toString id}@${host}") 10 ++ [ "moderators@${host}" "daemon@${host}" ]; aliases = builtins.genList (id: "user${toString id}@${host}") 10 ++ [
"moderators@${host}"
"daemon@${host}"
];
hashedPassword = "$2b$05$FoCVDECXYG0KXPigPuIZtuNFiviwSg8RuXx0FbnzC7ZRp.Mz8VWOe"; hashedPassword = "$2b$05$FoCVDECXYG0KXPigPuIZtuNFiviwSg8RuXx0FbnzC7ZRp.Mz8VWOe";
}; };
}; };

View file

@ -28,18 +28,7 @@
networks = { networks = {
"50-wg0" = { "50-wg0" = {
name = "wg0"; name = "wg0";
addresses = [ address = [ "10.42.0.1/16" ];
{
Address = "10.42.0.1/16";
AddPrefixRoute = false;
}
];
routes = [
{
Destination = "10.42.0.0/16";
Source = "10.42.0.1";
}
];
}; };
}; };
netdevs = { netdevs = {
@ -72,7 +61,6 @@
]; ];
services.openssh.enable = true; services.openssh.enable = true;
services.netbird.enable = true;
programs.virt-manager.enable = true; programs.virt-manager.enable = true;
virtualisation.libvirtd.enable = true; virtualisation.libvirtd.enable = true;

View file

@ -17,11 +17,24 @@
efiInstallAsRemovable = true; efiInstallAsRemovable = true;
}; };
boot.kernel.sysctl."net.ipv4.ip_forward" = true;
kat.wireguardPubKey = "BgLBrWG7DRj2Gwoyj+vHZTjiB3gPEnwVcDFEQH/BYgg="; kat.wireguardPubKey = "BgLBrWG7DRj2Gwoyj+vHZTjiB3gPEnwVcDFEQH/BYgg=";
networking = { networking = {
useDHCP = false; useDHCP = false;
firewall.allowedUDPPorts = [ 1194 ]; firewall.allowedUDPPorts = [ 1194 ];
nftables = {
enable = true;
tables.nat = {
family = "ip";
content = ''
chain postrouting {
type nat hook postrouting priority 100;
ip saddr 10.42.0.0/16 masquerade
}
'';
};
};
}; };
systemd.network = { systemd.network = {
enable = true; enable = true;
@ -45,18 +58,7 @@
}; };
"50-wg0" = { "50-wg0" = {
name = "wg0"; name = "wg0";
addresses = [ address = [ "10.42.0.2/16" ];
{
Address = "10.42.0.2/16";
AddPrefixRoute = false;
}
];
routes = [
{
Destination = "10.42.0.0/16";
Source = "10.42.0.2";
}
];
}; };
}; };
netdevs = { netdevs = {
@ -83,6 +85,12 @@
]; ];
PublicKey = nodes.kat-probook.config.kat.wireguardPubKey; PublicKey = nodes.kat-probook.config.kat.wireguardPubKey;
} }
{
AllowedIPs = [
"10.42.2.1/32"
];
PublicKey = nodes.kat-mail-test.config.kat.wireguardPubKey;
}
]; ];
}; };
}; };