vpn v1
This commit is contained in:
@@ -28,5 +28,11 @@
|
|||||||
credentialsFile = config.age.secrets.vaultwardenCloudflared.path;
|
credentialsFile = config.age.secrets.vaultwardenCloudflared.path;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
deluge.enable = true;
|
||||||
|
wireguard-netns = {
|
||||||
|
enable = true;
|
||||||
|
namespace = "vpn";
|
||||||
|
configFile = config.age.secrets.wireguardCredentials.path;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -126,6 +126,8 @@
|
|||||||
./server/vaultwarden
|
./server/vaultwarden
|
||||||
./server/prowlarr
|
./server/prowlarr
|
||||||
./server/lidarr
|
./server/lidarr
|
||||||
|
./server/deluge
|
||||||
|
./server/wireguard-netns
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
settings = {
|
settings = {
|
||||||
|
|||||||
@@ -60,6 +60,7 @@ in {
|
|||||||
cloudflareFirewallApiKey.file = "${self}/secrets/cloudflareFirewallApiKey.age";
|
cloudflareFirewallApiKey.file = "${self}/secrets/cloudflareFirewallApiKey.age";
|
||||||
cloudflareDnsApiToken.file = "${self}/secrets/cloudflareDnsApiToken.age";
|
cloudflareDnsApiToken.file = "${self}/secrets/cloudflareDnsApiToken.age";
|
||||||
cloudflareDnsCredentials.file = "${self}/secrets/cloudflareDnsCredentials.age";
|
cloudflareDnsCredentials.file = "${self}/secrets/cloudflareDnsCredentials.age";
|
||||||
|
wgCredentials.file = "${self}/secrets/wgCredentials.age";
|
||||||
vaultwardenCloudflared.file = "${self}/secrets/vaultwardenCloudflared.age";
|
vaultwardenCloudflared.file = "${self}/secrets/vaultwardenCloudflared.age";
|
||||||
vaultwarden-env.file = "${self}/secrets/vaultwarden-env.age";
|
vaultwarden-env.file = "${self}/secrets/vaultwarden-env.age";
|
||||||
homepage-env.file = "${self}/secrets/homepage-env.age";
|
homepage-env.file = "${self}/secrets/homepage-env.age";
|
||||||
|
|||||||
@@ -58,7 +58,7 @@ in {
|
|||||||
"network-online.target"
|
"network-online.target"
|
||||||
"${ns}.service"
|
"${ns}.service"
|
||||||
];
|
];
|
||||||
services.deluged.serviceConfig.NetworkNamespacePath = ["/var/run/netns/${ns}"];
|
services.deluged.serviceConfig.NetworkNamespacePath = "/var/run/netns/${ns}";
|
||||||
sockets."deluged-proxy" = {
|
sockets."deluged-proxy" = {
|
||||||
enable = true;
|
enable = true;
|
||||||
description = "Socket for Proxy to Deluge WebUI";
|
description = "Socket for Proxy to Deluge WebUI";
|
||||||
|
|||||||
60
modules/server/wireguard-netns/default.nix
Normal file
60
modules/server/wireguard-netns/default.nix
Normal file
@@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}: let
|
||||||
|
cfg = config.server.wireguard-netns;
|
||||||
|
in {
|
||||||
|
options.server.wireguard-netns = {
|
||||||
|
enable = lib.mkEnableOption "Enable a network namespace with WireGuard VPN";
|
||||||
|
configFile = lib.mkOption {
|
||||||
|
type = lib.types.path;
|
||||||
|
description = "Path to the WireGuard configuration file (e.g., mullvad.conf)";
|
||||||
|
};
|
||||||
|
namespace = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
default = "vpn";
|
||||||
|
description = "Name of the network namespace";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
systemd.services."netns@${cfg.namespace}" = {
|
||||||
|
description = "WireGuard VPN netns (${cfg.namespace})";
|
||||||
|
after = ["network-online.target"];
|
||||||
|
wantedBy = ["multi-user.target"];
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
RemainAfterExit = true;
|
||||||
|
ExecStart = pkgs.writeShellScript "netns-${cfg.namespace}-setup" ''
|
||||||
|
set -eux
|
||||||
|
|
||||||
|
CONFIG=${cfg.configFile}
|
||||||
|
NS=${cfg.namespace}
|
||||||
|
ADDR=$(awk -F' *= *' '/^Address/ { print $2 }' "$CONFIG")
|
||||||
|
DNS=$(awk -F' *= *' '/^DNS/ { print $2 }' "$CONFIG")
|
||||||
|
|
||||||
|
# Clean up any existing netns
|
||||||
|
ip netns delete "$NS" 2>/dev/null || true
|
||||||
|
|
||||||
|
ip netns add "$NS"
|
||||||
|
ip link add wg0 type wireguard
|
||||||
|
ip link set wg0 netns "$NS"
|
||||||
|
ip -n "$NS" addr add "$ADDR" dev wg0
|
||||||
|
ip -n "$NS" link set wg0 up
|
||||||
|
ip netns exec "$NS" wg setconf wg0 "$CONFIG"
|
||||||
|
ip netns exec "$NS" ip link set lo up
|
||||||
|
ip netns exec "$NS" ip route add default dev wg0
|
||||||
|
|
||||||
|
# Set DNS
|
||||||
|
mkdir -p /etc/netns/"$NS"
|
||||||
|
echo "nameserver $DNS" > /etc/netns/"$NS"/resolv.conf
|
||||||
|
'';
|
||||||
|
ExecStop = pkgs.writeShellScript "netns-${cfg.namespace}-teardown" ''
|
||||||
|
ip netns delete ${cfg.namespace} || true
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -17,4 +17,5 @@ in {
|
|||||||
"vaultwardenCloudflared.age".publicKeys = [cnst kima usobotka rsobotka];
|
"vaultwardenCloudflared.age".publicKeys = [cnst kima usobotka rsobotka];
|
||||||
"cloudflareDnsApiToken.age".publicKeys = [cnst kima usobotka rsobotka];
|
"cloudflareDnsApiToken.age".publicKeys = [cnst kima usobotka rsobotka];
|
||||||
"cloudflareDnsCredentials.age".publicKeys = [cnst kima usobotka rsobotka];
|
"cloudflareDnsCredentials.age".publicKeys = [cnst kima usobotka rsobotka];
|
||||||
|
"wgCredentials.age".publicKeys = [cnst kima usobotka rsobotka];
|
||||||
}
|
}
|
||||||
|
|||||||
BIN
secrets/wgCredentials.age
Normal file
BIN
secrets/wgCredentials.age
Normal file
Binary file not shown.
Reference in New Issue
Block a user