Enable wireguard in apex
Reviewed-by: Aleix Roca Nonell <aleix.rocanonell@bsc.es>
This commit is contained in:
		
							parent
							
								
									e415f70bbb
								
							
						
					
					
						commit
						e366e6ce87
					
				| @ -7,6 +7,7 @@ | |||||||
|     ../module/ceph.nix |     ../module/ceph.nix | ||||||
|     ../module/slurm-server.nix |     ../module/slurm-server.nix | ||||||
|     ./nfs.nix |     ./nfs.nix | ||||||
|  |     ./wireguard.nix | ||||||
|   ]; |   ]; | ||||||
| 
 | 
 | ||||||
|   # Don't install grub MBR for now |   # Don't install grub MBR for now | ||||||
|  | |||||||
							
								
								
									
										31
									
								
								m/apex/wireguard.nix
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										31
									
								
								m/apex/wireguard.nix
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,31 @@ | |||||||
|  | { config, ... }: | ||||||
|  | 
 | ||||||
|  | { | ||||||
|  |   networking.firewall = { | ||||||
|  |     allowedUDPPorts = [ 666 ]; | ||||||
|  |   }; | ||||||
|  | 
 | ||||||
|  |   age.secrets.wgApex.file = ../../secrets/wg-apex.age; | ||||||
|  | 
 | ||||||
|  |   # Enable WireGuard | ||||||
|  |   networking.wireguard.enable = true; | ||||||
|  |   networking.wireguard.interfaces = { | ||||||
|  |     # "wg0" is the network interface name. You can name the interface arbitrarily. | ||||||
|  |     wg0 = { | ||||||
|  |       ips = [ "10.100.0.30/24" ]; | ||||||
|  |       listenPort = 666; | ||||||
|  |       privateKeyFile = config.age.secrets.wgApex.path; | ||||||
|  |       # Public key: VwhcN8vSOzdJEotQTpmPHBC52x3Hbv1lkFIyKubrnUA= | ||||||
|  |       peers = [ | ||||||
|  |         { | ||||||
|  |           name = "Fox"; | ||||||
|  |           publicKey = "VfMPBQLQTKeyXJSwv8wBhc6OV0j2qAxUpX3kLHunK2Y="; | ||||||
|  |           allowedIPs = [ "10.100.0.0/24" ]; | ||||||
|  |           endpoint = "fox.ac.upc.edu:666"; | ||||||
|  |           # Send keepalives every 25 seconds. Important to keep NAT tables alive. | ||||||
|  |           persistentKeepalive = 25; | ||||||
|  |         } | ||||||
|  |       ]; | ||||||
|  |     }; | ||||||
|  |   }; | ||||||
|  | } | ||||||
| @ -3,6 +3,7 @@ let | |||||||
|   adminsKeys = builtins.attrValues keys.admins; |   adminsKeys = builtins.attrValues keys.admins; | ||||||
|   hut = [ keys.hosts.hut ] ++ adminsKeys; |   hut = [ keys.hosts.hut ] ++ adminsKeys; | ||||||
|   fox = [ keys.hosts.fox ] ++ adminsKeys; |   fox = [ keys.hosts.fox ] ++ adminsKeys; | ||||||
|  |   apex = [ keys.hosts.apex ] ++ adminsKeys; | ||||||
|   mon = [ keys.hosts.hut keys.hosts.tent ] ++ adminsKeys; |   mon = [ keys.hosts.hut keys.hosts.tent ] ++ adminsKeys; | ||||||
|   tent = [ keys.hosts.tent ] ++ adminsKeys; |   tent = [ keys.hosts.tent ] ++ adminsKeys; | ||||||
|   # Only expose ceph keys to safe nodes and admins |   # Only expose ceph keys to safe nodes and admins | ||||||
| @ -27,4 +28,5 @@ in | |||||||
|   "munge-key.age".publicKeys = safe; |   "munge-key.age".publicKeys = safe; | ||||||
| 
 | 
 | ||||||
|   "wg-fox.age".publicKeys = fox; |   "wg-fox.age".publicKeys = fox; | ||||||
|  |   "wg-apex.age".publicKeys = apex; | ||||||
| } | } | ||||||
|  | |||||||
							
								
								
									
										13
									
								
								secrets/wg-apex.age
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										13
									
								
								secrets/wg-apex.age
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,13 @@ | |||||||
|  | age-encryption.org/v1 | ||||||
|  | -> ssh-ed25519 fw2Xhg CO3xkQZ+Tzej6VOQg8GoGYMdRWP0s0w55S7PeZ/zq0o | ||||||
|  | P119jX3o3ZdD+Dg/ehVIEsWdSCbmYksLDt4k4dovgl8 | ||||||
|  | -> ssh-ed25519 cK5kHw B9d+pwXxt8jDV+6WvHOxUQuwpYF4mHUoGPQaD7niuX4 | ||||||
|  | RxYK+0r28qTULJKaZiSQC5yqsi/BYTZ40TSIhpwxCk0 | ||||||
|  | -> ssh-ed25519 CAWG4Q akKCzdpc/17zOdLknTawmpJw3GuTLXjDlZz8CQg3hGE | ||||||
|  | 011OH3AnEmm36xg0p7FvHOL1xVpMllUf6lqs4BSUVeA | ||||||
|  | -> ssh-ed25519 xA739A hv9vYtwBhrospLhJ5SQoNDkZx+blfYKZ/I40frj/u1Y | ||||||
|  | s6KY1l2d6dEQouLbwL1Y56kC0Up9Tp1dmW91LYNYKjs | ||||||
|  | -> ssh-ed25519 MSF3dg ehzqonjVpx3NFaxmSQc66VxkZEU5n7aiIOvuwYrl7wI | ||||||
|  | yME0q4b5F9/eKJlNg+0sGuGTGp58UoNAf+MI8pj2faM | ||||||
|  | --- KC628nslyddv5xZwh4DUj1nGqMx/mW+txSnYCjFRODY | ||||||
|  | <EFBFBD>dl¸¢[ï´”ëêb<>ú^ÙŽ“-šl¥æà¸+õò“ÜТÞFf¨uÜÞöÚ‘ðnüHLµK	ÉííðÚ^÷—¹1ƒË2V¦©j[ | ||||||
		Reference in New Issue
	
	Block a user