From 3ec00be4d03d32a489c969ed3dc5d354d0d80aad Mon Sep 17 00:00:00 2001 From: clerie <git@clerie.de> Date: Thu, 20 Mar 2025 19:06:51 +0100 Subject: [PATCH 01/10] profiles/wg-clerie: Migrate wg-clerie to systemd-networkd --- profiles/default.nix | 1 + profiles/wg-clerie/default.nix | 163 +++++++++++++++++++++++++++++++++ 2 files changed, 164 insertions(+) create mode 100644 profiles/wg-clerie/default.nix diff --git a/profiles/default.nix b/profiles/default.nix index 04aecfb..3daf86a 100644 --- a/profiles/default.nix +++ b/profiles/default.nix @@ -9,6 +9,7 @@ ./mercury-vm ./netcup ./network-fallback-dhcp + ./wg-clerie ]; } diff --git a/profiles/wg-clerie/default.nix b/profiles/wg-clerie/default.nix new file mode 100644 index 0000000..b6a6bf7 --- /dev/null +++ b/profiles/wg-clerie/default.nix @@ -0,0 +1,163 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let + cfg = config.profiles.clerie.wg-clerie; +in + +{ + options = { + profiles.clerie.wg-clerie = { + enable = mkEnableOption "VPN for public static IP"; + privateKeyFile = mkOption { + type = with types; nullOr str; + default = null; + description = "Path to file containing private key for wireguard interface"; + }; + ipv6s = mkOption { + type = with types; listOf str; + default = []; + description = "IPv6 interface addresses"; + }; + ipv4s = mkOption { + type = with types; listOf str; + default = []; + description = "IPv4 interface addresses"; + }; + defaultViaVPN = mkOption { + type = types.bool; + default = true; + description = "Use VPN default route for a protocol, if that protocol is unavailable in the underlay"; + }; + }; + }; + + config = mkIf cfg.enable { + + systemd.network.config.routeTables = { + wg-clerie = 200; + }; + systemd.network.config.addRouteTablesToIPRoute2 = true; + + sops.secrets.wg-clerie = { + owner = "systemd-network"; + group = "systemd-network"; + }; + + systemd.network.netdevs."10-wg-clerie" = { + netdevConfig = { + Kind = "wireguard"; + Name = "wg-clerie"; + }; + wireguardConfig = { + PrivateKeyFile = if cfg.privateKeyFile != null then cfg.privateKeyFile else + config.sops.secrets.wg-clerie.path; + RouteTable = "wg-clerie"; + }; + wireguardPeers = [ + { + PublicKey = "2p1Jqs3bkXbXHFWE6vp1yxHIFoUaZQEARS2nJzbkuBA="; + AllowedIPs = [ "0.0.0.0/0" "::/0" "10.20.30.0/24" "2a01:4f8:c0c:15f1::/113" ]; + Endpoint = "78.47.183.82:51820"; + PersistentKeepalive = 25; + } + ]; + }; + + systemd.network.networks."10-wg-clerie" = { + matchConfig.Name = "wg-clerie"; + address = cfg.ipv6s ++ cfg.ipv4s; + routingPolicyRules = (builtins.map + (ip: { + Priority = 19000; + Family = "ipv6"; + From = ip; + #Type = "table"; + Table = "wg-clerie"; + }) + cfg.ipv6s + ) ++ (builtins.map + (ip: { + Priority = 19001; + Family = "ipv6"; + From = ip; + Type = "unreachable"; + }) + cfg.ipv6s + ) ++ (builtins.map + (ip: { + Priority = 19000; + Family = "ipv4"; + From = ip; + #Type = "table"; + Table = "wg-clerie"; + }) + cfg.ipv4s + ) ++ (builtins.map + (ip: { + Priority = 19001; + Family = "ipv4"; + From = ip; + Type = "unreachable"; + }) + cfg.ipv4s + ) ++ [ + { + Priority = 20000; + Family = "ipv6"; + To = "2a01:4f8:c0c:15f1::1/128"; + IPProtocol = "udp"; + DestinationPort = 51820; + #Type = "table"; + Table = "main"; + } + { + Priority = 20001; + Family = "ipv6"; + To = "2a01:4f8:c0c:15f1::1/128"; + IPProtocol = "udp"; + DestinationPort = 51820; + Type = "unreachable"; + } + { + Priority = 20000; + Family = "ipv4"; + To = "78.47.183.82/32"; + IPProtocol = "udp"; + DestinationPort = 51820; + #Type = "table"; + Table = "main"; + } + { + Priority = 20001; + Family = "ipv4"; + To = "78.47.183.82/32"; + IPProtocol = "udp"; + DestinationPort = 51820; + Type = "unreachable"; + } + { + Priority = 21000; + Family = "both"; + #Type = "table"; + Table = "main"; + } + ] ++ (if cfg.defaultViaVPN then [ + { + Priority = 21001; + Family = "both"; + #Type = "table"; + Table = "wg-clerie"; + } + ] else []) ++ [ + { + Priority = 22000; + Family = "both"; + Type = "unreachable"; + } + ]; + }; + + }; +} From effb386e518ed79fd34f7a81892cd26f88564613 Mon Sep 17 00:00:00 2001 From: clerie <git@clerie.de> Date: Thu, 20 Mar 2025 19:30:10 +0100 Subject: [PATCH 02/10] profiles/wg-clerie: Only configure sops secret if we want to use that --- profiles/wg-clerie/default.nix | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/profiles/wg-clerie/default.nix b/profiles/wg-clerie/default.nix index b6a6bf7..a845187 100644 --- a/profiles/wg-clerie/default.nix +++ b/profiles/wg-clerie/default.nix @@ -40,10 +40,12 @@ in }; systemd.network.config.addRouteTablesToIPRoute2 = true; - sops.secrets.wg-clerie = { - owner = "systemd-network"; - group = "systemd-network"; - }; + sops = (mkIf (cfg.privateKeyFile == null) { + secrets.wg-clerie = { + owner = "systemd-network"; + group = "systemd-network"; + }; + }); systemd.network.netdevs."10-wg-clerie" = { netdevConfig = { From 5a719c2f01546bbeef546620b85140bf73b03bd8 Mon Sep 17 00:00:00 2001 From: clerie <git@clerie.de> Date: Thu, 20 Mar 2025 19:30:47 +0100 Subject: [PATCH 03/10] hosts/astatine,hosts/beryllium,hosts/tungsten: Migrate to profiles.clerie.wg-clerie --- hosts/astatine/configuration.nix | 11 ++++----- hosts/beryllium/configuration.nix | 40 +++++-------------------------- hosts/tungsten/configuration.nix | 10 ++++---- 3 files changed, 16 insertions(+), 45 deletions(-) diff --git a/hosts/astatine/configuration.nix b/hosts/astatine/configuration.nix index ea8cac3..72ad6bd 100644 --- a/hosts/astatine/configuration.nix +++ b/hosts/astatine/configuration.nix @@ -19,14 +19,13 @@ "; networking.useDHCP = false; - systemd.network.enable = true; - #services.wg-clerie = { - # enable = true; - # ipv6s = [ "2a01:4f8:c0c:15f1::8108/128" ]; - # ipv4s = [ "10.20.30.108/32" ]; - #}; + profiles.clerie.wg-clerie = { + enable = true; + ipv6s = [ "2a01:4f8:c0c:15f1::8108/128" ]; + ipv4s = [ "10.20.30.108/32" ]; + }; clerie.monitoring = { enable = true; diff --git a/hosts/beryllium/configuration.nix b/hosts/beryllium/configuration.nix index 15235da..274d44c 100644 --- a/hosts/beryllium/configuration.nix +++ b/hosts/beryllium/configuration.nix @@ -25,40 +25,12 @@ networking.firewall.enable = false; - #networking.iproute2.enable = true; - #networking.iproute2.rttablesExtraConfig = '' - # 200 wg-clerie - #''; - - #petabyte.policyrouting = { - # enable = true; - # rules6 = [ - # { rule = "from 2a01:4f8:c0c:15f1::8107/128 lookup wg-clerie"; prio = 20000; } - # { rule = "from 2a01:4f8:c0c:15f1::8107/128 unreachable"; prio = 20001; } - # ]; - # rules4 = [ - # { rule = "from 10.20.30.107/32 lookup wg-clerie"; prio = 20000; } - # { rule = "from 10.20.30.107/32 unreachable"; prio = 20001; } - # ]; - #}; - - - #networking.wireguard.enable = true; - #networking.wireguard.interfaces = { - # wg-clerie = { - # ips = [ "2a01:4f8:c0c:15f1::8107/128" "10.20.30.107/32" ]; - # table = "wg-clerie"; - # peers = [ - # { - # endpoint = "vpn.clerie.de:51820"; - # persistentKeepalive = 25; - # allowedIPs = [ "0.0.0.0/0" "::/0" "10.20.30.0/24" "2a01:4f8:c0c:15f1::/113" ]; - # publicKey = "2p1Jqs3bkXbXHFWE6vp1yxHIFoUaZQEARS2nJzbkuBA="; - # } - # ]; - # privateKeyFile = "/var/src/secrets/wireguard/wg-clerie"; - # }; - #}; + profiles.clerie.wg-clerie = { + enable = true; + ipv6s = [ "2a01:4f8:c0c:15f1::8107/128" ]; + ipv4s = [ "10.20.30.107/32" ]; + privateKeyFile = "/var/src/secrets/wireguard/wg-clerie"; + }; clerie.monitoring = { enable = true; diff --git a/hosts/tungsten/configuration.nix b/hosts/tungsten/configuration.nix index f1028db..2751f57 100644 --- a/hosts/tungsten/configuration.nix +++ b/hosts/tungsten/configuration.nix @@ -23,11 +23,11 @@ networking.hostName = "tungsten"; - #services.wg-clerie = { - # enable = true; - # ipv6s = [ "2a01:4f8:c0c:15f1::8112/128" ]; - # ipv4s = [ "10.20.30.112/32" ]; - #}; + profiles.clerie.wg-clerie = { + enable = true; + ipv6s = [ "2a01:4f8:c0c:15f1::8112/128" ]; + ipv4s = [ "10.20.30.112/32" ]; + }; clerie.monitoring = { enable = true; From 2d6afc20939461a93469da99ed905048d19209cc Mon Sep 17 00:00:00 2001 From: clerie <git@clerie.de> Date: Thu, 20 Mar 2025 19:43:57 +0100 Subject: [PATCH 04/10] profiles/wg-clerie: wg-clerie not required for online --- profiles/wg-clerie/default.nix | 1 + 1 file changed, 1 insertion(+) diff --git a/profiles/wg-clerie/default.nix b/profiles/wg-clerie/default.nix index a845187..2bbd26a 100644 --- a/profiles/wg-clerie/default.nix +++ b/profiles/wg-clerie/default.nix @@ -70,6 +70,7 @@ in systemd.network.networks."10-wg-clerie" = { matchConfig.Name = "wg-clerie"; address = cfg.ipv6s ++ cfg.ipv4s; + linkConfig.RequiredForOnline = "no"; routingPolicyRules = (builtins.map (ip: { Priority = 19000; From a29978c95aa687084dd78eac865c51eba44554ec Mon Sep 17 00:00:00 2001 From: clerie <git@clerie.de> Date: Thu, 20 Mar 2025 19:44:35 +0100 Subject: [PATCH 05/10] hosts/astatine: Migrate to systemd-network --- hosts/aluminium/configuration.nix | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/hosts/aluminium/configuration.nix b/hosts/aluminium/configuration.nix index 6651cfd..87d0aa0 100644 --- a/hosts/aluminium/configuration.nix +++ b/hosts/aluminium/configuration.nix @@ -18,7 +18,10 @@ terminal_output serial "; - services.wg-clerie = { + networking.useDHCP = false; + systemd.network.enable = true; + + profiles.clerie.wg-clerie = { enable = true; ipv6s = [ "2a01:4f8:c0c:15f1::8106/128" ]; ipv4s = [ "10.20.30.106/32" ]; From 7a210b13be98ee1f83701657efbc92072fd92e71 Mon Sep 17 00:00:00 2001 From: clerie <git@clerie.de> Date: Thu, 20 Mar 2025 19:46:54 +0100 Subject: [PATCH 06/10] hosts/_iso: Migrate to systemd-network --- hosts/_iso/configuration.nix | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/hosts/_iso/configuration.nix b/hosts/_iso/configuration.nix index d971c32..b4af756 100644 --- a/hosts/_iso/configuration.nix +++ b/hosts/_iso/configuration.nix @@ -6,11 +6,16 @@ ../../configuration/gpg-ssh ]; + profiles.clerie.network-fallback-dhcp.enable = true; + # systemd in initrd is broken with ISOs # Failed to mount /sysroot/iso # https://github.com/NixOS/nixpkgs/issues/327187 boot.initrd.systemd.enable = false; + networking.useDHCP = false; + systemd.network.enable = true; + networking.hostName = "isowo"; isoImage.isoBaseName = lib.mkForce "nixos-isowo"; From fed25f02d85b14733c1d0ddaf86b04cf0d349803 Mon Sep 17 00:00:00 2001 From: clerie <git@clerie.de> Date: Thu, 20 Mar 2025 19:55:17 +0100 Subject: [PATCH 07/10] profiles/wg-clerie: Don't let NetworkManager touch the VPN interface --- profiles/wg-clerie/default.nix | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/profiles/wg-clerie/default.nix b/profiles/wg-clerie/default.nix index 2bbd26a..9ae527e 100644 --- a/profiles/wg-clerie/default.nix +++ b/profiles/wg-clerie/default.nix @@ -47,6 +47,10 @@ in }; }); + networking.networkmanager.unmanaged = [ + "interface-name:wg-clerie" + ]; + systemd.network.netdevs."10-wg-clerie" = { netdevConfig = { Kind = "wireguard"; From de3bc903efc802d85b3252b09cc4d9b116170f17 Mon Sep 17 00:00:00 2001 From: clerie <git@clerie.de> Date: Thu, 20 Mar 2025 20:03:39 +0100 Subject: [PATCH 08/10] profiles/common-networking: Centralize new network config --- profiles/common-networking/default.nix | 24 ++++++++++++++++++++++++ profiles/default.nix | 1 + 2 files changed, 25 insertions(+) create mode 100644 profiles/common-networking/default.nix diff --git a/profiles/common-networking/default.nix b/profiles/common-networking/default.nix new file mode 100644 index 0000000..4a3b3b5 --- /dev/null +++ b/profiles/common-networking/default.nix @@ -0,0 +1,24 @@ +{ config, lib, ... }: + +with lib; + +{ + + options.profiles.clerie.common-networking = { + enable = mkEnableOption "Common networking config"; + }; + + config = mkIf config.profiles.clerie.common-networking.enable { + + # Disable scripted network + networking.useDHCP = false; + # Enable systemd-networkd + systemd.network.enable = true; + + # Don't wait for online, if NetworkManger is running too + systemd.network.wait-online = mkIf (config.networking.networkmanager.enable == true) { + enable = false; + }; + + }; +} diff --git a/profiles/default.nix b/profiles/default.nix index 3daf86a..56cb944 100644 --- a/profiles/default.nix +++ b/profiles/default.nix @@ -3,6 +3,7 @@ { imports = [ + ./common-networking ./cybercluster-vm ./fem-net ./hetzner-cloud From 9e7deadfb50591546027f1f4d64a6abb25560610 Mon Sep 17 00:00:00 2001 From: clerie <git@clerie.de> Date: Thu, 20 Mar 2025 20:07:06 +0100 Subject: [PATCH 09/10] hosts/krypton,hosts/zinc: Migrate to systemd-network --- hosts/krypton/network.nix | 4 +++- hosts/zinc/configuration.nix | 4 +++- 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/hosts/krypton/network.nix b/hosts/krypton/network.nix index 4197c76..fb71faf 100644 --- a/hosts/krypton/network.nix +++ b/hosts/krypton/network.nix @@ -1,7 +1,9 @@ { ... }: { - services.wg-clerie = { + profiles.clerie.common-networking.enable = true; + + profiles.clerie.wg-clerie = { enable = true; ipv6s = [ "2a01:4f8:c0c:15f1::8011/128" ]; ipv4s = [ "10.20.30.11/32" ]; diff --git a/hosts/zinc/configuration.nix b/hosts/zinc/configuration.nix index 13a428a..07c0747 100644 --- a/hosts/zinc/configuration.nix +++ b/hosts/zinc/configuration.nix @@ -11,6 +11,8 @@ ./programs.nix ]; + profiles.clerie.common-networking.enable = true; + # Use the systemd-boot EFI boot loader. boot.loader.systemd-boot.enable = true; boot.loader.efi.canTouchEfiVariables = true; @@ -25,7 +27,7 @@ boot.initrd.systemd.enable = false; - services.wg-clerie = { + profiles.clerie.wg-clerie = { enable = true; ipv6s = [ "2a01:4f8:c0c:15f1::8109/128" ]; ipv4s = [ "10.20.30.109/32" ]; From b9dd198835041f06a382f9a253d8367fd5e3a5c0 Mon Sep 17 00:00:00 2001 From: Flake Update Bot <flake-update-bot@clerie.de> Date: Fri, 21 Mar 2025 03:04:03 +0100 Subject: [PATCH 10/10] Update nixpkgs 2025-03-21-02-03 --- flake.lock | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/flake.lock b/flake.lock index e7345fc..e8dd9f5 100644 --- a/flake.lock +++ b/flake.lock @@ -533,11 +533,11 @@ }, "nixpkgs_3": { "locked": { - "lastModified": 1742069588, - "narHash": "sha256-C7jVfohcGzdZRF6DO+ybyG/sqpo1h6bZi9T56sxLy+k=", + "lastModified": 1742422364, + "narHash": "sha256-mNqIplmEohk5jRkqYqG19GA8MbQ/D4gQSK0Mu4LvfRQ=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "c80f6a7e10b39afcc1894e02ef785b1ad0b0d7e5", + "rev": "a84ebe20c6bc2ecbcfb000a50776219f48d134cc", "type": "github" }, "original": {