2023-05-23 21:32:38 +01:00
|
|
|
{ lib, pkgs, config, assignments, ... }:
|
|
|
|
let
|
|
|
|
inherit (lib) mkMerge mkIf;
|
|
|
|
inherit (lib.my) networkdAssignment;
|
2024-06-21 21:42:17 +01:00
|
|
|
inherit (lib.my.c.kelder) ipv4MTU;
|
2023-05-23 21:32:38 +01:00
|
|
|
|
|
|
|
wg = {
|
2023-09-07 00:05:30 +01:00
|
|
|
keyFile = "kelder/acquisition/airvpn-privkey";
|
|
|
|
pskFile = "kelder/acquisition/airvpn-psk";
|
2023-05-23 21:32:38 +01:00
|
|
|
fwMark = 42;
|
|
|
|
routeTable = 51820;
|
|
|
|
};
|
|
|
|
|
2023-09-07 00:05:30 +01:00
|
|
|
# Forwarded in AirVPN config
|
|
|
|
transmissionPeerPort = 26180;
|
2023-05-23 21:32:38 +01:00
|
|
|
in
|
|
|
|
{
|
|
|
|
config = mkMerge [
|
|
|
|
{
|
|
|
|
my = {
|
|
|
|
secrets = {
|
2023-09-07 00:05:30 +01:00
|
|
|
files = {
|
|
|
|
"${wg.keyFile}" = {
|
|
|
|
group = "systemd-network";
|
|
|
|
mode = "440";
|
|
|
|
};
|
|
|
|
"${wg.pskFile}" = {
|
|
|
|
group = "systemd-network";
|
|
|
|
mode = "440";
|
|
|
|
};
|
2023-05-23 21:32:38 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
firewall = {
|
|
|
|
extraRules = ''
|
|
|
|
# Make sure that VPN connections are dropped (except for the Transmission port)
|
|
|
|
table inet filter {
|
|
|
|
chain tcp-ext {
|
|
|
|
tcp dport ${toString transmissionPeerPort} accept
|
|
|
|
iifname vpn return
|
|
|
|
|
|
|
|
tcp dport { 9091, 9117, 7878, 8989, 8096 } accept
|
|
|
|
return
|
|
|
|
}
|
|
|
|
chain input {
|
|
|
|
tcp flags & (fin|syn|rst|ack) == syn ct state new jump tcp-ext
|
|
|
|
}
|
|
|
|
}
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
|
|
wireguard-tools
|
|
|
|
];
|
|
|
|
|
|
|
|
services = {
|
|
|
|
transmission.settings.peer-port = transmissionPeerPort;
|
|
|
|
};
|
|
|
|
|
|
|
|
systemd = {
|
|
|
|
network = {
|
|
|
|
netdevs."30-vpn" = with wg; {
|
|
|
|
netdevConfig = {
|
|
|
|
Name = "vpn";
|
|
|
|
Kind = "wireguard";
|
2023-09-07 00:05:30 +01:00
|
|
|
# Specified by AirVPN
|
|
|
|
MTUBytes = "1320";
|
2023-05-23 21:32:38 +01:00
|
|
|
};
|
|
|
|
wireguardConfig = {
|
|
|
|
PrivateKeyFile = config.age.secrets."${keyFile}".path;
|
|
|
|
FirewallMark = fwMark;
|
|
|
|
RouteTable = routeTable;
|
|
|
|
};
|
|
|
|
wireguardPeers = [
|
2024-11-30 17:45:59 +00:00
|
|
|
# AirVPN IE
|
2023-05-23 21:32:38 +01:00
|
|
|
{
|
2024-11-30 17:45:59 +00:00
|
|
|
Endpoint = "146.70.94.2:1637";
|
|
|
|
PublicKey = "PyLCXAQT8KkM4T+dUsOQfn+Ub3pGxfGlxkIApuig+hk=";
|
|
|
|
PresharedKeyFile = config.age.secrets."${pskFile}".path;
|
|
|
|
AllowedIPs = [ "0.0.0.0/0" "::/0" ];
|
2023-05-23 21:32:38 +01:00
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
networks = {
|
|
|
|
"80-container-host0" = mkMerge [
|
|
|
|
(networkdAssignment "host0" assignments.internal)
|
|
|
|
{
|
|
|
|
networkConfig.DNSDefaultRoute = false;
|
2024-06-21 21:42:17 +01:00
|
|
|
linkConfig.MTUBytes = toString ipv4MTU;
|
2023-05-23 21:32:38 +01:00
|
|
|
}
|
|
|
|
];
|
|
|
|
"90-vpn" = with wg; {
|
|
|
|
matchConfig.Name = "vpn";
|
2023-09-07 00:05:30 +01:00
|
|
|
address = [ "10.161.170.28/32" "fd7d:76ee:e68f:a993:b12d:6d15:c80a:9516/128" ];
|
|
|
|
dns = [ "10.128.0.1" "fd7d:76ee:e68f:a993::1" ];
|
2024-11-30 17:45:59 +00:00
|
|
|
routingPolicyRules = [
|
2023-05-23 21:32:38 +01:00
|
|
|
{
|
|
|
|
Family = "both";
|
|
|
|
SuppressPrefixLength = 0;
|
|
|
|
Table = "main";
|
|
|
|
Priority = 100;
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2023-11-02 13:41:50 +00:00
|
|
|
From = lib.my.c.kelder.prefixes.all.v4;
|
2023-05-23 21:32:38 +01:00
|
|
|
Table = "main";
|
|
|
|
Priority = 100;
|
|
|
|
}
|
|
|
|
{
|
2023-11-02 13:41:50 +00:00
|
|
|
To = lib.my.c.kelder.prefixes.all.v4;
|
2023-05-23 21:32:38 +01:00
|
|
|
Table = "main";
|
|
|
|
Priority = 100;
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
Family = "both";
|
|
|
|
InvertRule = true;
|
|
|
|
FirewallMark = fwMark;
|
|
|
|
Table = routeTable;
|
|
|
|
Priority = 110;
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|
|
|
|
(mkIf config.my.build.isDevVM {
|
|
|
|
virtualisation = {
|
|
|
|
forwardPorts = [
|
|
|
|
# Transmission
|
|
|
|
{ from = "host"; host.port = 9091; guest.port = 9091; }
|
|
|
|
# Jackett
|
|
|
|
{ from = "host"; host.port = 9117; guest.port = 9117; }
|
|
|
|
# Radarr
|
|
|
|
{ from = "host"; host.port = 7878; guest.port = 7878; }
|
|
|
|
# Sonarr
|
|
|
|
{ from = "host"; host.port = 8989; guest.port = 8989; }
|
|
|
|
# Jellyfin
|
|
|
|
{ from = "host"; host.port = 8096; guest.port = 8096; }
|
|
|
|
];
|
|
|
|
};
|
|
|
|
})
|
|
|
|
];
|
|
|
|
}
|