mirror of
https://git.in.rschanz.org/ryan77627/guix.git
synced 2025-01-11 13:49:23 -05:00
services: wireguard: Allow specifying pre-shared keys.
* gnu/services/vpn.scm (<wireguard-peer>)[preshared-key]: New field. * doc/guix.texi (VPN Services): Document it. Signed-off-by: Mathieu Othacehe <othacehe@gnu.org>
This commit is contained in:
parent
f81c05d89b
commit
2967abf1a2
2 changed files with 18 additions and 1 deletions
|
@ -31770,6 +31770,10 @@ The optional endpoint for the peer, such as
|
||||||
@item @code{public-key}
|
@item @code{public-key}
|
||||||
The peer public-key represented as a base64 string.
|
The peer public-key represented as a base64 string.
|
||||||
|
|
||||||
|
@item @code{preshared-key} (default: @code{#f})
|
||||||
|
An optional pre-shared key file for this peer. The given file will not
|
||||||
|
be autogenerated.
|
||||||
|
|
||||||
@item @code{allowed-ips}
|
@item @code{allowed-ips}
|
||||||
A list of IP addresses from which incoming traffic for this peer is
|
A list of IP addresses from which incoming traffic for this peer is
|
||||||
allowed and to which incoming traffic for this peer is directed.
|
allowed and to which incoming traffic for this peer is directed.
|
||||||
|
|
|
@ -10,6 +10,7 @@
|
||||||
;;; Copyright © 2021 jgart <jgart@dismail.de>
|
;;; Copyright © 2021 jgart <jgart@dismail.de>
|
||||||
;;; Copyright © 2021 Nathan Dehnel <ncdehnel@gmail.com>
|
;;; Copyright © 2021 Nathan Dehnel <ncdehnel@gmail.com>
|
||||||
;;; Copyright © 2022 Cameron V Chaparro <cameron@cameronchaparro.com>
|
;;; Copyright © 2022 Cameron V Chaparro <cameron@cameronchaparro.com>
|
||||||
|
;;; Copyright © 2022 Timo Wilken <guix@twilken.net>
|
||||||
;;;
|
;;;
|
||||||
;;; This file is part of GNU Guix.
|
;;; This file is part of GNU Guix.
|
||||||
;;;
|
;;;
|
||||||
|
@ -61,6 +62,7 @@ (define-module (gnu services vpn)
|
||||||
wireguard-peer-endpoint
|
wireguard-peer-endpoint
|
||||||
wireguard-peer-allowed-ips
|
wireguard-peer-allowed-ips
|
||||||
wireguard-peer-public-key
|
wireguard-peer-public-key
|
||||||
|
wireguard-peer-preshared-key
|
||||||
wireguard-peer-keep-alive
|
wireguard-peer-keep-alive
|
||||||
|
|
||||||
wireguard-configuration
|
wireguard-configuration
|
||||||
|
@ -709,6 +711,8 @@ (define-record-type* <wireguard-peer>
|
||||||
(endpoint wireguard-peer-endpoint
|
(endpoint wireguard-peer-endpoint
|
||||||
(default #f)) ;string
|
(default #f)) ;string
|
||||||
(public-key wireguard-peer-public-key) ;string
|
(public-key wireguard-peer-public-key) ;string
|
||||||
|
(preshared-key wireguard-peer-preshared-key
|
||||||
|
(default #f)) ;string
|
||||||
(allowed-ips wireguard-peer-allowed-ips) ;list of strings
|
(allowed-ips wireguard-peer-allowed-ips) ;list of strings
|
||||||
(keep-alive wireguard-peer-keep-alive
|
(keep-alive wireguard-peer-keep-alive
|
||||||
(default #f))) ;integer
|
(default #f))) ;integer
|
||||||
|
@ -762,10 +766,18 @@ (define (peer->config peer)
|
||||||
(format #f "PersistentKeepalive = ~a\n" keep-alive)
|
(format #f "PersistentKeepalive = ~a\n" keep-alive)
|
||||||
"\n"))))
|
"\n"))))
|
||||||
|
|
||||||
|
(define (peers->preshared-keys peer keys)
|
||||||
|
(let ((public-key (wireguard-peer-public-key peer))
|
||||||
|
(preshared-key (wireguard-peer-preshared-key peer)))
|
||||||
|
(if preshared-key
|
||||||
|
(cons* public-key preshared-key keys)
|
||||||
|
keys)))
|
||||||
|
|
||||||
(match-record config <wireguard-configuration>
|
(match-record config <wireguard-configuration>
|
||||||
(wireguard interface addresses port private-key peers dns
|
(wireguard interface addresses port private-key peers dns
|
||||||
pre-up post-up pre-down post-down table)
|
pre-up post-up pre-down post-down table)
|
||||||
(let* ((config-file (string-append interface ".conf"))
|
(let* ((config-file (string-append interface ".conf"))
|
||||||
|
(peer-keys (fold peers->preshared-keys (list) peers))
|
||||||
(peers (map peer->config peers))
|
(peers (map peer->config peers))
|
||||||
(config
|
(config
|
||||||
(computed-file
|
(computed-file
|
||||||
|
@ -780,7 +792,7 @@ (define (peer->config peer)
|
||||||
Address = ~a
|
Address = ~a
|
||||||
~a
|
~a
|
||||||
~a
|
~a
|
||||||
PostUp = ~a set %i private-key ~a
|
PostUp = ~a set %i private-key ~a~{ peer ~a preshared-key ~a~}
|
||||||
~a
|
~a
|
||||||
~a
|
~a
|
||||||
~a
|
~a
|
||||||
|
@ -800,6 +812,7 @@ (define (peer->config peer)
|
||||||
"\n"))
|
"\n"))
|
||||||
#$(file-append wireguard "/bin/wg")
|
#$(file-append wireguard "/bin/wg")
|
||||||
#$private-key
|
#$private-key
|
||||||
|
'#$peer-keys
|
||||||
#$(if (null? post-up)
|
#$(if (null? post-up)
|
||||||
""
|
""
|
||||||
(string-join
|
(string-join
|
||||||
|
|
Loading…
Reference in a new issue