depot/ops/nixos/bvm-radius/default.nix

65 lines
2.2 KiB
Nix
Raw Permalink Normal View History

2021-09-24 22:50:30 +00:00
# SPDX-FileCopyrightText: 2020 Luke Granger-Brown <depot@lukegb.com>
#
# SPDX-License-Identifier: Apache-2.0
{ config, depot, lib, pkgs, ... }:
2021-09-24 22:50:30 +00:00
let
inherit (depot.ops) secrets;
in {
imports = [
../lib/bvm.nix
../lib/as205479-web.nix
./radius.nix
2021-09-24 22:50:30 +00:00
];
# Networking!
networking = {
hostName = "bvm-radius";
hostId = "dcc75f10";
tempAddresses = "disabled";
2021-09-24 22:50:30 +00:00
interfaces.enp1s0 = {
ipv4.addresses = [{ address = "10.100.0.207"; prefixLength = 23; }];
};
interfaces.enp2s0 = {
ipv4.addresses = [{ address = "92.118.28.9"; prefixLength = 24; }];
ipv6.addresses = [{ address = "2a09:a441::9"; prefixLength = 32; }];
};
defaultGateway = { address = "92.118.28.1"; interface = "enp2s0"; };
defaultGateway6 = { address = "2a09:a441::1"; interface = "enp2s0"; };
2021-09-25 12:32:27 +00:00
firewall = {
allowedTCPPorts = [ 80 443 ];
allowedUDPPorts = [ 443 ];
2021-09-25 12:32:27 +00:00
extraCommands = ''
# Allow JANET inbound RADIUS traffic.
# roaming0.ja.net
iptables -A nixos-fw -p udp --dport 1812 --src 193.63.195.58 -j nixos-fw-accept
ip6tables -A nixos-fw -p udp --dport 1812 --src 2001:630:1:133::58 -j nixos-fw-accept
# roaming1.ja.net
iptables -A nixos-fw -p udp --dport 1812 --src 193.63.195.34 -j nixos-fw-accept
ip6tables -A nixos-fw -p udp --dport 1812 --src 2001:630:1:132::34 -j nixos-fw-accept
# roaming2.ja.net (new)
iptables -A nixos-fw -p udp --dport 1812 --src 193.63.195.50 -j nixos-fw-accept
ip6tables -A nixos-fw -p udp --dport 1812 --src 2001:630:1:133::50 -j nixos-fw-accept
2021-09-25 12:32:27 +00:00
# Allow inbound RADIUS from authenticators.
ip6tables -A nixos-fw -p udp --dport 1812 --src 2a09:a443::/64 -j nixos-fw-accept
iptables -A nixos-fw -p udp --dport 1812 --src 92.118.30.0/24 -j nixos-fw-accept
'';
};
2021-09-24 22:50:30 +00:00
};
2021-09-25 12:19:07 +00:00
my.ip.tailscale = "100.120.98.116";
2022-09-01 23:22:16 +00:00
my.ip.tailscale6 = "fd7a:115c:a1e0:ab12:4843:cd96:6278:6274";
2021-09-24 22:50:30 +00:00
my.vault.acmeCertificates."as205479.net" = {
group = "acme";
hostnames = [ "as205479.net" ];
reloadOrRestartUnits = [ "freeradius.service" ];
};
users.users.nginx.extraGroups = lib.mkAfter [ "acme" ];
2022-03-11 23:10:01 +00:00
users.groups.acme = {};
2021-09-24 22:50:30 +00:00
system.stateVersion = "21.05";
}