from ipaddress import ip_network, ip_interface from bundlewrap.exceptions import NoSuchNode from bundlewrap.metadata import atomic defaults = { 'apt': { 'packages': { # 'linux-headers-amd64': {}, 'wireguard': { 'backports': node.os_version < (11,), # 'needs': [ # 'pkg_apt:linux-headers-amd64', # ], 'triggers': [ 'svc_systemd:systemd-networkd:restart', ], }, }, }, 'wireguard': { 'privatekey': repo.vault.random_bytes_as_base64_for(f'{node.name} wireguard privatekey'), }, } @metadata_reactor.provides( 'systemd/units', ) def systemd_networkd_networks(metadata): network = { 'Match': { 'Name': 'wg0', }, 'Address': { 'Address': metadata.get('wireguard/my_ip'), }, 'Route': { 'Destination': str(ip_interface(metadata.get('wireguard/my_ip')).network), 'GatewayOnlink': 'yes', 'PreferredSource': str(ip_interface(metadata.get('network/internal/ipv4')).ip), }, 'Network': { 'DHCP': 'no', 'IPForward': 'yes', 'IPv6AcceptRA': 'no', }, } for peer, config in { **metadata.get('wireguard/peers'), **metadata.get('wireguard/clients'), }.items(): for route in config.get('route', []): network.update({ f'Route#{peer}_{route}': { 'Destination': route, 'Gateway': str(ip_interface(config['ip']).ip), 'GatewayOnlink': 'yes', 'PreferredSource': str(ip_interface(metadata.get('network/internal/ipv4')).ip), } }) return { 'systemd': { 'units': { 'wireguard.network': network, }, }, } @metadata_reactor.provides( 'systemd/units', ) def systemd_networkd_netdevs(metadata): netdev = { 'NetDev': { 'Name': 'wg0', 'Kind': 'wireguard', 'Description': 'WireGuard server', }, 'WireGuard': { 'PrivateKey': metadata.get('wireguard/privatekey'), 'ListenPort': 51820, }, } for peer, config in { **metadata.get('wireguard/peers'), **metadata.get('wireguard/clients'), }.items(): netdev.update({ f'WireGuardPeer#{peer}': { 'PublicKey': config['pubkey'], 'PresharedKey': config['psk'], 'AllowedIPs': ', '.join([ str(ip_interface(config['ip']).ip), *config.get('route', []), ]), # FIXME 'PersistentKeepalive': 30, } }) if config.get('endpoint'): netdev[f'WireGuardPeer#{peer}']['Endpoint'] = config['endpoint'] return { 'systemd': { 'units': { 'wireguard.netdev': netdev, }, }, } @metadata_reactor.provides( 'wireguard/peers', ) def s2s_peer_specific(metadata): return { 'wireguard': { 'peers': { peer: { 'id': repo.get_node(peer).metadata.get(f'id'), 'privkey': repo.get_node(peer).metadata.get(f'wireguard/privatekey'), 'ip': repo.get_node(peer).metadata.get(f'wireguard/my_ip'), 'endpoint': f'{repo.get_node(peer).hostname}:51820', } for peer in metadata.get('wireguard/peers') }, }, } @metadata_reactor.provides( 'wireguard/clients', ) def client_peer_specific(metadata): return { 'wireguard': { 'clients': { client: { 'id': client, 'privkey': repo.vault.random_bytes_as_base64_for(f'{client} wireguard privatekey'), } for client in metadata.get('wireguard/clients') }, }, } @metadata_reactor.provides( 'wireguard/peers', 'wireguard/clients', ) def common_peer_data(metadata): peers = { 'peers': {}, 'clients': {}, } for peer_type in peers: for peer_name, peer_data in metadata.get(f'wireguard/{peer_type}', {}).items(): first, second = sorted([node.metadata.get('id'), peer_data['id']]) peers[peer_type][peer_name] = { 'psk': repo.vault.random_bytes_as_base64_for(f'{first} wireguard {second}'), 'pubkey': repo.libs.keys.get_pubkey_from_privkey(f'{peer_name} wireguard pubkey', peer_data['privkey']), } return { 'wireguard': peers, }