Create networking abstraction

This commit is contained in:
SebastianStork 2026-01-11 18:24:11 +01:00
parent 6804112df6
commit 9bbd0c3e89
Signed by: SebastianStork
SSH key fingerprint: SHA256:tRrGdjYOwgHxpSc/wTOZQZEjxcb15P0tyXRsbAfd+2Q
15 changed files with 221 additions and 165 deletions

View file

@ -0,0 +1,73 @@
{
config,
self,
lib,
lib',
...
}:
let
cfg = config.custom.services.dns;
netCfg = config.custom.networking;
in
{
options.custom.services.dns.enable = lib.mkEnableOption "";
config = lib.mkIf cfg.enable {
# meta.ports = {
# tcp = [ 53 ];
# udp = [ 53 ];
# };
services = {
unbound = {
enable = true;
settings = {
server = {
interface = [ netCfg.overlay.interface ];
access-control = [
"${netCfg.overlay.networkAddress}/${toString netCfg.overlay.prefixLength} allow"
];
local-zone = "\"${netCfg.overlay.domain}.\" static";
local-data =
let
nodeRecords =
netCfg.nodes
|> lib.map (node: "\"${node.hostname}.${node.overlay.domain}. A ${node.overlay.address}\"");
serviceRecords =
self.nixosConfigurations
|> lib.attrValues
|> lib.concatMap (
host:
host.config.meta.domains.local
|> lib.filter (domain: lib'.isPrivateDomain domain)
|> lib.map (domain: "\"${domain}. A ${host.config.custom.networking.overlay.address}\"")
);
in
nodeRecords ++ serviceRecords;
};
forward-zone = lib.singleton {
name = ".";
forward-addr = [
"1.1.1.1"
"8.8.8.8"
];
};
};
};
nebula.networks.mesh.firewall.inbound = lib.singleton {
port = 53;
proto = "any";
host = "any";
};
};
systemd.services.unbound = {
requires = [ netCfg.overlay.systemdUnit ];
after = [ netCfg.overlay.systemdUnit ];
};
};
}