nebula: Add DNS support by configuring unbound

This commit is contained in:
SebastianStork 2026-01-09 19:43:19 +01:00
parent dc3fc4d5ad
commit ac3b43a952
Signed by: SebastianStork
SSH key fingerprint: SHA256:tRrGdjYOwgHxpSc/wTOZQZEjxcb15P0tyXRsbAfd+2Q
5 changed files with 106 additions and 12 deletions

View file

@ -5,23 +5,41 @@
...
}:
let
cfg = config.custom.services.nebula.node;
peers = config.custom.services.nebula.peers;
nebulaCfg = config.custom.services.nebula;
cfg = nebulaCfg.node;
hostname = config.networking.hostName;
lighthouses = peers |> lib.filter (node: node.isLighthouse);
routablePeers = peers |> lib.filter (node: node.routableAddress != null);
in
{
options.custom.services.nebula = {
network = {
address = lib.mkOption {
type = lib.types.nonEmptyStr;
default = "10.254.250.0";
readOnly = true;
};
prefixLength = lib.mkOption {
type = lib.types.ints.between 0 32;
default = 24;
readOnly = true;
};
domain = lib.mkOption {
type = lib.types.nonEmptyStr;
default = "splitleaf.de";
readOnly = true;
};
};
node = {
enable = lib.mkEnableOption "";
name = lib.mkOption {
type = lib.types.nonEmptyStr;
default = hostname;
};
interface = lib.mkOption {
type = lib.types.nonEmptyStr;
default = "nebula.mesh";
};
address = lib.mkOption {
type = lib.types.nonEmptyStr;
default = "";
@ -49,16 +67,20 @@ in
};
};
peers = lib.mkOption {
nodes = lib.mkOption {
type = lib.types.anything;
default =
self.nixosConfigurations
|> lib.filterAttrs (name: _: name != hostname)
|> lib.attrValues
|> lib.map (value: value.config.custom.services.nebula.node)
|> lib.filter (node: node.enable);
readOnly = true;
};
peers = lib.mkOption {
type = lib.types.anything;
default = nebulaCfg.nodes |> lib.filter (node: node.name != hostname);
readOnly = true;
};
};
config = lib.mkIf cfg.enable {
@ -83,13 +105,14 @@ in
listen.port = cfg.routablePort;
isLighthouse = cfg.isLighthouse;
inherit (cfg) isLighthouse;
lighthouses = lib.mkIf (!cfg.isLighthouse) (
lighthouses |> lib.map (lighthouse: lighthouse.address)
nebulaCfg.peers |> lib.filter (node: node.isLighthouse) |> lib.map (lighthouse: lighthouse.address)
);
staticHostMap =
routablePeers
nebulaCfg.peers
|> lib.filter (node: node.routableAddress != null)
|> lib.map (lighthouse: {
name = lighthouse.address;
value = lib.singleton "${lighthouse.routableAddress}:${toString lighthouse.routablePort}";
@ -116,6 +139,13 @@ in
};
};
networking.firewall.trustedInterfaces = [ "nebula.mesh" ];
networking.firewall.trustedInterfaces = [ cfg.interface ];
systemd.network.networks."40-nebula" = {
matchConfig.Name = cfg.interface;
address = [ "${cfg.address}/${toString nebulaCfg.network.prefixLength}" ];
dns = nebulaCfg.peers |> lib.filter (node: node.dns.enable) |> lib.map (node: node.address);
domains = [ nebulaCfg.network.domain ];
};
};
}

View file

@ -0,0 +1,54 @@
{ config, lib, ... }:
let
nebulaCfg = config.custom.services.nebula;
cfg = nebulaCfg.node;
in
{
options.custom.services.nebula.node.dns.enable = lib.mkEnableOption "";
config = lib.mkIf (cfg.enable && cfg.dns.enable) {
# meta.ports = {
# tcp = [ 53 ];
# udp = [ 53 ];
# };
services = {
unbound = {
enable = true;
settings = {
server = {
interface = [ cfg.interface ];
access-control = [
"${nebulaCfg.network.address}/${toString nebulaCfg.network.prefixLength} allow"
];
local-zone = "\"${nebulaCfg.network.domain}.\" static";
local-data =
nebulaCfg.nodes
|> lib.map (node: "\"${node.name}.${nebulaCfg.network.domain}. A ${node.address}\"");
};
forward-zone = lib.singleton {
name = ".";
forward-addr = [
"1.1.1.1"
"8.8.8.8"
];
};
};
};
nebula.networks.mesh.firewall.inbound = lib.singleton {
port = 53;
proto = "any";
host = "any";
};
};
systemd.services.unbound = {
requires = [ "nebula@mesh.service" ];
after = [ "nebula@mesh.service" ];
};
};
}

View file

@ -35,5 +35,13 @@ in
systemd.services.tailscaled-set.after = [ "tailscaled-autoconnect.service" ];
custom.persistence.directories = [ "/var/lib/tailscale" ];
# Disable search domain when nebula is in use
systemd.network.networks."50-tailscale" = lib.mkIf config.custom.services.nebula.node.enable {
matchConfig.Name = config.services.tailscale.interfaceName;
linkConfig.Unmanaged = lib.mkForce false;
dns = [ "100.100.100.100" ];
domains = [ ];
};
};
}