{ config, self, lib, allHosts, ... }: let cfg = config.custom.services.nebula; netCfg = config.custom.networking; lighthouses = netCfg.peers |> lib.filter (peer: peer.overlay.isLighthouse) |> lib.map (lighthouse: lighthouse.overlay.address); in { options.custom.services.nebula = { enable = lib.mkEnableOption "" // { default = netCfg.overlay.implementation == "nebula"; }; groups = lib.mkOption { type = lib.types.nonEmptyListOf lib.types.nonEmptyStr; default = lib.singleton netCfg.overlay.role ++ lib.optional config.custom.services.syncthing.enable "syncthing"; }; listenPort = lib.mkOption { type = lib.types.port; default = if (cfg.advertise.address != null) then 47141 else 0; }; advertise = { address = lib.mkOption { type = lib.types.nullOr lib.types.nonEmptyStr; default = if netCfg.underlay.isPublic then netCfg.underlay.address else null; }; port = lib.mkOption { type = lib.types.nullOr lib.types.port; default = if cfg.advertise.address != null then cfg.listenPort else null; }; }; caCertificateFile = lib.mkOption { type = self.lib.types.existingPath; default = ./ca.crt; }; publicKeyFile = lib.mkOption { type = self.lib.types.existingPath; default = "${self}/hosts/${netCfg.hostName}/keys/nebula.pub"; }; certificateFile = lib.mkOption { type = self.lib.types.existingPath; default = "${self}/hosts/${netCfg.hostName}/keys/nebula.crt"; }; privateKeyFile = lib.mkOption { type = lib.types.nullOr lib.types.path; default = null; }; }; config = lib.mkIf cfg.enable { assertions = lib.singleton { assertion = netCfg.overlay.isLighthouse -> cfg.advertise.address != null; message = self.lib.mkInvalidConfigMessage "Nebula lighthouse `${netCfg.hostName}`" "`underlay.isPublic` must be enabled or `services.nebula.advertise.address` must be set so the host is publicly reachable"; }; sops.secrets."nebula/host-key" = lib.mkIf (cfg.privateKeyFile == null) { owner = config.users.users.nebula-mesh.name; restartUnits = [ "nebula@mesh.service" ]; }; environment.etc = { "nebula/ca.crt" = { source = cfg.caCertificateFile; mode = "0440"; user = config.systemd.services."nebula@mesh".serviceConfig.User; }; "nebula/host.crt" = { source = cfg.certificateFile; mode = "0440"; user = config.systemd.services."nebula@mesh".serviceConfig.User; }; }; services.nebula.networks.mesh = { enable = true; ca = "/etc/nebula/ca.crt"; cert = "/etc/nebula/host.crt"; key = if (cfg.privateKeyFile != null) then cfg.privateKeyFile else config.sops.secrets."nebula/host-key".path; tun.device = netCfg.overlay.interface; listen = { host = lib.mkIf (netCfg.underlay.address != null) netCfg.underlay.address; port = cfg.listenPort; }; inherit (netCfg.overlay) isLighthouse; lighthouses = lib.mkIf (!netCfg.overlay.isLighthouse) lighthouses; isRelay = netCfg.overlay.isLighthouse; relays = lib.mkIf (!netCfg.overlay.isLighthouse) lighthouses; staticHostMap = allHosts |> lib.attrValues |> lib.filter (host: host.config.custom.services.nebula.advertise.address != null) |> lib.map (host: { name = host.config.custom.networking.overlay.address; value = lib.singleton "${host.config.custom.services.nebula.advertise.address}:${toString host.config.custom.services.nebula.advertise.port}"; }) |> lib.listToAttrs; firewall = { outbound = lib.singleton { port = "any"; proto = "any"; host = "any"; }; inbound = lib.singleton { port = "any"; proto = "icmp"; host = "any"; }; }; settings = { pki.disconnect_invalid = true; cipher = "aes"; }; }; networking.firewall.trustedInterfaces = [ netCfg.overlay.interface ]; systemd = { services."nebula@mesh" = { wants = [ "network-online.target" ]; after = [ "network-online.target" ]; }; network.networks."40-nebula" = { matchConfig.Name = netCfg.overlay.interface; address = [ netCfg.overlay.cidr ]; dns = netCfg.overlay.dnsServers; domains = [ netCfg.overlay.domain ]; }; }; }; }