{ pkgs, depot, lib, config, ... }: let inherit (config.networking) hostName; hyprspace = depot.inputs.hyprspace.packages.default; hyprspaceCapableNodes = lib.filterAttrs (_: host: host.hyprspace.enable) depot.hours; peersFormatted = builtins.mapAttrs (name: x: { inherit name; inherit (x.hyprspace) id; routes = map (net: { inherit net; }) x.hyprspace.routes; }) hyprspaceCapableNodes; peersFiltered = lib.filterAttrs (name: _: name != hostName) peersFormatted; peerList = builtins.attrValues peersFiltered; myNode = depot.reflection; listenPort = myNode.hyprspace.listenPort or 8001; interfaceConfig = pkgs.writeText "hyprspace.json" (builtins.toJSON { listenAddresses = let inherit (myNode.interfaces.primary) addr; port = toString listenPort; in [ "/ip4/${addr}/tcp/${port}" "/ip4/${addr}/udp/${port}/quic-v1" ] ++ (map (port: "/ip4/${addr}/tcp/${toString port}") additionalTCPPorts) ++ (map (port: "/ip4/${addr}/udp/${toString port}/quic-v1") additionalQUICPorts); privateKey = "@HYPRSPACEPRIVATEKEY@"; peers = peerList; }); privateKeyFile = config.age.secrets.hyprspace-key.path; runConfig = "/run/hyprspace.json"; nameservers = lib.unique config.networking.nameservers; additionalTCPPorts = [ 21 ]; additionalQUICPorts = [ 21 443 500 ]; in { links.hyprspaceMetrics.protocol = "http"; age.secrets.hyprspace-key = { file = ../../secrets/hyprspace-key- + "${hostName}.age"; mode = "0400"; }; systemd.services.hyprspace = { enable = true; after = [ "network-online.target" ]; wantedBy = [ "multi-user.target" ]; preStart = '' test -e ${runConfig} && rm ${runConfig} cp ${interfaceConfig} ${runConfig} chmod 0600 ${runConfig} ${pkgs.replace-secret}/bin/replace-secret '@HYPRSPACEPRIVATEKEY@' "${privateKeyFile}" ${runConfig} chmod 0400 ${runConfig} ''; environment.HYPRSPACE_METRICS_PORT = config.links.hyprspaceMetrics.portStr; serviceConfig = { Group = "wheel"; Restart = "on-failure"; RestartSec = "5s"; ExecStart = "${hyprspace}/bin/hyprspace up -c ${runConfig}"; ExecStopPost = "${pkgs.coreutils}/bin/rm -f /run/hyprspace-rpc.hyprspace.sock"; IPAddressDeny = [ "10.0.0.0/8" "100.64.0.0/10" "169.254.0.0/16" "172.16.0.0/12" "192.0.0.0/24" "192.0.2.0/24" "192.168.0.0/16" "198.18.0.0/15" "198.51.100.0/24" "203.0.113.0/24" "240.0.0.0/4" "100::/64" "2001:2::/48" "2001:db8::/32" "fc00::/7" "fe80::/10" ]; IPAddressAllow = nameservers; }; }; networking.firewall = { allowedTCPPorts = [ listenPort ] ++ additionalTCPPorts; allowedUDPPorts = [ listenPort ] ++ additionalQUICPorts; trustedInterfaces = [ "hyprspace" ]; }; environment.systemPackages = [ hyprspace ]; services.grafana-agent.settings.metrics.configs = lib.singleton { name = "metrics-hyprspace"; scrape_configs = lib.singleton { job_name = "hyprspace"; static_configs = lib.singleton { targets = lib.singleton config.links.hyprspaceMetrics.tuple; labels = { instance = hostName; peer_id = myNode.hyprspace.id; }; }; }; }; }