43 lines
969 B
Nix
43 lines
969 B
Nix
{
|
|
config,
|
|
pkgs,
|
|
lib,
|
|
...
|
|
}:
|
|
let
|
|
hasSecret =
|
|
secret:
|
|
let
|
|
secrets = config.age.secrets or { };
|
|
in
|
|
secrets ? ${secret} && secrets.${secret} != null;
|
|
in
|
|
{
|
|
environment.systemPackages = with pkgs; [ tailscale ];
|
|
boot.kernelModules = [ "tun" ];
|
|
|
|
services.tailscale = {
|
|
enable = true;
|
|
openFirewall = true;
|
|
useRoutingFeatures = "client";
|
|
authKeyFile = lib.mkIf (hasSecret "headscale_auth") config.age.secrets.headscale_auth.path;
|
|
extraUpFlags = [
|
|
"--login-server=https://headscale.joshuabell.xyz"
|
|
];
|
|
extraDaemonFlags = [
|
|
"--no-logs-no-support"
|
|
];
|
|
};
|
|
|
|
systemd.services.tailscaled = {
|
|
after = [
|
|
"systemd-modules-load.service"
|
|
"dev-net-tun.device"
|
|
];
|
|
wants = [ "dev-net-tun.device" ];
|
|
requires = [ "dev-net-tun.device" ];
|
|
};
|
|
|
|
networking.firewall.trustedInterfaces = [ config.services.tailscale.interfaceName ];
|
|
networking.firewall.checkReversePath = "loose";
|
|
}
|