diff options
| author | seth <[email protected]> | 2023-10-01 10:41:09 -0400 |
|---|---|---|
| committer | seth <[email protected]> | 2023-10-01 10:49:46 -0400 |
| commit | a8630322f77dbb7be4810099a42352b9278996a1 (patch) | |
| tree | b8df66a7e5b9d8c31b27a4a9b357ff7e4b9d418f /modules/nixos/features/tailscale.nix | |
| parent | 30f55e656d344e017f66ecbae8eb27cf13ba53bb (diff) | |
treewide!: flatten to parts/ layout
Diffstat (limited to 'modules/nixos/features/tailscale.nix')
| -rw-r--r-- | modules/nixos/features/tailscale.nix | 67 |
1 files changed, 0 insertions, 67 deletions
diff --git a/modules/nixos/features/tailscale.nix b/modules/nixos/features/tailscale.nix deleted file mode 100644 index dc688f6..0000000 --- a/modules/nixos/features/tailscale.nix +++ /dev/null @@ -1,67 +0,0 @@ -{ - config, - lib, - pkgs, - self, - ... -}: let - cfg = config.features.tailscale; - inherit (lib) mkDefault mkEnableOption mkIf optionalAttrs; -in { - options.features.tailscale = { - enable = mkEnableOption "enable support for tailscale"; - ssh.enable = mkEnableOption "enable support for tailscale ssh"; - }; - - config = mkIf cfg.enable { - age.secrets = let - baseDir = "${self}/secrets/hosts/${config.networking.hostName}"; - in - mkIf cfg.ssh.enable { - tailscaleAuthKey.file = "${baseDir}/tailscaleAuthKey.age"; - }; - - networking.firewall = - { - allowedUDPPorts = [config.services.tailscale.port]; - trustedInterfaces = ["tailscale0"]; - } - // optionalAttrs cfg.ssh.enable { - allowedTCPPorts = [22]; - }; - - services = { - tailscale.enable = mkDefault true; - }; - - # https://tailscale.com/kb/1096/nixos-minecraft/ - systemd.services = mkIf cfg.ssh.enable { - tailscale-autoconnect = { - description = "Automatic connection to Tailscale"; - - after = ["network-pre.target" "tailscale.service"]; - wants = ["network-pre.target" "tailscale.service"]; - wantedBy = ["multi-user.target"]; - - serviceConfig.Type = "oneshot"; - - script = let - inherit (pkgs) tailscale jq; - in '' - # wait for tailscaled to settle - sleep 2 - - # check if we are already authenticated to tailscale - status="$(${tailscale}/bin/tailscale status -json | ${jq}/bin/jq -r .BackendState)" - if [ $status = "Running" ]; then # if so, then do nothing - exit 0 - fi - - # otherwise authenticate with tailscale - ${tailscale}/bin/tailscale up --ssh \ - --auth-key "file:${config.age.secrets.tailscaleAuthKey.path}" - ''; - }; - }; - }; -} |
