about summary refs log tree commit diff
path: root/ops/nixos/modules/tailscale.nix
diff options
context:
space:
mode:
authorVincent Ambo <tazjin@google.com>2020-02-11T00·53+0000
committerVincent Ambo <tazjin@google.com>2020-02-11T00·53+0000
commitb586a04a0a997864d03d48ee9c4f65214bff852d (patch)
tree425237544940f37da2d552fb9260cc8914fbb4dd /ops/nixos/modules/tailscale.nix
parent78b82c82a21f7e84f40754cec95e95caefa206d8 (diff)
feat(ops/nixos): Add NixOS module for running tailscale r/532
This uses the "legacy" tailscale Linux client, but built from source
as per the previous commits.
Diffstat (limited to 'ops/nixos/modules/tailscale.nix')
-rw-r--r--ops/nixos/modules/tailscale.nix77
1 files changed, 77 insertions, 0 deletions
diff --git a/ops/nixos/modules/tailscale.nix b/ops/nixos/modules/tailscale.nix
new file mode 100644
index 000000000000..8f08ec95bdfc
--- /dev/null
+++ b/ops/nixos/modules/tailscale.nix
@@ -0,0 +1,77 @@
+# NixOS module for Tailscale
+{ config, lib, pkgs, ... }:
+
+with lib;
+
+let
+  cfg = config.services.tailscale;
+
+  aclVar = optionalAttrs (cfg.aclFile != null) {
+    ACL_FILE = "--acl-file=${cfg.aclFile}";
+  };
+
+in {
+  options.services.tailscale = {
+    enable = mkEnableOption "Tailscale relay";
+
+    package = mkOption {
+      type = types.package;
+      default = pkgs.tailscale; # <- this doesn't actually exist yet
+      description = "Tailscale client package to use";
+    };
+
+    port = mkOption {
+      type = types.int;
+      default = 41641;
+      description = ''
+        Set the port to listen on for incoming VPN packets.
+
+        Remote nodes will automatically be informed about the new port
+        number, but you might want to configure this in order to set
+        external firewall settings.
+      '';
+    };
+
+    aclFile = mkOption {
+      type = with types; nullOr path;
+      default = "${cfg.package}/etc/acl.json";
+    };
+
+    relayConf = mkOption {
+      type = types.path;
+      example = "/etc/tailscale.conf";
+      description = "The path to relay.conf";
+    };
+
+    extraFlags = mkOption {
+      type = with types; listOf str;
+      default = [];
+      description = "Extra flags you might want to pass to relaynode.";
+    };
+  };
+
+  config = mkIf cfg.enable {
+    environment.systemPackages = [ cfg.package ];
+
+    systemd.services.tailscale-relay = {
+      description = "Traffic relay node for Tailscale IPN";
+      after = [ "network.target" ];
+      wantedBy = [ "multi-user.target" ];
+      path = with pkgs; [ iproute iptables ];
+
+      unitConfig.ConditionPathExists = cfg.relayConf;
+
+      script = concatStringsSep " " ([
+        "${cfg.package}/bin/relaynode"
+        "--port=${toString cfg.port}"
+        "--config=${cfg.relayConf}"
+        (optionalString (cfg.aclFile != null) "--acl-file=${cfg.aclFile}")
+      ] ++ cfg.extraFlags);
+
+      serviceConfig = {
+        RuntimeDirectory = "tailscale";
+        LogsDirectory = "tailscale";
+      };
+    };
+  };
+}