From b586a04a0a997864d03d48ee9c4f65214bff852d Mon Sep 17 00:00:00 2001 From: Vincent Ambo Date: Tue, 11 Feb 2020 00:53:09 +0000 Subject: feat(ops/nixos): Add NixOS module for running tailscale This uses the "legacy" tailscale Linux client, but built from source as per the previous commits. --- ops/nixos/modules/.skip-subtree | 1 + ops/nixos/modules/tailscale.nix | 77 +++++++++++++++++++++++++++++++++++++++++ 2 files changed, 78 insertions(+) create mode 100644 ops/nixos/modules/.skip-subtree create mode 100644 ops/nixos/modules/tailscale.nix (limited to 'ops') diff --git a/ops/nixos/modules/.skip-subtree b/ops/nixos/modules/.skip-subtree new file mode 100644 index 000000000000..80d92f2eb485 --- /dev/null +++ b/ops/nixos/modules/.skip-subtree @@ -0,0 +1 @@ +The files in this folder are NixOS modules, not readTree-importables. diff --git a/ops/nixos/modules/tailscale.nix b/ops/nixos/modules/tailscale.nix new file mode 100644 index 000000000000..8f08ec95bdfc --- /dev/null +++ b/ops/nixos/modules/tailscale.nix @@ -0,0 +1,77 @@ +# NixOS module for Tailscale +{ config, lib, pkgs, ... }: + +with lib; + +let + cfg = config.services.tailscale; + + aclVar = optionalAttrs (cfg.aclFile != null) { + ACL_FILE = "--acl-file=${cfg.aclFile}"; + }; + +in { + options.services.tailscale = { + enable = mkEnableOption "Tailscale relay"; + + package = mkOption { + type = types.package; + default = pkgs.tailscale; # <- this doesn't actually exist yet + description = "Tailscale client package to use"; + }; + + port = mkOption { + type = types.int; + default = 41641; + description = '' + Set the port to listen on for incoming VPN packets. + + Remote nodes will automatically be informed about the new port + number, but you might want to configure this in order to set + external firewall settings. + ''; + }; + + aclFile = mkOption { + type = with types; nullOr path; + default = "${cfg.package}/etc/acl.json"; + }; + + relayConf = mkOption { + type = types.path; + example = "/etc/tailscale.conf"; + description = "The path to relay.conf"; + }; + + extraFlags = mkOption { + type = with types; listOf str; + default = []; + description = "Extra flags you might want to pass to relaynode."; + }; + }; + + config = mkIf cfg.enable { + environment.systemPackages = [ cfg.package ]; + + systemd.services.tailscale-relay = { + description = "Traffic relay node for Tailscale IPN"; + after = [ "network.target" ]; + wantedBy = [ "multi-user.target" ]; + path = with pkgs; [ iproute iptables ]; + + unitConfig.ConditionPathExists = cfg.relayConf; + + script = concatStringsSep " " ([ + "${cfg.package}/bin/relaynode" + "--port=${toString cfg.port}" + "--config=${cfg.relayConf}" + (optionalString (cfg.aclFile != null) "--acl-file=${cfg.aclFile}") + ] ++ cfg.extraFlags); + + serviceConfig = { + RuntimeDirectory = "tailscale"; + LogsDirectory = "tailscale"; + }; + }; + }; +} -- cgit 1.4.1