config/modules/services/tailscale/default.nix

48 lines
1017 B
Nix
Raw Permalink Normal View History

{
config,
lib,
myData,
...
2024-07-29 15:39:54 +03:00
}:
let
cfg = config.mj.services.tailscale;
2024-07-29 15:39:54 +03:00
inherit (lib)
mkMerge
types
mkEnableOption
mkOption
mkIf
;
in
{
options.mj.services.tailscale = with types; {
enable = mkEnableOption "Enable tailscale";
2024-11-21 06:50:25 +02:00
acceptDNS = mkOption {
type = bool;
default = false;
};
# https://github.com/tailscale/tailscale/issues/1548
2023-10-22 23:06:06 +03:00
verboseLogs = mkOption {
type = bool;
2023-10-22 23:06:06 +03:00
default = false;
};
};
2023-10-01 23:14:05 +03:00
config = mkIf cfg.enable (mkMerge [
{
2024-03-05 11:39:10 +02:00
services.tailscale = {
enable = true;
2024-11-21 06:50:25 +02:00
extraUpFlags = [
"--operator=${config.mj.username}"
2024-11-21 06:54:12 +02:00
];
extraSetFlags = [
"--accept-dns=${if cfg.acceptDNS then "true" else "false"}"
2024-11-21 06:50:25 +02:00
];
2024-03-05 11:39:10 +02:00
};
2023-09-14 14:48:54 +03:00
networking.firewall.checkReversePath = "loose";
2024-07-29 15:39:54 +03:00
networking.firewall.allowedUDPPorts = [ myData.ports.tailscale ];
}
2024-07-29 15:39:54 +03:00
(mkIf (!cfg.verboseLogs) { systemd.services.tailscaled.serviceConfig.StandardOutput = "null"; })
]);
}