2020-03-08 06:47:50 +00:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let cfg = config.services.tailscale;
|
|
|
|
in {
|
2022-05-06 00:09:27 +00:00
|
|
|
meta.maintainers = with maintainers; [ danderson mbaillie twitchyliquid64 ];
|
2020-03-08 06:47:50 +00:00
|
|
|
|
|
|
|
options.services.tailscale = {
|
|
|
|
enable = mkEnableOption "Tailscale client daemon";
|
|
|
|
|
|
|
|
port = mkOption {
|
|
|
|
type = types.port;
|
|
|
|
default = 41641;
|
|
|
|
description = "The port to listen on for tunnel traffic (0=autoselect).";
|
|
|
|
};
|
2020-11-24 16:47:28 +00:00
|
|
|
|
2021-06-04 20:18:59 +00:00
|
|
|
interfaceName = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "tailscale0";
|
|
|
|
description = ''The interface name for tunnel traffic. Use "userspace-networking" (beta) to not use TUN.'';
|
|
|
|
};
|
|
|
|
|
2022-04-17 09:16:25 +00:00
|
|
|
permitCertUid = mkOption {
|
|
|
|
type = types.nullOr types.nonEmptyStr;
|
|
|
|
default = null;
|
|
|
|
description = "Username or user ID of the user allowed to to fetch Tailscale TLS certificates for the node.";
|
|
|
|
};
|
|
|
|
|
2020-11-24 16:47:28 +00:00
|
|
|
package = mkOption {
|
|
|
|
type = types.package;
|
|
|
|
default = pkgs.tailscale;
|
2021-10-03 16:06:03 +00:00
|
|
|
defaultText = literalExpression "pkgs.tailscale";
|
2020-11-24 16:47:28 +00:00
|
|
|
description = "The package to use for tailscale";
|
|
|
|
};
|
2020-03-08 06:47:50 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
2020-11-24 16:47:28 +00:00
|
|
|
environment.systemPackages = [ cfg.package ]; # for the CLI
|
|
|
|
systemd.packages = [ cfg.package ];
|
2020-10-31 01:11:30 +00:00
|
|
|
systemd.services.tailscaled = {
|
2020-03-08 06:47:50 +00:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
2022-05-06 00:09:27 +00:00
|
|
|
path = [
|
|
|
|
pkgs.openresolv # for configuring DNS in some configs
|
|
|
|
pkgs.procps # for collecting running services (opt-in feature)
|
|
|
|
pkgs.glibc # for `getent` to look up user shells
|
|
|
|
];
|
2021-06-04 20:18:59 +00:00
|
|
|
serviceConfig.Environment = [
|
|
|
|
"PORT=${toString cfg.port}"
|
|
|
|
''"FLAGS=--tun ${lib.escapeShellArg cfg.interfaceName}"''
|
2022-04-17 09:16:25 +00:00
|
|
|
] ++ (lib.optionals (cfg.permitCertUid != null) [
|
|
|
|
"TS_PERMIT_CERT_UID=${cfg.permitCertUid}"
|
|
|
|
]);
|
2022-04-25 06:31:35 +00:00
|
|
|
# Restart tailscaled with a single `systemctl restart` at the
|
|
|
|
# end of activation, rather than a `stop` followed by a later
|
|
|
|
# `start`. Activation over Tailscale can hang for tens of
|
|
|
|
# seconds in the stop+start setup, if the activation script has
|
|
|
|
# a significant delay between the stop and start phases
|
|
|
|
# (e.g. script blocked on another unit with a slow shutdown).
|
|
|
|
#
|
|
|
|
# Tailscale is aware of the correctness tradeoff involved, and
|
|
|
|
# already makes its upstream systemd unit robust against unit
|
|
|
|
# version mismatches on restart for compatibility with other
|
|
|
|
# linux distros.
|
|
|
|
stopIfChanged = false;
|
2020-03-08 06:47:50 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|