diff options
author | Martin Baillie <martin@baillie.email> | 2020-03-08 17:47:50 +1100 |
---|---|---|
committer | Alyssa Ross <hi@alyssa.is> | 2020-03-18 05:07:47 +0000 |
commit | 6e055c9f4a3734e1d1b8e9f55be68e6743bf59d3 (patch) | |
tree | 4523b62154d543cb94130bf35dcef01d6c375947 /nixos/modules | |
parent | 8a1a6cf39c086040b01fd1f113e2665e8d85e18f (diff) | |
download | nixlib-6e055c9f4a3734e1d1b8e9f55be68e6743bf59d3.tar nixlib-6e055c9f4a3734e1d1b8e9f55be68e6743bf59d3.tar.gz nixlib-6e055c9f4a3734e1d1b8e9f55be68e6743bf59d3.tar.bz2 nixlib-6e055c9f4a3734e1d1b8e9f55be68e6743bf59d3.tar.lz nixlib-6e055c9f4a3734e1d1b8e9f55be68e6743bf59d3.tar.xz nixlib-6e055c9f4a3734e1d1b8e9f55be68e6743bf59d3.tar.zst nixlib-6e055c9f4a3734e1d1b8e9f55be68e6743bf59d3.zip |
tailscale: init at 0.96-33
Signed-off-by: Martin Baillie <martin@baillie.email>
Diffstat (limited to 'nixos/modules')
-rw-r--r-- | nixos/modules/module-list.nix | 1 | ||||
-rw-r--r-- | nixos/modules/services/networking/tailscale.nix | 46 |
2 files changed, 47 insertions, 0 deletions
diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index 8c6e8766cd9c..1ff5f5ff0c25 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -728,6 +728,7 @@ ./services/networking/syncthing.nix ./services/networking/syncthing-relay.nix ./services/networking/syncplay.nix + ./services/networking/tailscale.nix ./services/networking/tcpcrypt.nix ./services/networking/teamspeak3.nix ./services/networking/tedicross.nix diff --git a/nixos/modules/services/networking/tailscale.nix b/nixos/modules/services/networking/tailscale.nix new file mode 100644 index 000000000000..513c42b40117 --- /dev/null +++ b/nixos/modules/services/networking/tailscale.nix @@ -0,0 +1,46 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let cfg = config.services.tailscale; +in { + meta.maintainers = with maintainers; [ danderson mbaillie ]; + + options.services.tailscale = { + enable = mkEnableOption "Tailscale client daemon"; + + port = mkOption { + type = types.port; + default = 41641; + description = "The port to listen on for tunnel traffic (0=autoselect)."; + }; + }; + + config = mkIf cfg.enable { + systemd.services.tailscale = { + description = "Tailscale client daemon"; + + after = [ "network-pre.target" ]; + wants = [ "network-pre.target" ]; + wantedBy = [ "multi-user.target" ]; + + unitConfig = { + StartLimitIntervalSec = 0; + StartLimitBurst = 0; + }; + + serviceConfig = { + ExecStart = + "${pkgs.tailscale}/bin/tailscaled --port ${toString cfg.port}"; + + RuntimeDirectory = "tailscale"; + RuntimeDirectoryMode = 755; + + StateDirectory = "tailscale"; + StateDirectoryMode = 700; + + Restart = "on-failure"; + }; + }; + }; +} |