diff options
| author | scouckel <james.krinsky@gmail.com> | 2026-04-04 02:35:03 +0200 |
|---|---|---|
| committer | scouckel <james.krinsky@gmail.com> | 2026-04-04 02:35:03 +0200 |
| commit | 9a58c5f1857549f17e98adc9e385e4c4fb20d53a (patch) | |
| tree | b7a59b50831ace76e879758f24a5750aa865c727 /modules/nixosModules/server/tailscale.nix | |
| parent | 50044b7a87bc9f59452855a96a2013c9b000a0a1 (diff) | |
everything is updated, everything is wonderful
Diffstat (limited to 'modules/nixosModules/server/tailscale.nix')
| -rw-r--r-- | modules/nixosModules/server/tailscale.nix | 55 |
1 files changed, 55 insertions, 0 deletions
diff --git a/modules/nixosModules/server/tailscale.nix b/modules/nixosModules/server/tailscale.nix new file mode 100644 index 0000000..41d4b5d --- /dev/null +++ b/modules/nixosModules/server/tailscale.nix @@ -0,0 +1,55 @@ +{ self, ... }: { + + flake.nixosModules.tailscaleServer = { config, ... }: let + cfg = config.hostOptions.server; + in { + imports = [ + self.nixosModules.hostOptions + ]; + + services.tailscale = { + enable = true; + useRoutingFeatures = "server"; + extraUpFlags = [ + "--login-server=https://headscale.${cfg.domain}" + "--advertise-exit-node" + ]; + }; + }; + + flake.nixosModules.headscale = { config, ... }: let + cfg = config.hostOptions.server; + in { + imports = [ + self.nixosModules.hostOptions + ]; + + services.headscale = { + enable = true; + port = 8085; + settings = { + server_url = "https://headscale.${cfg.domain}"; + dns = { + magic_dns = false; + nameservers.global = [ "1.1.1.1" "9.9.9.9" ]; + }; + prefixes = { + v4 = "100.64.0.0/10"; + v6 = "fd7a:115c:a1e0::/48"; + }; + }; + }; + + services.nginx.virtualHosts."headscale.${cfg.domain}" = { + enableACME = true; + forceSSL = true; + locations."/" = { + proxyPass = "http://127.0.0.1:8085"; + proxyWebsockets = true; + extraConfig = '' + proxy_buffering off; + ''; + }; + }; + }; +} |
