2020-03-08 17:47:50 +11:00
|
|
|
{
|
|
|
|
config,
|
|
|
|
lib,
|
|
|
|
pkgs,
|
|
|
|
...
|
|
|
|
}:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
2022-05-05 18:15:54 -07:00
|
|
|
let
|
|
|
|
cfg = config.services.tailscale;
|
2022-06-21 13:23:28 -07:00
|
|
|
isNetworkd = config.networking.useNetworkd;
|
2020-03-08 17:47:50 +11:00
|
|
|
in
|
|
|
|
{
|
2024-04-26 22:48:31 -07:00
|
|
|
meta.maintainers = with maintainers; [
|
|
|
|
mbaillie
|
|
|
|
mfrw
|
|
|
|
];
|
2020-03-08 17:47:50 +11:00
|
|
|
|
|
|
|
options.services.tailscale = {
|
|
|
|
enable = mkEnableOption "Tailscale client daemon";
|
|
|
|
|
|
|
|
port = mkOption {
|
|
|
|
type = types.port;
|
|
|
|
default = 41641;
|
|
|
|
description = "The port to listen on for tunnel traffic (0=autoselect).";
|
|
|
|
};
|
2020-11-24 11:47:28 -05:00
|
|
|
|
2021-06-04 22:18:59 +02:00
|
|
|
interfaceName = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "tailscale0";
|
|
|
|
description = ''The interface name for tunnel traffic. Use "userspace-networking" (beta) to not use TUN.'';
|
|
|
|
};
|
|
|
|
|
2022-04-17 11:16:25 +02:00
|
|
|
permitCertUid = mkOption {
|
|
|
|
type = types.nullOr types.nonEmptyStr;
|
|
|
|
default = null;
|
|
|
|
description = "Username or user ID of the user allowed to to fetch Tailscale TLS certificates for the node.";
|
|
|
|
};
|
|
|
|
|
2024-10-07 00:22:59 +03:00
|
|
|
disableTaildrop = mkOption {
|
|
|
|
default = false;
|
|
|
|
type = types.bool;
|
|
|
|
description = "Whether to disable the Taildrop feature for sending files between nodes.";
|
|
|
|
};
|
|
|
|
|
2023-11-30 19:03:14 +01:00
|
|
|
package = lib.mkPackageOption pkgs "tailscale" { };
|
2022-11-14 13:23:43 +11:00
|
|
|
|
2023-10-20 07:37:41 -07:00
|
|
|
openFirewall = mkOption {
|
|
|
|
default = false;
|
|
|
|
type = types.bool;
|
|
|
|
description = "Whether to open the firewall for the specified port.";
|
|
|
|
};
|
|
|
|
|
2022-11-14 13:23:43 +11:00
|
|
|
useRoutingFeatures = mkOption {
|
|
|
|
type = types.enum [
|
|
|
|
"none"
|
|
|
|
"client"
|
|
|
|
"server"
|
|
|
|
"both"
|
|
|
|
];
|
|
|
|
default = "none";
|
|
|
|
example = "server";
|
|
|
|
description = ''
|
|
|
|
Enables settings required for Tailscale's routing features like subnet routers and exit nodes.
|
|
|
|
|
|
|
|
To use these these features, you will still need to call `sudo tailscale up` with the relevant flags like `--advertise-exit-node` and `--exit-node`.
|
|
|
|
|
|
|
|
When set to `client` or `both`, reverse path filtering will be set to loose instead of strict.
|
|
|
|
When set to `server` or `both`, IP forwarding will be enabled.
|
|
|
|
'';
|
|
|
|
};
|
2023-07-10 22:31:30 +02:00
|
|
|
|
|
|
|
authKeyFile = mkOption {
|
|
|
|
type = types.nullOr types.path;
|
|
|
|
default = null;
|
|
|
|
example = "/run/secrets/tailscale_key";
|
|
|
|
description = ''
|
|
|
|
A file containing the auth key.
|
2024-10-11 10:59:49 +02:00
|
|
|
Tailscale will be automatically started if provided.
|
2023-07-10 22:31:30 +02:00
|
|
|
'';
|
|
|
|
};
|
2023-07-26 19:32:52 +02:00
|
|
|
|
2024-08-30 20:48:17 -03:00
|
|
|
authKeyParameters = mkOption {
|
|
|
|
type = types.submodule {
|
|
|
|
options = {
|
|
|
|
ephemeral = mkOption {
|
|
|
|
type = types.nullOr types.bool;
|
|
|
|
default = null;
|
|
|
|
description = "Whether to register as an ephemeral node.";
|
|
|
|
};
|
|
|
|
preauthorized = mkOption {
|
|
|
|
type = types.nullOr types.bool;
|
|
|
|
default = null;
|
|
|
|
description = "Whether to skip manual device approval.";
|
|
|
|
};
|
|
|
|
baseURL = mkOption {
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
default = null;
|
|
|
|
description = "Base URL for the Tailscale API.";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
default = { };
|
|
|
|
description = ''
|
|
|
|
Extra parameters to pass after the auth key.
|
|
|
|
See https://tailscale.com/kb/1215/oauth-clients#registering-new-nodes-using-oauth-credentials
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2023-07-26 19:32:52 +02:00
|
|
|
extraUpFlags = mkOption {
|
2024-05-11 02:59:25 +09:00
|
|
|
description = ''
|
|
|
|
Extra flags to pass to {command}`tailscale up`. Only applied if `authKeyFile` is specified.";
|
|
|
|
'';
|
2023-07-26 19:32:52 +02:00
|
|
|
type = types.listOf types.str;
|
|
|
|
default = [ ];
|
|
|
|
example = [ "--ssh" ];
|
|
|
|
};
|
2024-02-27 20:07:47 +01:00
|
|
|
|
2024-05-11 02:59:25 +09:00
|
|
|
extraSetFlags = mkOption {
|
|
|
|
description = "Extra flags to pass to {command}`tailscale set`.";
|
|
|
|
type = types.listOf types.str;
|
|
|
|
default = [ ];
|
|
|
|
example = [ "--advertise-exit-node" ];
|
|
|
|
};
|
|
|
|
|
2024-02-27 20:07:47 +01:00
|
|
|
extraDaemonFlags = mkOption {
|
|
|
|
description = "Extra flags to pass to {command}`tailscaled`.";
|
|
|
|
type = types.listOf types.str;
|
|
|
|
default = [ ];
|
|
|
|
example = [ "--no-logs-no-support" ];
|
|
|
|
};
|
2020-03-08 17:47:50 +11:00
|
|
|
};
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
2020-11-24 11:47:28 -05:00
|
|
|
environment.systemPackages = [ cfg.package ]; # for the CLI
|
|
|
|
systemd.packages = [ cfg.package ];
|
2020-10-30 18:11:30 -07:00
|
|
|
systemd.services.tailscaled = {
|
2024-09-26 11:13:43 -04:00
|
|
|
after = lib.mkIf (config.networking.networkmanager.enable) [ "NetworkManager-wait-online.service" ];
|
2020-03-08 17:47:50 +11:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
2022-05-05 17:09:27 -07:00
|
|
|
path = [
|
2024-09-27 23:05:20 +02:00
|
|
|
(builtins.dirOf config.security.wrapperDir) # for `su` to use taildrive with correct access rights
|
2022-05-05 17:09:27 -07:00
|
|
|
pkgs.procps # for collecting running services (opt-in feature)
|
2023-07-12 02:32:23 +07:00
|
|
|
pkgs.getent # for `getent` to look up user shells
|
2023-06-16 12:18:55 +00:00
|
|
|
pkgs.kmod # required to pass tailscale's v6nat check
|
2024-01-22 18:22:52 +01:00
|
|
|
] ++ lib.optional config.networking.resolvconf.enable config.networking.resolvconf.package;
|
2021-06-04 22:18:59 +02:00
|
|
|
serviceConfig.Environment =
|
|
|
|
[
|
|
|
|
"PORT=${toString cfg.port}"
|
2024-02-27 20:07:47 +01:00
|
|
|
''"FLAGS=--tun ${lib.escapeShellArg cfg.interfaceName} ${lib.concatStringsSep " " cfg.extraDaemonFlags}"''
|
2022-04-17 11:16:25 +02:00
|
|
|
]
|
|
|
|
++ (lib.optionals (cfg.permitCertUid != null) [
|
|
|
|
"TS_PERMIT_CERT_UID=${cfg.permitCertUid}"
|
2024-10-07 00:22:59 +03:00
|
|
|
])
|
|
|
|
++ (lib.optionals (cfg.disableTaildrop) [
|
|
|
|
"TS_DISABLE_TAILDROP=true"
|
2022-04-17 11:16:25 +02:00
|
|
|
]);
|
2022-04-24 23:31:35 -07:00
|
|
|
# Restart tailscaled with a single `systemctl restart` at the
|
|
|
|
# end of activation, rather than a `stop` followed by a later
|
|
|
|
# `start`. Activation over Tailscale can hang for tens of
|
|
|
|
# seconds in the stop+start setup, if the activation script has
|
|
|
|
# a significant delay between the stop and start phases
|
|
|
|
# (e.g. script blocked on another unit with a slow shutdown).
|
|
|
|
#
|
|
|
|
# Tailscale is aware of the correctness tradeoff involved, and
|
|
|
|
# already makes its upstream systemd unit robust against unit
|
|
|
|
# version mismatches on restart for compatibility with other
|
|
|
|
# linux distros.
|
|
|
|
stopIfChanged = false;
|
2020-03-08 17:47:50 +11:00
|
|
|
};
|
2022-06-21 13:23:28 -07:00
|
|
|
|
2023-07-10 22:31:30 +02:00
|
|
|
systemd.services.tailscaled-autoconnect = mkIf (cfg.authKeyFile != null) {
|
2023-12-24 09:44:46 +00:00
|
|
|
after = [ "tailscaled.service" ];
|
|
|
|
wants = [ "tailscaled.service" ];
|
2023-07-10 22:31:30 +02:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
serviceConfig = {
|
|
|
|
Type = "oneshot";
|
|
|
|
};
|
2024-08-30 01:15:37 +10:00
|
|
|
# https://github.com/tailscale/tailscale/blob/v1.72.1/ipn/backend.go#L24-L32
|
|
|
|
script =
|
|
|
|
let
|
2024-09-12 23:06:23 +10:00
|
|
|
statusCommand = "${lib.getExe cfg.package} status --json --peers=false | ${lib.getExe pkgs.jq} -r '.BackendState'";
|
2024-08-30 20:48:17 -03:00
|
|
|
paramToString = v: if (builtins.isBool v) then (lib.boolToString v) else (toString v);
|
|
|
|
params = lib.pipe cfg.authKeyParameters [
|
|
|
|
(lib.filterAttrs (_: v: v != null))
|
|
|
|
(lib.mapAttrsToList (k: v: "${k}=${paramToString v}"))
|
|
|
|
(builtins.concatStringsSep "&")
|
|
|
|
(params: if params != "" then "?${params}" else "")
|
|
|
|
];
|
2024-08-30 01:15:37 +10:00
|
|
|
in
|
|
|
|
''
|
|
|
|
while [[ "$(${statusCommand})" == "NoState" ]]; do
|
|
|
|
sleep 0.5
|
|
|
|
done
|
|
|
|
status=$(${statusCommand})
|
|
|
|
if [[ "$status" == "NeedsLogin" || "$status" == "NeedsMachineAuth" ]]; then
|
2024-08-30 20:48:17 -03:00
|
|
|
${lib.getExe cfg.package} up --auth-key "$(cat ${cfg.authKeyFile})${params}" ${escapeShellArgs cfg.extraUpFlags}
|
2023-07-10 22:31:30 +02:00
|
|
|
fi
|
|
|
|
'';
|
|
|
|
};
|
2025-04-01 20:10:43 +02:00
|
|
|
|
2024-05-11 02:59:25 +09:00
|
|
|
systemd.services.tailscaled-set = mkIf (cfg.extraSetFlags != [ ]) {
|
|
|
|
after = [ "tailscaled.service" ];
|
|
|
|
wants = [ "tailscaled.service" ];
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
serviceConfig = {
|
|
|
|
Type = "oneshot";
|
|
|
|
};
|
|
|
|
script = ''
|
2024-08-30 01:15:37 +10:00
|
|
|
${lib.getExe cfg.package} set ${escapeShellArgs cfg.extraSetFlags}
|
2024-05-11 02:59:25 +09:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2022-11-14 13:23:43 +11:00
|
|
|
boot.kernel.sysctl = mkIf (cfg.useRoutingFeatures == "server" || cfg.useRoutingFeatures == "both") {
|
2023-02-18 13:28:04 +11:00
|
|
|
"net.ipv4.conf.all.forwarding" = mkOverride 97 true;
|
|
|
|
"net.ipv6.conf.all.forwarding" = mkOverride 97 true;
|
2022-11-14 13:23:43 +11:00
|
|
|
};
|
|
|
|
|
2023-10-20 07:37:41 -07:00
|
|
|
networking.firewall.allowedUDPPorts = mkIf cfg.openFirewall [ cfg.port ];
|
|
|
|
|
2022-11-14 13:23:43 +11:00
|
|
|
networking.firewall.checkReversePath = mkIf (
|
|
|
|
cfg.useRoutingFeatures == "client" || cfg.useRoutingFeatures == "both"
|
|
|
|
) "loose";
|
|
|
|
|
2022-06-21 13:23:28 -07:00
|
|
|
networking.dhcpcd.denyInterfaces = [ cfg.interfaceName ];
|
|
|
|
|
|
|
|
systemd.network.networks."50-tailscale" = mkIf isNetworkd {
|
|
|
|
matchConfig = {
|
|
|
|
Name = cfg.interfaceName;
|
|
|
|
};
|
|
|
|
linkConfig = {
|
|
|
|
Unmanaged = true;
|
|
|
|
ActivationPolicy = "manual";
|
|
|
|
};
|
|
|
|
};
|
2020-03-08 17:47:50 +11:00
|
|
|
};
|
|
|
|
}
|