Compare commits

..

3 commits

6 changed files with 28 additions and 34 deletions

View file

@ -3,6 +3,7 @@
fish.enable = true; fish.enable = true;
less.enable = true; less.enable = true;
mosh.enable = true; mosh.enable = true;
tmux.enable = true;
# setcap wrapper for network permissions # setcap wrapper for network permissions
bandwhich.enable = true; bandwhich.enable = true;
@ -21,11 +22,11 @@
(pkgs) (pkgs)
# shell usage # shell usage
bat
fd fd
file file
ripgrep ripgrep
sd sd
tmux
tokei tokei
tree tree
wget wget
@ -34,37 +35,24 @@
usbutils usbutils
# development # development
agenix
alejandra alejandra
git git
git-crypt git-crypt
git-lfs git-lfs
gnumake gnumake
gnupg gnupg
kakoune
pinentry-qt pinentry-qt
python3 python3
vim vim
# terminal utilities # terminal utilities
bottom
dogdns dogdns
du-dust du-dust
htop htop
ldns # drill ldns # drill
tealdeer
unzip unzip
zip zip
# nix pkgs lookup
nix-index
agenix
cachix
;
inherit
(pkgs.llvmPackages_16)
bintools
clang
; ;
}; };
} }

View file

@ -75,7 +75,10 @@
pipewire.enable = true; pipewire.enable = true;
tailscale.enable = true; tailscale = {
enable = true;
useRoutingFeatures = "both";
};
}; };
services = { services = {

View file

@ -133,7 +133,7 @@ in {
tailscale = { tailscale = {
enable = true; enable = true;
exitNode = true; useRoutingFeatures = "server";
}; };
transmission = { transmission = {

View file

@ -49,7 +49,11 @@
# List services that you want to enable: # List services that you want to enable:
my.services = { my.services = {
tailscale.enable = true; tailscale = {
enable = true;
useRoutingFeatures = "client";
};
pipewire.enable = true; pipewire.enable = true;
restic-backup = { restic-backup = {

View file

@ -28,7 +28,10 @@ in {
# List services that you want to enable: # List services that you want to enable:
my.services = { my.services = {
tailscale.enable = true; tailscale = {
enable = true;
useRoutingFeatures = "both";
};
}; };
services = { services = {

View file

@ -8,34 +8,30 @@
(lib) (lib)
mkEnableOption mkEnableOption
mkIf mkIf
mkOption
types
; ;
cfg = config.my.services.tailscale; cfg = config.my.services.tailscale;
in { in {
options.my.services.tailscale = { options.my.services.tailscale = {
enable = mkEnableOption "Tailscale"; enable = mkEnableOption "Tailscale";
useRoutingFeatures = mkOption {
# NOTE: still have to do `tailscale up --advertise-exit-node` type = types.enum [ "none" "client" "server" "both" ];
exitNode = mkEnableOption "Use as exit node"; default = "none";
};
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
services.tailscale = { services.tailscale = {
enable = true; enable = true;
package = pkgs.tailscale; package = pkgs.tailscale;
openFirewall = true;
useRoutingFeatures = cfg.useRoutingFeatures;
}; };
networking.firewall = { networking.firewall = {
trustedInterfaces = ["tailscale0"]; trustedInterfaces = [config.services.tailscale.interfaceName];
allowedUDPPorts = [config.services.tailscale.port];
# needed for exit node usage
checkReversePath = mkIf (!cfg.exitNode) "loose";
};
# enable IP forwarding to use as exit node
boot.kernel.sysctl = mkIf cfg.exitNode {
"net.ipv6.conf.all.forwarding" = true;
"net.ipv4.ip_forward" = true;
}; };
}; };
} }