Extract vpn exit node config to module
This commit is contained in:
parent
aaebb4bc19
commit
3f2d427c65
7 changed files with 57 additions and 39 deletions
|
@ -43,6 +43,7 @@
|
|||
v4 = {
|
||||
id = "10.1.1.0";
|
||||
prefixLength = 24;
|
||||
# Note: DHCP from .2 to .249, see calanda config
|
||||
};
|
||||
domain = "plessur-lan.net.qo.is";
|
||||
|
||||
|
@ -50,6 +51,7 @@
|
|||
calanda = {
|
||||
v4.ip = "10.1.1.1";
|
||||
};
|
||||
cyprianspitz.v4.ip = "10.1.1.250";
|
||||
};
|
||||
};
|
||||
|
||||
|
|
|
@ -78,22 +78,5 @@ in
|
|||
qois.backplane-net.enable = true;
|
||||
|
||||
# Configure this node to be used as an vpn exit node
|
||||
qois.backup-client.includePaths = [ "/var/lib/tailscale" ];
|
||||
services.tailscale = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
useRoutingFeatures = "server";
|
||||
authKeyFile = config.sops.secrets."tailscale/key".path;
|
||||
extraUpFlags = [
|
||||
"--timeout 60s"
|
||||
"--accept-dns=false"
|
||||
"--login-server=https://vpn.qo.is"
|
||||
"--advertise-exit-node"
|
||||
(
|
||||
with meta.network.virtual.backplane.v4; "--advertise-routes=${id}/${builtins.toString prefixLength}"
|
||||
)
|
||||
"--advertise-tags=tag:srv"
|
||||
];
|
||||
};
|
||||
|
||||
qois.vpn-exit-node.enable = true;
|
||||
}
|
||||
|
|
|
@ -3,8 +3,5 @@
|
|||
sops.secrets = {
|
||||
"system/hdd" = { };
|
||||
"system/initrd-ssh-key" = { };
|
||||
"tailscale/key" = {
|
||||
restartUnits = [ "tailscaled.service" ];
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
|
@ -38,7 +38,7 @@ in
|
|||
in
|
||||
{
|
||||
enable = true;
|
||||
resolveLocalQueries = false;
|
||||
resolveLocalQueries = true;
|
||||
settings = {
|
||||
interface = "vms-nat";
|
||||
bind-interfaces = true;
|
||||
|
@ -74,20 +74,5 @@ in
|
|||
|
||||
qois.backplane-net.enable = true;
|
||||
|
||||
# Use this node as vpn exit node
|
||||
qois.backup-client.includePaths = [ "/var/lib/tailscale" ];
|
||||
services.tailscale = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
useRoutingFeatures = "server";
|
||||
authKeyFile = config.sops.secrets."tailscale/key".path;
|
||||
extraUpFlags = [
|
||||
"--login-server=https://vpn.qo.is"
|
||||
"--advertise-exit-node"
|
||||
(
|
||||
with meta.network.virtual.backplane.v4; "--advertise-routes=${id}/${builtins.toString prefixLength}"
|
||||
)
|
||||
"--advertise-tags=tag:srv"
|
||||
];
|
||||
};
|
||||
qois.vpn-exit-node.enable = true;
|
||||
}
|
||||
|
|
|
@ -79,7 +79,7 @@ let
|
|||
in
|
||||
{
|
||||
|
||||
options.qois.loadbalancer = with lib; {
|
||||
options.qois.loadbalancer = {
|
||||
enable = mkEnableOption "Enable services http+s loadbalancing";
|
||||
|
||||
domains = mkOption {
|
||||
|
|
50
nixos-modules/qois/vpn-exit-node/default.nix
Normal file
50
nixos-modules/qois/vpn-exit-node/default.nix
Normal file
|
@ -0,0 +1,50 @@
|
|||
{
|
||||
config,
|
||||
pkgs,
|
||||
lib,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
let
|
||||
cfg = config.qois.vpn-exit-node;
|
||||
in
|
||||
{
|
||||
|
||||
options.qois.vpn-exit-node = {
|
||||
enable = mkEnableOption "vpn exit node";
|
||||
domain = mkOption {
|
||||
description = "Domain for the VPN admin server";
|
||||
type = types.str;
|
||||
default = "vpn.qo.is";
|
||||
};
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
|
||||
qois.backup-client.includePaths = [ "/var/lib/tailscale" ];
|
||||
|
||||
sops.secrets."tailscale/key".restartUnits = [ "tailscaled.service" ];
|
||||
|
||||
services.tailscale = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
useRoutingFeatures = "server";
|
||||
authKeyFile = config.sops.secrets."tailscale/key".path;
|
||||
extraUpFlags =
|
||||
let
|
||||
backplaneRoute =
|
||||
with config.qois.meta.network.virtual.backplane.v4;
|
||||
"${id}/${builtins.toString prefixLength}";
|
||||
in
|
||||
[
|
||||
"--timeout 60s"
|
||||
"--accept-dns=false"
|
||||
"--accept-routes=false"
|
||||
"--login-server=https://${cfg.domain}"
|
||||
"--advertise-exit-node"
|
||||
"--advertise-routes=${backplaneRoute}"
|
||||
"--advertise-tags=tag:srv"
|
||||
];
|
||||
};
|
||||
};
|
||||
}
|
|
@ -56,6 +56,7 @@ in
|
|||
);
|
||||
|
||||
networking.firewall.checkReversePath = "loose";
|
||||
networking.firewall.allowedTCPPorts = [ config.services.headscale.port ];
|
||||
networking.firewall.allowedUDPPorts = [
|
||||
41641
|
||||
];
|
||||
|
|
Loading…
Reference in a new issue