tailscale: Use networking attrset
This commit is contained in:
parent
3a4d4e9c4f
commit
1e19a08665
@ -1,8 +1,9 @@
|
|||||||
{ config, pkgs, ... }:
|
{ config, pkgs, lib, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
domain = "vipienne.giugl.io";
|
domain = "vipienne.giugl.io";
|
||||||
network = import ./network.nix;
|
architectInterfaceAddress = interface:
|
||||||
|
config.architect.networks.${interface}.devices.architect.address;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
architect.firewall = {
|
architect.firewall = {
|
||||||
@ -10,9 +11,9 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
networking.extraHosts = ''
|
networking.extraHosts = ''
|
||||||
${network.architect-lan} ${domain}
|
${architectInterfaceAddress "lan"} ${domain}
|
||||||
${network.architect-wg} ${domain}
|
${architectInterfaceAddress "wireguard"} ${domain}
|
||||||
${network.architect-ts} ${domain}
|
${architectInterfaceAddress "tailscale"} ${domain}
|
||||||
'';
|
'';
|
||||||
|
|
||||||
environment.systemPackages = [ pkgs.unstablePkgs.headscale ];
|
environment.systemPackages = [ pkgs.unstablePkgs.headscale ];
|
||||||
@ -28,13 +29,17 @@ in
|
|||||||
settings = {
|
settings = {
|
||||||
dns_config = {
|
dns_config = {
|
||||||
magic_dns = true;
|
magic_dns = true;
|
||||||
# domains = [ "giugl.io" "runas.rocks" ];
|
domains = [
|
||||||
# base_domain = "giugl.io";
|
"giugl.io"
|
||||||
|
"runas.rocks"
|
||||||
|
"devs.giugl.io"
|
||||||
|
];
|
||||||
|
base_domain = "giugl.io";
|
||||||
override_local_dns = true;
|
override_local_dns = true;
|
||||||
nameservers = "10.4.0.2";
|
nameservers = [ config.architect.networks.tailscale.devices.architect.address ];
|
||||||
};
|
};
|
||||||
logtail.enabled = false;
|
logtail.enabled = false;
|
||||||
ip_prefixes = [ "10.4.0.0/24" ];
|
ip_prefixes = [ config.architect.networks.tailscale.net ];
|
||||||
# The Noise private key is used to encrypt the
|
# The Noise private key is used to encrypt the
|
||||||
# traffic between headscale and Tailscale clients when
|
# traffic between headscale and Tailscale clients when
|
||||||
# using the new Noise-based protocol. It must be different
|
# using the new Noise-based protocol. It must be different
|
||||||
@ -43,10 +48,6 @@ in
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# ssl.key = "${config.security.acme.certs.${domain}.directory}/key.pem";
|
|
||||||
# ssl.cert =
|
|
||||||
# "${config.security.acme.certs.${domain}.directory}/fullchain.pem";
|
|
||||||
|
|
||||||
nginx.virtualHosts.${domain} = {
|
nginx.virtualHosts.${domain} = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
|
Loading…
Reference in New Issue
Block a user