aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/nixos/modules/services/networking/tailscale.nix
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/nixos/modules/services/networking/tailscale.nix')
-rw-r--r--nixpkgs/nixos/modules/services/networking/tailscale.nix46
1 files changed, 46 insertions, 0 deletions
diff --git a/nixpkgs/nixos/modules/services/networking/tailscale.nix b/nixpkgs/nixos/modules/services/networking/tailscale.nix
new file mode 100644
index 00000000000..513c42b4011
--- /dev/null
+++ b/nixpkgs/nixos/modules/services/networking/tailscale.nix
@@ -0,0 +1,46 @@
+{ config, lib, pkgs, ... }:
+
+with lib;
+
+let cfg = config.services.tailscale;
+in {
+ meta.maintainers = with maintainers; [ danderson mbaillie ];
+
+ options.services.tailscale = {
+ enable = mkEnableOption "Tailscale client daemon";
+
+ port = mkOption {
+ type = types.port;
+ default = 41641;
+ description = "The port to listen on for tunnel traffic (0=autoselect).";
+ };
+ };
+
+ config = mkIf cfg.enable {
+ systemd.services.tailscale = {
+ description = "Tailscale client daemon";
+
+ after = [ "network-pre.target" ];
+ wants = [ "network-pre.target" ];
+ wantedBy = [ "multi-user.target" ];
+
+ unitConfig = {
+ StartLimitIntervalSec = 0;
+ StartLimitBurst = 0;
+ };
+
+ serviceConfig = {
+ ExecStart =
+ "${pkgs.tailscale}/bin/tailscaled --port ${toString cfg.port}";
+
+ RuntimeDirectory = "tailscale";
+ RuntimeDirectoryMode = 755;
+
+ StateDirectory = "tailscale";
+ StateDirectoryMode = 700;
+
+ Restart = "on-failure";
+ };
+ };
+ };
+}